Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1466182
MD5:e3e6cf9bb53c398d2f75398923f91c11
SHA1:9af3600fd9befae3aa830e80d9fb2f513c100ab4
SHA256:eb55557a69adf16683fbc5f5fd822d8c3e338298a98e0769bdec8a7c5787a75d
Tags:exe
Infos:

Detection

Vidar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
Yara detected Vidar stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Searches for specific processes (likely to inject)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 6132 cmdline: "C:\Users\user\Desktop\file.exe" MD5: E3E6CF9BB53C398D2F75398923F91C11)
    • RegAsm.exe (PID: 6188 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • WerFault.exe (PID: 4768 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6132 -s 264 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": ["https://steamcommunity.com/profiles/76561199707802586", "https://t.me/g067n"], "Botnet": "93851f7e951a018e4f54b8ea574c0810"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
    00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
      00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
        00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
          Process Memory Space: file.exe PID: 6132JoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            0.2.file.exe.48ab00.1.raw.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
              1.2.RegAsm.exe.400000.0.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                1.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                  0.2.file.exe.48ab00.1.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                    0.2.file.exe.3f0000.0.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: https://49.13.159.121:9000/vcruntime140.dllh/QAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/softokn3.dllEdgeAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/MWAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/vcruntime140.dllrsaenh.dllEAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/softokn3.dllAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/vcruntime140.dlltQAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/(Avira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/freebl3.dllAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000Avira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/freebl3.dll7Avira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/0Avira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/mozglue.dllAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121/Avira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/BAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/DAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/KDAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/nss3.dllAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/msvcp140.dll0.15;Avira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/sqlt.dllAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/vcruntime140.dlletsAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/msvcp140.dllAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/nss3.dlloftAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/softokn3.dll2Avira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/softAvira URL Cloud: Label: malware
                      Source: https://steamcommunity.com/profiles/76561199707802586Avira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/Avira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/softokn3.dllLAvira URL Cloud: Label: malware
                      Source: https://t.me/g067nAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/lAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/msvcp140.dll~Avira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/msvcp140.dllEdgeAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/vcruntime140.dllAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/freebl3.dllAppDataAvira URL Cloud: Label: malware
                      Source: https://49.13.159.121:9000/ss3.dllAvira URL Cloud: Label: malware
                      Source: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Vidar {"C2 url": ["https://steamcommunity.com/profiles/76561199707802586", "https://t.me/g067n"], "Botnet": "93851f7e951a018e4f54b8ea574c0810"}
                      Source: file.exeReversingLabs: Detection: 36%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: file.exeJoe Sandbox ML: detected
                      Source: 1.2.RegAsm.exe.400000.0.raw.unpackString decryptor: I8S%
                      Source: 1.2.RegAsm.exe.400000.0.raw.unpackString decryptor: usernameField
                      Source: 1.2.RegAsm.exe.400000.0.raw.unpackString decryptor: a GX Stable
                      Source: 1.2.RegAsm.exe.400000.0.raw.unpackString decryptor: uctName
                      Source: 1.2.RegAsm.exe.400000.0.raw.unpackString decryptor: layVersion
                      Source: 1.2.RegAsm.exe.400000.0.raw.unpackString decryptor: sktop\
                      Source: 1.2.RegAsm.exe.400000.0.raw.unpackString decryptor: F783D5D3EF8C*
                      Source: 1.2.RegAsm.exe.400000.0.raw.unpackString decryptor: T=@?VDX;W:R1J )M$
                      Source: 1.2.RegAsm.exe.400000.0.raw.unpackString decryptor: #5EG P%:{
                      Source: 1.2.RegAsm.exe.400000.0.raw.unpackString decryptor: ystemInfo
                      Source: 1.2.RegAsm.exe.400000.0.raw.unpackString decryptor: 304FDQ8L\h$
                      Source: 1.2.RegAsm.exe.400000.0.raw.unpackString decryptor: %hu/%hu
                      Source: 1.2.RegAsm.exe.400000.0.raw.unpackString decryptor: ero\wallet.k9ys
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00407E41 CryptUnprotectData,LocalAlloc,LocalFree,1_2_00407E41
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041302D CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,1_2_0041302D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00407DC2 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,1_2_00407DC2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0040AB80 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,1_2_0040AB80
                      Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.5:49725 version: TLS 1.2
                      Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: Binary string: C:\labzvp8d\output.pdb source: file.exe
                      Source: Binary string: C:\labzvp8d\output.pdb' source: file.exe
                      Source: Binary string: C:\Users\Dan\Desktop\work\sqlite\tmp\sqlite_bld_dir\2\sqlite3.pdb source: RegAsm.exe, 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3370980408.0000000019EFA000.00000004.00000020.00020000.00000000.sdmp, sqlt[1].dll.1.dr
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00462D95 FindFirstFileExW,0_2_00462D95
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0046317F FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_0046317F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00409FC0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,1_2_00409FC0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00401443 FindFirstFileA,StrCmpCA,StrCmpCA,FindFirstFileA,FindNextFileA,FindClose,FindNextFileA,FindClose,1_2_00401443
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0040E016 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,1_2_0040E016
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0040C039 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,1_2_0040C039
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004164C7 wsprintfA,FindFirstFileA,memset,memset,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,memset,lstrcatA,strtok_s,strtok_s,memset,lstrcatA,strtok_s,PathMatchSpecA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,strtok_s,FindNextFileA,FindClose,1_2_004164C7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0040BC98 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,1_2_0040BC98
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00416D7D wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,1_2_00416D7D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0040D690 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,FindNextFileA,FindClose,1_2_0040D690
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0040C6B5 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,1_2_0040C6B5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004177D3 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,1_2_004177D3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041738D GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,1_2_0041738D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004169EC GetLogicalDriveStringsA,memset,GetDriveTypeA,lstrcpyA,lstrcpyA,lstrcpyA,lstrcpyA,1_2_004169EC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: https://steamcommunity.com/profiles/76561199707802586
                      Source: Malware configuration extractorURLs: https://t.me/g067n
                      Source: global trafficTCP traffic: 192.168.2.5:49726 -> 49.13.159.121:9000
                      Source: global trafficHTTP traffic detected: GET /g067n HTTP/1.1Host: t.meConnection: Keep-AliveCache-Control: no-cache
                      Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
                      Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
                      Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 49.13.159.121
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004058C4 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,InternetSetOptionA,lstrlenA,lstrlenA,GetProcessHeap,HeapAlloc,lstrlenA,memcpy,lstrlenA,lstrlenA,memcpy,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,1_2_004058C4
                      Source: global trafficHTTP traffic detected: GET /g067n HTTP/1.1Host: t.meConnection: Keep-AliveCache-Control: no-cache
                      Source: global trafficDNS traffic detected: DNS query: t.me
                      Source: RegAsm.exe, 00000001.00000002.3367264206.0000000000FE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                      Source: RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
                      Source: RegAsm.exe, 00000001.00000002.3370980408.0000000019EFA000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmp, sqlt[1].dll.1.drString found in binary or memory: http://www.sqlite.org/copyright.html.
                      Source: RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121/
                      Source: RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000
                      Source: RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3367264206.0000000000FE0000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3367482660.0000000001117000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3367456921.00000000010D2000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/
                      Source: RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/(
                      Source: RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/0
                      Source: RegAsm.exe, 00000001.00000002.3367456921.00000000010D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/B
                      Source: RegAsm.exe, 00000001.00000002.3367456921.00000000010D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/D
                      Source: RegAsm.exe, 00000001.00000002.3367456921.00000000010D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/KD
                      Source: RegAsm.exe, 00000001.00000002.3367264206.0000000000FE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/MW
                      Source: RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/freebl3.dll
                      Source: RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/freebl3.dll7
                      Source: RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/freebl3.dllAppData
                      Source: RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/l
                      Source: RegAsm.exe, 00000001.00000002.3367264206.0000000000FE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/mW
                      Source: RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/mozglue.dll
                      Source: RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3367456921.00000000010D2000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/msvcp140.dll
                      Source: RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/msvcp140.dll0.15;
                      Source: RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/msvcp140.dllEdge
                      Source: RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/msvcp140.dll~
                      Source: RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/nss3.dll
                      Source: RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/nss3.dlloft
                      Source: RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/soft
                      Source: RegAsm.exe, 00000001.00000002.3367456921.00000000010D2000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/softokn3.dll
                      Source: RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/softokn3.dll2
                      Source: RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/softokn3.dllEdge
                      Source: RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/softokn3.dllL
                      Source: RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/sqlt.dll
                      Source: RegAsm.exe, 00000001.00000002.3367456921.00000000010D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/ss3.dll
                      Source: RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3367482660.00000000010F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/vcruntime140.dll
                      Source: RegAsm.exe, 00000001.00000002.3367482660.00000000010F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/vcruntime140.dllets
                      Source: RegAsm.exe, 00000001.00000002.3367482660.00000000010F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/vcruntime140.dllh/Q
                      Source: RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/vcruntime140.dllrsaenh.dllE
                      Source: RegAsm.exe, 00000001.00000002.3367482660.00000000010F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000/vcruntime140.dlltQ
                      Source: RegAsm.exe, 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:900024
                      Source: RegAsm.exe, 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000a4f35rosoft
                      Source: RegAsm.exe, 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000a4f35txtft
                      Source: RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000al
                      Source: RegAsm.exe, 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000alMicrosoft
                      Source: RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://49.13.159.121:9000ming
                      Source: GIIIEC.1.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                      Source: GIIIEC.1.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                      Source: GIIIEC.1.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                      Source: GIIIEC.1.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                      Source: GIIIEC.1.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                      Source: GIIIEC.1.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                      Source: GIIIEC.1.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                      Source: file.exe, 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, RegAsm.exe, 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199707802586
                      Source: file.exe, 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199707802586hellosqlt.dllsqlite3.dll
                      Source: RegAsm.exe, 00000001.00000002.3367264206.0000000000FE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/
                      Source: file.exe, 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, RegAsm.exe, 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://t.me/g067n
                      Source: RegAsm.exe, 00000001.00000002.3367264206.0000000000FE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/g067n4G
                      Source: RegAsm.exe, 00000001.00000002.3367264206.0000000000FE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/g067nNG
                      Source: file.exe, 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://t.me/g067nry1neMozilla/5.0
                      Source: RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://web.telegram.org
                      Source: GIIIEC.1.drString found in binary or memory: https://www.ecosia.org/newtab/
                      Source: GIIIEC.1.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                      Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.5:49725 version: TLS 1.2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00413160 memset,GetDesktopWindow,GetWindowRect,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,GlobalFix,GlobalSize,SelectObject,DeleteObject,DeleteObject,ReleaseDC,CloseWindow,1_2_00413160

                      System Summary

                      barindex
                      Source: Process Memory Space: file.exe PID: 6132, type: MEMORYSTRMatched rule: Detects Molerats sample - July 2017 Author: Florian Roth
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0046A00C0_2_0046A00C
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043E1840_2_0043E184
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045C2FF0_2_0045C2FF
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043C2A60_2_0043C2A6
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043C5EE0_2_0043C5EE
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004525950_2_00452595
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043E5A50_2_0043E5A5
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043C9450_2_0043C945
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043E9D50_2_0043E9D5
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045A9E40_2_0045A9E4
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0044C98E0_2_0044C98E
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041EC100_2_0041EC10
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00468CE30_2_00468CE3
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043CC8D0_2_0043CC8D
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043D01B0_2_0043D01B
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043D3B80_2_0043D3B8
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0044D4610_2_0044D461
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0044F4E00_2_0044F4E0
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004015500_2_00401550
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043D7460_2_0043D746
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003F37700_2_003F3770
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004778F00_2_004778F0
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0044FA100_2_0044FA10
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043DAAB0_2_0043DAAB
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0044FE500_2_0044FE50
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043DE1F0_2_0043DE1F
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00423FD40_2_00423FD4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041ECEC1_2_0041ECEC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041E9191_2_0041E919
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041EEC11_2_0041EEC1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041F6CF1_2_0041F6CF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC64CF01_2_1FC64CF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC512A81_2_1FC512A8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC52AA91_2_1FC52AA9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FDB9CC01_2_1FDB9CC0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC5292D1_2_1FC5292D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC81C501_2_1FC81C50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC520181_2_1FC52018
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD79A201_2_1FD79A20
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD059401_2_1FD05940
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC51C9E1_2_1FC51C9E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD0D6D01_2_1FD0D6D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCF96901_2_1FCF9690
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC5D4C01_2_1FC5D4C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FDB94301_2_1FDB9430
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC535801_2_1FC53580
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCE53B01_2_1FCE53B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FE2D2091_2_1FE2D209
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD750401_2_1FD75040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC690001_2_1FC69000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC8CE101_2_1FC8CE10
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC78D2A1_2_1FC78D2A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD54A601_2_1FD54A60
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC5C8001_2_1FC5C800
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC51EF11_2_1FC51EF1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC787631_2_1FC78763
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCB47601_2_1FCB4760
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCE87601_2_1FCE8760
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC786801_2_1FC78680
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD904801_2_1FD90480
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC53AB21_2_1FC53AB2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCD81201_2_1FCD8120
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCD00901_2_1FCD0090
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD780301_2_1FD78030
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC5290A1_2_1FC5290A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC7BAB01_2_1FC7BAB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC5251D1_2_1FC5251D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC878101_2_1FC87810
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC833701_2_1FC83370
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC5F1601_2_1FC5F160
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC5174E1_2_1FC5174E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCB2EE01_2_1FCB2EE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC96E801_2_1FC96E80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FE2AEBE1_2_1FE2AEBE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC519DD1_2_1FC519DD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC5EA801_2_1FC5EA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC5AA401_2_1FC5AA40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD369C01_2_1FD369C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD4A9401_2_1FD4A940
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD6A9001_2_1FD6A900
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC5481D1_2_1FC5481D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC53E3B1_2_1FC53E3B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD8E8001_2_1FD8E800
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC666C01_2_1FC666C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD4A5901_2_1FD4A590
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC7A5601_2_1FC7A560
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC547AF1_2_1FC547AF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC5209F1_2_1FC5209F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCDA0B01_2_1FCDA0B0
                      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00458C74 appears 33 times
                      Source: C:\Users\user\Desktop\file.exeCode function: String function: 0041C798 appears 117 times
                      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00446D18 appears 32 times
                      Source: C:\Users\user\Desktop\file.exeCode function: String function: 0041D150 appears 67 times
                      Source: C:\Users\user\Desktop\file.exeCode function: String function: 0041C7CB appears 76 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 1FC53AF3 appears 37 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 1FE306B1 appears 36 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 1FC51F5A appears 36 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 1FC5395E appears 81 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00404239 appears 287 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 1FC51C2B appears 47 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 1FC5415B appears 173 times
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6132 -s 264
                      Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: Process Memory Space: file.exe PID: 6132, type: MEMORYSTRMatched rule: Molerats_Jul17_Sample_5 date = 2017-07-07, hash1 = ebf2423b9de131eab1c61ac395cbcfc2ac3b15bd9c83b96ae0a48619a4a38d0a, author = Florian Roth, description = Detects Molerats sample - July 2017, reference = https://mymalwareparty.blogspot.de/2017/07/operation-desert-eagle.html, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/13@1/2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041246A CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,1_2_0041246A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004129BF CoInitializeEx,CoInitializeSecurity,CoCreateInstance,CoSetProxyBlanket,VariantInit,VariantClear,1_2_004129BF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\F53RW6MZ.htmJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6132
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\a27284b7-27eb-4a5d-b9da-f4aa1a349191Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: RegAsm.exe, 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3370980408.0000000019EFA000.00000004.00000020.00020000.00000000.sdmp, sqlt[1].dll.1.drBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                      Source: RegAsm.exe, 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3370980408.0000000019EFA000.00000004.00000020.00020000.00000000.sdmp, sqlt[1].dll.1.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                      Source: RegAsm.exe, RegAsm.exe, 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3370980408.0000000019EFA000.00000004.00000020.00020000.00000000.sdmp, sqlt[1].dll.1.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                      Source: RegAsm.exe, 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3370980408.0000000019EFA000.00000004.00000020.00020000.00000000.sdmp, sqlt[1].dll.1.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                      Source: RegAsm.exe, RegAsm.exe, 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3370980408.0000000019EFA000.00000004.00000020.00020000.00000000.sdmp, sqlt[1].dll.1.drBinary or memory string: INSERT INTO "%w"."%w"("%w") VALUES('integrity-check');
                      Source: RegAsm.exe, 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3370980408.0000000019EFA000.00000004.00000020.00020000.00000000.sdmp, sqlt[1].dll.1.drBinary or memory string: CREATE TABLE IF NOT EXISTS %s.'rbu_tmp_%q' AS SELECT *%s FROM '%q' WHERE 0;
                      Source: RegAsm.exe, 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3370980408.0000000019EFA000.00000004.00000020.00020000.00000000.sdmp, sqlt[1].dll.1.drBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
                      Source: RegAsm.exe, 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3370980408.0000000019EFA000.00000004.00000020.00020000.00000000.sdmp, sqlt[1].dll.1.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                      Source: RegAsm.exe, 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3370980408.0000000019EFA000.00000004.00000020.00020000.00000000.sdmp, sqlt[1].dll.1.drBinary or memory string: CREATE TABLE x(addr INT,opcode TEXT,p1 INT,p2 INT,p3 INT,p4 TEXT,p5 INT,comment TEXT,subprog TEXT,nexec INT,ncycle INT,stmt HIDDEN);
                      Source: CAEHJE.1.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: RegAsm.exe, RegAsm.exe, 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3370980408.0000000019EFA000.00000004.00000020.00020000.00000000.sdmp, sqlt[1].dll.1.drBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
                      Source: RegAsm.exe, 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3370980408.0000000019EFA000.00000004.00000020.00020000.00000000.sdmp, sqlt[1].dll.1.drBinary or memory string: CREATE TABLE x(type TEXT,schema TEXT,name TEXT,wr INT,subprog TEXT,stmt HIDDEN);
                      Source: RegAsm.exe, 00000001.00000002.3367264206.0000000000F9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SELECT name, value FROM autofill;
                      Source: file.exeReversingLabs: Detection: 36%
                      Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6132 -s 264
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dbghelp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: C:\labzvp8d\output.pdb source: file.exe
                      Source: Binary string: C:\labzvp8d\output.pdb' source: file.exe
                      Source: Binary string: C:\Users\Dan\Desktop\work\sqlite\tmp\sqlite_bld_dir\2\sqlite3.pdb source: RegAsm.exe, 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3370980408.0000000019EFA000.00000004.00000020.00020000.00000000.sdmp, sqlt[1].dll.1.dr
                      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041B050 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_0041B050
                      Source: sqlt[1].dll.1.drStatic PE information: section name: .00cfg
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041C766 push ecx; ret 0_2_0041C779
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041D1A0 push ecx; ret 0_2_0041D1B3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00421EF5 push ecx; ret 1_2_00421F08
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC51BF9 push ecx; ret 1_2_1FDF4C03
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC510C8 push ecx; ret 1_2_1FE53552
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\sqlt[1].dllJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041B050 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_0041B050
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\sqlt[1].dllJump to dropped file
                      Source: C:\Users\user\Desktop\file.exeAPI coverage: 6.3 %
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00462D95 FindFirstFileExW,0_2_00462D95
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0046317F FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_0046317F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00409FC0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,1_2_00409FC0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00401443 FindFirstFileA,StrCmpCA,StrCmpCA,FindFirstFileA,FindNextFileA,FindClose,FindNextFileA,FindClose,1_2_00401443
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0040E016 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,1_2_0040E016
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0040C039 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,1_2_0040C039
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004164C7 wsprintfA,FindFirstFileA,memset,memset,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,memset,lstrcatA,strtok_s,strtok_s,memset,lstrcatA,strtok_s,PathMatchSpecA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,strtok_s,FindNextFileA,FindClose,1_2_004164C7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0040BC98 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,1_2_0040BC98
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00416D7D wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,1_2_00416D7D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0040D690 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,FindNextFileA,FindClose,1_2_0040D690
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0040C6B5 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,1_2_0040C6B5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004177D3 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,1_2_004177D3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041738D GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,1_2_0041738D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004169EC GetLogicalDriveStringsA,memset,GetDriveTypeA,lstrcpyA,lstrcpyA,lstrcpyA,lstrcpyA,1_2_004169EC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00411F21 GetSystemInfo,wsprintfA,1_2_00411F21
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
                      Source: Amcache.hve.5.drBinary or memory string: VMware
                      Source: KEGCBK.1.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                      Source: KEGCBK.1.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                      Source: KEGCBK.1.drBinary or memory string: global block list test formVMware20,11696428655
                      Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: RegAsm.exe, 00000001.00000002.3367264206.0000000000F9A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3367264206.0000000000FFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: KEGCBK.1.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                      Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: KEGCBK.1.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                      Source: Amcache.hve.5.drBinary or memory string: vmci.sys
                      Source: KEGCBK.1.drBinary or memory string: AMC password management pageVMware20,11696428655
                      Source: KEGCBK.1.drBinary or memory string: tasks.office.comVMware20,11696428655o
                      Source: KEGCBK.1.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                      Source: KEGCBK.1.drBinary or memory string: interactivebrokers.comVMware20,11696428655
                      Source: KEGCBK.1.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                      Source: Amcache.hve.5.drBinary or memory string: VMware20,1
                      Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: RegAsm.exe, 00000001.00000002.3367264206.0000000000F9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                      Source: KEGCBK.1.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                      Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: KEGCBK.1.drBinary or memory string: bankofamerica.comVMware20,11696428655x
                      Source: KEGCBK.1.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                      Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: KEGCBK.1.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                      Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
                      Source: KEGCBK.1.drBinary or memory string: discord.comVMware20,11696428655f
                      Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
                      Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: KEGCBK.1.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                      Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: KEGCBK.1.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                      Source: KEGCBK.1.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                      Source: KEGCBK.1.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                      Source: KEGCBK.1.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                      Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: KEGCBK.1.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                      Source: KEGCBK.1.drBinary or memory string: outlook.office365.comVMware20,11696428655t
                      Source: KEGCBK.1.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                      Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: KEGCBK.1.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                      Source: KEGCBK.1.drBinary or memory string: outlook.office.comVMware20,11696428655s
                      Source: KEGCBK.1.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                      Source: KEGCBK.1.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
                      Source: Amcache.hve.5.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                      Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
                      Source: KEGCBK.1.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                      Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: KEGCBK.1.drBinary or memory string: dev.azure.comVMware20,11696428655j
                      Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: KEGCBK.1.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                      Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: KEGCBK.1.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end nodegraph_1-91501
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00462799 IsDebuggerPresent,0_2_00462799
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041B050 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_0041B050
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045A686 mov eax, dword ptr fs:[00000030h]0_2_0045A686
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045A4DF mov eax, dword ptr fs:[00000030h]0_2_0045A4DF
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045A565 mov eax, dword ptr fs:[00000030h]0_2_0045A565
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045A522 mov eax, dword ptr fs:[00000030h]0_2_0045A522
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045A5C0 mov eax, dword ptr fs:[00000030h]0_2_0045A5C0
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045A6CA mov eax, dword ptr fs:[00000030h]0_2_0045A6CA
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045A70E mov eax, dword ptr fs:[00000030h]0_2_0045A70E
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045A73F mov eax, dword ptr fs:[00000030h]0_2_0045A73F
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004557D9 mov ecx, dword ptr fs:[00000030h]0_2_004557D9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0041ACF3 mov eax, dword ptr fs:[00000030h]1_2_0041ACF3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004058C4 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,InternetSetOptionA,lstrlenA,lstrlenA,GetProcessHeap,HeapAlloc,lstrlenA,memcpy,lstrlenA,lstrlenA,memcpy,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,1_2_004058C4
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004469C1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004469C1
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041CEEF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041CEEF
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041D07F SetUnhandledExceptionFilter,0_2_0041D07F
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041D1B4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041D1B4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00421C0B memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00421C0B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00423DCD SetUnhandledExceptionFilter,1_2_00423DCD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0042224F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0042224F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC542AF SetUnhandledExceptionFilter,1_2_1FC542AF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC52C8E IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_1FC52C8E

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: file.exe PID: 6132, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6188, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\file.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FF018D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_00FF018D
                      Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004138BA CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,FindCloseChangeNotification,1_2_004138BA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004137BD CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,1_2_004137BD
                      Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 425000Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 42E000Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 643000Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: D42008Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041CBB5 cpuid 0_2_0041CBB5
                      Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_00458672
                      Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_00458803
                      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoEx,FormatMessageA,0_2_003FE9AF
                      Source: C:\Users\user\Desktop\file.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00466F54
                      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_0046714F
                      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_0045912E
                      Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_004671F6
                      Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_0046725F
                      Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_004672FA
                      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00467385
                      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_004675D8
                      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00467701
                      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_00467807
                      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoEx,0_2_0041B80D
                      Source: C:\Users\user\Desktop\file.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_004678D6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,1_2_00411D31
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,1_2_1FC52112
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,1_2_1FC52112
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,1_2_1FE2FF17
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,1_2_1FC5298C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041CDC4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_0041CDC4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00411BEC GetProcessHeap,HeapAlloc,GetUserNameA,1_2_00411BEC
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00462067 GetTimeZoneInformation,0_2_00462067
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: RegAsm.exe, 00000001.00000002.3367456921.00000000010D2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.file.exe.48ab00.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.48ab00.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.3f0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: file.exe PID: 6132, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6188, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6188, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.file.exe.48ab00.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.48ab00.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.3f0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: file.exe PID: 6132, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6188, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCCDFC0 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_mprintf,sqlite3_bind_text,sqlite3_step,sqlite3_reset,1_2_1FCCDFC0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCD1FE0 sqlite3_mprintf,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,1_2_1FCD1FE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC65C70 sqlite3_prepare_v3,sqlite3_bind_int64,sqlite3_step,sqlite3_column_value,sqlite3_result_value,sqlite3_reset,1_2_1FC65C70
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCCDB10 sqlite3_initialize,sqlite3_bind_int64,sqlite3_step,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,1_2_1FCCDB10
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD7D9E0 sqlite3_bind_int64,sqlite3_log,sqlite3_log,sqlite3_log,sqlite3_bind_int64,sqlite3_log,sqlite3_log,sqlite3_log,1_2_1FD7D9E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCF5910 sqlite3_mprintf,sqlite3_bind_int64,1_2_1FCF5910
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD2D610 sqlite3_free,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,1_2_1FD2D610
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCF55B0 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,1_2_1FCF55B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD714D0 sqlite3_bind_int64,sqlite3_log,sqlite3_log,sqlite3_log,1_2_1FD714D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD7D4F0 sqlite3_bind_value,sqlite3_log,sqlite3_log,sqlite3_log,1_2_1FD7D4F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD0D3B0 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,1_2_1FD0D3B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCF51D0 sqlite3_mprintf,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,1_2_1FCF51D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCE9090 sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_errmsg,sqlite3_mprintf,1_2_1FCE9090
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC80FB0 sqlite3_result_int64,sqlite3_result_double,sqlite3_result_int,sqlite3_prepare_v3,sqlite3_bind_int64,sqlite3_step,sqlite3_column_value,sqlite3_result_value,sqlite3_reset,1_2_1FC80FB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD34D40 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,1_2_1FD34D40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC88CB0 sqlite3_bind_zeroblob,1_2_1FC88CB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC88970 sqlite3_bind_int64,sqlite3_bind_double,sqlite3_bind_zeroblob,1_2_1FC88970
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC64820 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_reset,sqlite3_initialize,1_2_1FC64820
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCA06E0 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,1_2_1FCA06E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC78680 sqlite3_mprintf,sqlite3_mprintf,sqlite3_initialize,sqlite3_finalize,sqlite3_free,sqlite3_mprintf,sqlite3_bind_value,sqlite3_bind_int64,sqlite3_bind_int64,1_2_1FC78680
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCA8550 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_reset,1_2_1FCA8550
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC88430 sqlite3_bind_int64,1_2_1FC88430
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCC8200 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,1_2_1FCC8200
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD34140 sqlite3_bind_int64,sqlite3_step,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_initialize,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,1_2_1FD34140
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC87810 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_value,sqlite3_step,sqlite3_reset,1_2_1FC87810
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD337E0 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,1_2_1FD337E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FD13770 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,1_2_1FD13770
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC7B400 sqlite3_mprintf,sqlite3_mprintf,sqlite3_free,sqlite3_bind_value,sqlite3_reset,sqlite3_step,sqlite3_reset,sqlite3_column_int64,1_2_1FC7B400
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCAEF30 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_result_error_code,1_2_1FCAEF30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FC666C0 sqlite3_mprintf,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_null,sqlite3_bind_blob,sqlite3_bind_value,sqlite3_free,sqlite3_bind_value,sqlite3_step,sqlite3_reset,1_2_1FC666C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCCA6F0 sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_free,sqlite3_bind_value,1_2_1FCCA6F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCBE200 sqlite3_initialize,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,1_2_1FCBE200
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCCE170 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,1_2_1FCCE170
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_1FCBE090 sqlite3_bind_int64,sqlite3_bind_value,sqlite3_step,sqlite3_reset,1_2_1FCBE090
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      511
                      Process Injection
                      1
                      Masquerading
                      1
                      OS Credential Dumping
                      2
                      System Time Discovery
                      Remote Services1
                      Screen Capture
                      21
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Native API
                      Boot or Logon Initialization Scripts1
                      DLL Side-Loading
                      511
                      Process Injection
                      LSASS Memory41
                      Security Software Discovery
                      Remote Desktop Protocol1
                      Archive Collected Data
                      1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                      Deobfuscate/Decode Files or Information
                      Security Account Manager12
                      Process Discovery
                      SMB/Windows Admin Shares1
                      Data from Local System
                      2
                      Ingress Tool Transfer
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                      Obfuscated Files or Information
                      NTDS1
                      Account Discovery
                      Distributed Component Object ModelInput Capture2
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      DLL Side-Loading
                      LSA Secrets1
                      System Owner/User Discovery
                      SSHKeylogging13
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials3
                      File and Directory Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync44
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      file.exe37%ReversingLabsByteCode-MSIL.Infostealer.Kysler
                      file.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\sqlt[1].dll0%ReversingLabs
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                      http://www.sqlite.org/copyright.html.0%URL Reputationsafe
                      http://upx.sf.net0%URL Reputationsafe
                      https://www.ecosia.org/newtab/0%URL Reputationsafe
                      https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                      https://web.telegram.org0%Avira URL Cloudsafe
                      https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                      https://49.13.159.121:9000a4f35rosoft0%Avira URL Cloudsafe
                      https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                      https://49.13.159.121:9000/vcruntime140.dllh/Q100%Avira URL Cloudmalware
                      https://49.13.159.121:9000/softokn3.dllEdge100%Avira URL Cloudmalware
                      https://steamcommunity.com/profiles/76561199707802586hellosqlt.dllsqlite3.dll0%Avira URL Cloudsafe
                      https://49.13.159.121:9000/MW100%Avira URL Cloudmalware
                      https://t.me/0%Avira URL Cloudsafe
                      https://49.13.159.121:9000240%Avira URL Cloudsafe
                      https://49.13.159.121:9000/vcruntime140.dllrsaenh.dllE100%Avira URL Cloudmalware
                      https://49.13.159.121:9000/softokn3.dll100%Avira URL Cloudmalware
                      https://49.13.159.121:9000/vcruntime140.dlltQ100%Avira URL Cloudmalware
                      https://49.13.159.121:9000alMicrosoft0%Avira URL Cloudsafe
                      https://49.13.159.121:9000/(100%Avira URL Cloudmalware
                      https://49.13.159.121:9000/freebl3.dll100%Avira URL Cloudmalware
                      https://49.13.159.121:9000100%Avira URL Cloudmalware
                      https://t.me/g067n4G0%Avira URL Cloudsafe
                      https://49.13.159.121:9000/freebl3.dll7100%Avira URL Cloudmalware
                      https://49.13.159.121:9000/0100%Avira URL Cloudmalware
                      https://t.me/g067nry1neMozilla/5.00%Avira URL Cloudsafe
                      https://49.13.159.121:9000/mozglue.dll100%Avira URL Cloudmalware
                      https://49.13.159.121/100%Avira URL Cloudmalware
                      https://49.13.159.121:9000/B100%Avira URL Cloudmalware
                      https://49.13.159.121:9000/D100%Avira URL Cloudmalware
                      https://49.13.159.121:9000/KD100%Avira URL Cloudmalware
                      https://49.13.159.121:9000/nss3.dll100%Avira URL Cloudmalware
                      https://49.13.159.121:9000/msvcp140.dll0.15;100%Avira URL Cloudmalware
                      https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                      https://49.13.159.121:9000/sqlt.dll100%Avira URL Cloudmalware
                      https://49.13.159.121:9000/vcruntime140.dllets100%Avira URL Cloudmalware
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                      https://49.13.159.121:9000/msvcp140.dll100%Avira URL Cloudmalware
                      https://49.13.159.121:9000a4f35txtft0%Avira URL Cloudsafe
                      https://49.13.159.121:9000/nss3.dlloft100%Avira URL Cloudmalware
                      https://49.13.159.121:9000/softokn3.dll2100%Avira URL Cloudmalware
                      https://49.13.159.121:9000/soft100%Avira URL Cloudmalware
                      https://steamcommunity.com/profiles/76561199707802586100%Avira URL Cloudmalware
                      https://49.13.159.121:9000/100%Avira URL Cloudmalware
                      https://49.13.159.121:9000/softokn3.dllL100%Avira URL Cloudmalware
                      https://t.me/g067n100%Avira URL Cloudmalware
                      https://49.13.159.121:9000/l100%Avira URL Cloudmalware
                      https://49.13.159.121:9000/msvcp140.dll~100%Avira URL Cloudmalware
                      https://49.13.159.121:9000ming0%Avira URL Cloudsafe
                      https://49.13.159.121:9000/msvcp140.dllEdge100%Avira URL Cloudmalware
                      https://49.13.159.121:9000al0%Avira URL Cloudsafe
                      https://49.13.159.121:9000/vcruntime140.dll100%Avira URL Cloudmalware
                      https://49.13.159.121:9000/freebl3.dllAppData100%Avira URL Cloudmalware
                      https://t.me/g067nNG0%Avira URL Cloudsafe
                      https://49.13.159.121:9000/ss3.dll100%Avira URL Cloudmalware
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      t.me
                      149.154.167.99
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://steamcommunity.com/profiles/76561199707802586true
                        • Avira URL Cloud: malware
                        unknown
                        https://t.me/g067ntrue
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://duckduckgo.com/chrome_newtabGIIIEC.1.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://t.me/RegAsm.exe, 00000001.00000002.3367264206.0000000000FE0000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: safe
                        unknown
                        https://49.13.159.121:9000a4f35rosoftRegAsm.exe, 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://duckduckgo.com/ac/?q=GIIIEC.1.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://web.telegram.orgRegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://steamcommunity.com/profiles/76561199707802586hellosqlt.dllsqlite3.dllfile.exe, 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://49.13.159.121:9000/MWRegAsm.exe, 00000001.00000002.3367264206.0000000000FE0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://49.13.159.121:900024RegAsm.exe, 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://49.13.159.121:9000/vcruntime140.dllh/QRegAsm.exe, 00000001.00000002.3367482660.00000000010F7000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://49.13.159.121:9000/softokn3.dllEdgeRegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://49.13.159.121:9000/vcruntime140.dlltQRegAsm.exe, 00000001.00000002.3367482660.00000000010F7000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=GIIIEC.1.drfalse
                        • URL Reputation: safe
                        unknown
                        https://49.13.159.121:9000/softokn3.dllRegAsm.exe, 00000001.00000002.3367456921.00000000010D2000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://t.me/g067n4GRegAsm.exe, 00000001.00000002.3367264206.0000000000FE0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://49.13.159.121:9000alMicrosoftRegAsm.exe, 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://49.13.159.121:9000RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://49.13.159.121:9000/(RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://49.13.159.121:9000/vcruntime140.dllrsaenh.dllERegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://49.13.159.121:9000/freebl3.dllRegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://49.13.159.121:9000/freebl3.dll7RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchGIIIEC.1.drfalse
                        • URL Reputation: safe
                        unknown
                        https://49.13.159.121:9000/0RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://49.13.159.121/RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://49.13.159.121:9000/mozglue.dllRegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://t.me/g067nry1neMozilla/5.0file.exe, 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://49.13.159.121:9000/KDRegAsm.exe, 00000001.00000002.3367456921.00000000010D2000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://www.sqlite.org/copyright.html.RegAsm.exe, 00000001.00000002.3370980408.0000000019EFA000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmp, sqlt[1].dll.1.drfalse
                        • URL Reputation: safe
                        unknown
                        https://49.13.159.121:9000/BRegAsm.exe, 00000001.00000002.3367456921.00000000010D2000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://49.13.159.121:9000/DRegAsm.exe, 00000001.00000002.3367456921.00000000010D2000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://49.13.159.121:9000/msvcp140.dll0.15;RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://49.13.159.121:9000/nss3.dllRegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://www.google.com/images/branding/product/ico/googleg_lodp.icoGIIIEC.1.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://49.13.159.121:9000/sqlt.dllRegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://49.13.159.121:9000/vcruntime140.dlletsRegAsm.exe, 00000001.00000002.3367482660.00000000010F7000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://49.13.159.121:9000/softokn3.dll2RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=GIIIEC.1.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://upx.sf.netAmcache.hve.5.drfalse
                        • URL Reputation: safe
                        unknown
                        https://49.13.159.121:9000/msvcp140.dllRegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3367456921.00000000010D2000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://49.13.159.121:9000a4f35txtftRegAsm.exe, 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.ecosia.org/newtab/GIIIEC.1.drfalse
                        • URL Reputation: safe
                        unknown
                        https://49.13.159.121:9000/nss3.dlloftRegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://49.13.159.121:9000/softRegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://ac.ecosia.org/autocomplete?q=GIIIEC.1.drfalse
                        • URL Reputation: safe
                        unknown
                        https://49.13.159.121:9000/RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3367264206.0000000000FE0000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3367482660.0000000001117000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3367456921.00000000010D2000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://49.13.159.121:9000/softokn3.dllLRegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://49.13.159.121:9000/mWRegAsm.exe, 00000001.00000002.3367264206.0000000000FE0000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://49.13.159.121:9000/lRegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://49.13.159.121:9000/msvcp140.dll~RegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://49.13.159.121:9000mingRegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://49.13.159.121:9000/msvcp140.dllEdgeRegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://49.13.159.121:9000/vcruntime140.dllRegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3367482660.00000000010F7000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://49.13.159.121:9000alRegAsm.exe, 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://49.13.159.121:9000/ss3.dllRegAsm.exe, 00000001.00000002.3367456921.00000000010D2000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://49.13.159.121:9000/freebl3.dllAppDataRegAsm.exe, 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=GIIIEC.1.drfalse
                          • URL Reputation: safe
                          unknown
                          https://t.me/g067nNGRegAsm.exe, 00000001.00000002.3367264206.0000000000FE0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          49.13.159.121
                          unknownGermany
                          24940HETZNER-ASDEfalse
                          149.154.167.99
                          t.meUnited Kingdom
                          62041TELEGRAMRUtrue
                          Joe Sandbox version:40.0.0 Tourmaline
                          Analysis ID:1466182
                          Start date and time:2024-07-02 16:39:09 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 6m 13s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:8
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:file.exe
                          Detection:MAL
                          Classification:mal100.troj.spyw.evad.winEXE@4/13@1/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 97%
                          • Number of executed functions: 71
                          • Number of non-executed functions: 241
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                          • Excluded IPs from analysis (whitelisted): 52.168.117.173
                          • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryAttributesFile calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • VT rate limit hit for: file.exe
                          TimeTypeDescription
                          10:40:08API Interceptor1x Sleep call for process: WerFault.exe modified
                          10:40:16API Interceptor1x Sleep call for process: RegAsm.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          49.13.159.121file.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                            pDHKarOK2v.exeGet hashmaliciousCryptOne, VidarBrowse
                              1719859269.0326595_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, XmrigBrowse
                                149.154.167.99http://telegramtw1.org/Get hashmaliciousUnknownBrowse
                                • telegram.org/?setln=pl
                                http://makkko.kz/Get hashmaliciousUnknownBrowse
                                • telegram.org/
                                http://telegram.dogGet hashmaliciousUnknownBrowse
                                • telegram.dog/
                                LnSNtO8JIa.exeGet hashmaliciousCinoshi StealerBrowse
                                • t.me/cinoshibot
                                jtfCFDmLdX.exeGet hashmaliciousGurcu Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, zgRATBrowse
                                • t.me/cinoshibot
                                vSlVoTPrmP.exeGet hashmaliciousGurcu Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, zgRATBrowse
                                • t.me/cinoshibot
                                RO67OsrIWi.exeGet hashmaliciousGurcu Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, zgRATBrowse
                                • t.me/cinoshibot
                                KeyboardRGB.exeGet hashmaliciousUnknownBrowse
                                • t.me/cinoshibot
                                file.exeGet hashmaliciousCinoshi StealerBrowse
                                • t.me/cinoshibot
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                t.mefile.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                • 149.154.167.99
                                pDHKarOK2v.exeGet hashmaliciousCryptOne, VidarBrowse
                                • 149.154.167.99
                                1719859269.0326595_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, XmrigBrowse
                                • 149.154.167.99
                                https://clicktime.cloud.postoffice.net/clicktime.php?U=https%3A%2F%2Ftelegra.ph%2FDavis-Insurance-Agency-LLC-06-28&E=kgarber%40woodlandsbank.com&X=XID311CFbwQP1837Xd1&T=WDLP&HV=U,E,X,T&H=3a14786ee7a8dd2b0305ef5dd961d4108cbfaf34Get hashmaliciousUnknownBrowse
                                • 149.154.167.99
                                zyJWi2vy29.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro Stealer, Vidar, zgRATBrowse
                                • 149.154.167.99
                                56bDgH9sMQ.exeGet hashmaliciousVidarBrowse
                                • 149.154.167.99
                                vjYcExA6ou.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                • 149.154.167.99
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                TELEGRAMRUfile.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                • 149.154.167.99
                                pDHKarOK2v.exeGet hashmaliciousCryptOne, VidarBrowse
                                • 149.154.167.99
                                https://telegrambot-resolved.pages.dev/Get hashmaliciousUnknownBrowse
                                • 149.154.167.99
                                1719859269.0326595_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, XmrigBrowse
                                • 149.154.167.99
                                Cheat.malware_exe.exeGet hashmaliciousUnknownBrowse
                                • 149.154.167.220
                                Cheat.malware_exe.exeGet hashmaliciousUnknownBrowse
                                • 149.154.167.220
                                https://clicktime.cloud.postoffice.net/clicktime.php?U=https%3A%2F%2Ftelegra.ph%2FDavis-Insurance-Agency-LLC-06-28&E=kgarber%40woodlandsbank.com&X=XID311CFbwQP1837Xd1&T=WDLP&HV=U,E,X,T&H=3a14786ee7a8dd2b0305ef5dd961d4108cbfaf34Get hashmaliciousUnknownBrowse
                                • 149.154.167.99
                                zyJWi2vy29.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro Stealer, Vidar, zgRATBrowse
                                • 149.154.167.99
                                Kh7W85ONS7.exeGet hashmaliciousAsyncRAT, DarkTortilla, StormKitty, WorldWind StealerBrowse
                                • 149.154.167.220
                                56bDgH9sMQ.exeGet hashmaliciousVidarBrowse
                                • 149.154.167.99
                                HETZNER-ASDEhkLFB22XxS.exeGet hashmaliciousFormBookBrowse
                                • 135.181.212.206
                                file.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                • 49.13.159.121
                                pDHKarOK2v.exeGet hashmaliciousCryptOne, VidarBrowse
                                • 49.13.159.121
                                https://he110ca11he1lpn0wwb112.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                • 195.201.57.90
                                https://serviceca11he1pn0waa12.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                • 195.201.57.90
                                1719859269.0326595_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, XmrigBrowse
                                • 49.13.159.121
                                http://www.midoregon.comGet hashmaliciousUnknownBrowse
                                • 188.40.16.190
                                lQC7IiMNX1.elfGet hashmaliciousMiraiBrowse
                                • 46.4.110.33
                                MT103-7543324334.exeGet hashmaliciousRemcosBrowse
                                • 138.201.150.244
                                file.exeGet hashmaliciousFormBookBrowse
                                • 135.181.212.206
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                37f463bf4616ecd445d4a1937da06e19FmQx1Fw3VA.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                • 149.154.167.99
                                config.lnk.mal.lnkGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                • 149.154.167.99
                                invoicepast.pdf.lnk.mal.lnkGet hashmaliciousScreenConnect ToolBrowse
                                • 149.154.167.99
                                Invoice-UPS-218931.pdf.lnk.mal.lnkGet hashmaliciousUnknownBrowse
                                • 149.154.167.99
                                IF10339.pdf.lnk.mal.lnkGet hashmaliciousUnknownBrowse
                                • 149.154.167.99
                                Video%20HD%20%281080p%29.lnk.mal.lnkGet hashmaliciousUnknownBrowse
                                • 149.154.167.99
                                file.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                • 149.154.167.99
                                1Bj6BoXV3z.exeGet hashmaliciousCobaltStrikeBrowse
                                • 149.154.167.99
                                pDHKarOK2v.exeGet hashmaliciousCryptOne, VidarBrowse
                                • 149.154.167.99
                                Revised Invoice 7389293.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                • 149.154.167.99
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\sqlt[1].dllfile.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                  pDHKarOK2v.exeGet hashmaliciousCryptOne, VidarBrowse
                                    1719859269.0326595_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, XmrigBrowse
                                      zyJWi2vy29.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro Stealer, Vidar, zgRATBrowse
                                        56bDgH9sMQ.exeGet hashmaliciousVidarBrowse
                                          vjYcExA6ou.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                            2E7ZdlxkOL.exeGet hashmaliciousPureLog Stealer, Vidar, zgRATBrowse
                                              S8co1ACRdn.exeGet hashmaliciousCryptOne, VidarBrowse
                                                M9dfZzH3qn.exeGet hashmaliciousCryptOne, VidarBrowse
                                                  5IRIk4f1PO.exeGet hashmaliciousCryptOne, VidarBrowse
                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):40960
                                                    Entropy (8bit):0.8553638852307782
                                                    Encrypted:false
                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                    Malicious:false
                                                    Reputation:high, very likely benign file
                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):155648
                                                    Entropy (8bit):0.5407252242845243
                                                    Encrypted:false
                                                    SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
                                                    MD5:7B955D976803304F2C0505431A0CF1CF
                                                    SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
                                                    SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
                                                    SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
                                                    Malicious:false
                                                    Reputation:high, very likely benign file
                                                    Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.8439810553697228
                                                    Encrypted:false
                                                    SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                                    MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                                    SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                                    SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                                    SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                                    Malicious:false
                                                    Reputation:high, very likely benign file
                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                    Category:dropped
                                                    Size (bytes):106496
                                                    Entropy (8bit):1.136413900497188
                                                    Encrypted:false
                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                                    MD5:429F49156428FD53EB06FC82088FD324
                                                    SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                                    SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                                    SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                                    Malicious:false
                                                    Reputation:high, very likely benign file
                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):0.6732424250451717
                                                    Encrypted:false
                                                    SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                    MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                    SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                    SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                    SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                    Malicious:false
                                                    Reputation:high, very likely benign file
                                                    Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
                                                    Category:dropped
                                                    Size (bytes):159744
                                                    Entropy (8bit):0.5394293526345721
                                                    Encrypted:false
                                                    SSDEEP:96:AquejzH+bF+UIYysX0IxQzh/tsV0NifLjLqLy0e9S8E:AqtH+bF+UI3iN0RSV0k3qLyj9
                                                    MD5:52701A76A821CDDBC23FB25C3FCA4968
                                                    SHA1:440D4B5A38AF50711C5E6C6BE22D80BC17BF32DE
                                                    SHA-256:D602B4D0B3EB9B51535F6EBA33709DCB881237FA95C5072CB39CECF0E06A0AC4
                                                    SHA-512:2653C8DB9C20207FA7006BC9C63142B7C356FB9DC97F9184D60C75D987DC0848A8159C239E83E2FC9D45C522FEAE8D273CDCD31183DED91B8B587596183FC000
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                    Category:modified
                                                    Size (bytes):196608
                                                    Entropy (8bit):1.121297215059106
                                                    Encrypted:false
                                                    SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                    MD5:D87270D0039ED3A5A72E7082EA71E305
                                                    SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                    SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                    SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):65536
                                                    Entropy (8bit):0.7034535032856252
                                                    Encrypted:false
                                                    SSDEEP:192:m6hMDlvMPliBti50c20AE3jGGzuiFfZ24IO8ThB:72MNibiac20jjHzuiFfY4IO8r
                                                    MD5:ACF27D4D1C066AEB19362C7426E7F269
                                                    SHA1:01E8F9567523F3C36908A3816BFA2BCC406DC6F9
                                                    SHA-256:70BD6C7A6FEBE84197E89C554F90ED3645DE536EF227E91C06118513FE880100
                                                    SHA-512:D0CD2145774644FF85C62A6AA8CFAE5C4BA463DF7CBA5B26C08725045735E0F610F0AA02C9E7135E95F1E6E869AA38DB21FF9CA944BDB21197B8735067FF0EC7
                                                    Malicious:true
                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.4.4.0.4.8.0.6.5.0.6.9.0.0.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.4.4.0.4.8.0.6.9.6.0.0.2.0.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.c.7.f.8.a.6.a.-.3.4.e.8.-.4.b.3.b.-.a.3.4.b.-.5.5.f.9.e.d.7.a.f.c.3.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.9.8.7.4.b.6.f.-.7.d.6.3.-.4.1.a.4.-.a.a.c.3.-.5.1.9.d.a.3.c.5.0.a.d.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.f.i.l.e...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.f.4.-.0.0.0.1.-.0.0.1.4.-.9.3.4.9.-.e.4.b.a.8.d.c.c.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.e.4.9.2.d.7.6.8.e.7.9.7.3.1.6.2.4.b.c.d.f.2.e.7.6.1.5.f.9.1.8.0.0.0.0.f.f.f.f.!.0.0.0.0.9.a.f.3.6.0.0.f.d.9.b.e.f.a.e.3.a.a.8.3.0.e.8.0.d.9.f.b.2.f.5.1.3.c.1.0.0.a.b.4.!.f.i.l.e...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.7.
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:Mini DuMP crash report, 14 streams, Tue Jul 2 14:40:06 2024, 0x1205a4 type
                                                    Category:dropped
                                                    Size (bytes):56628
                                                    Entropy (8bit):1.7180446861231489
                                                    Encrypted:false
                                                    SSDEEP:192:VayxegrxtOjhlRRLcUWiSTqwjClFTk/L75do/DbwWd:EGeWitlRBVSTQ8oD0
                                                    MD5:992B32F54EB63146BDBC90576EF593A0
                                                    SHA1:E58C548A267CBB410D5DE838FEAF7C0BA63ACC49
                                                    SHA-256:116AD52BDB2B0A22AC090F39C315B0E8A294F11753DF440DB0C885385465395D
                                                    SHA-512:32F832A8A67D593BB865D97D426EE29AE76E36D8A7D670D7BFA4B68B5D6C631AE70454933FA07290EEB2822B241A91915162DB93082AE9B4ED264C1DD32515B5
                                                    Malicious:false
                                                    Preview:MDMP..a..... .......F..f........................0...............b$..........T.......8...........T...............D...........,...........................................................................................eJ..............GenuineIntel............T...........E..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8260
                                                    Entropy (8bit):3.6880040100876146
                                                    Encrypted:false
                                                    SSDEEP:192:R6l7wVeJiCw6RR6YEIySU955gmfBWbizFpDy89bs/RsfbEm:R6lXJ26n6YEdSU955gmf8Wzbs/Kf9
                                                    MD5:725829EA971D320A82445618ED5C5923
                                                    SHA1:72CEDB71C794DE62732ECB962D20223FB5EBB9D7
                                                    SHA-256:2D4B0DD90CDDAC2C9B5DEF76DB34C42E180E1F3D8DED892C9C7F72E02568D5E0
                                                    SHA-512:BFB70B663AE1491668ED101C99630D904992784F52D3A9D4E0059460A5B326FB060A79D5FBA648D37289185BA9399555FE9E7CB42C7D66BA1CDD8A27484534CD
                                                    Malicious:false
                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.1.3.2.<./.P.i.
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4537
                                                    Entropy (8bit):4.425967680517592
                                                    Encrypted:false
                                                    SSDEEP:48:cvIwWl8zshJg77aI9LgWpW8VYGYm8M4JNtFxV+q8+NSfh8y5d:uIjfzI71Z7VuJdYfh95d
                                                    MD5:18E0016373781FC08FC963AB4BE952EF
                                                    SHA1:7E6189C0CC51AA7214C816A4ECFB57C2161E1E17
                                                    SHA-256:4332DBCF0CE0468797A69F0C963668B3AD79018040E7EB63349CAC1ED7390D43
                                                    SHA-512:810868773E1233D989827852C1191CA67E789299EF51E95A6B3C8CA11E23BF4C1A764B80D851F97D6F408E39355BC09C69551029378586DA168DDB3D0AEBF11E
                                                    Malicious:false
                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="393462" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):2459136
                                                    Entropy (8bit):6.052474106868353
                                                    Encrypted:false
                                                    SSDEEP:49152:WHoJ9zGioiMjW2RrL9B8SSpiCH7cuez9A:WHoJBGqabRnj8JY/9
                                                    MD5:90E744829865D57082A7F452EDC90DE5
                                                    SHA1:833B178775F39675FA4E55EAB1032353514E1052
                                                    SHA-256:036A57102385D7F0D7B2DEACF932C1C372AE30D924365B7A88F8A26657DD7550
                                                    SHA-512:0A2D112FF7CB806A74F5EC17FE097D28107BB497D6ED5AD28EA47E6795434BA903CDB49AAF97A9A99C08CD0411F1969CAD93031246DC107C26606A898E570323
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Joe Sandbox View:
                                                    • Filename: file.exe, Detection: malicious, Browse
                                                    • Filename: pDHKarOK2v.exe, Detection: malicious, Browse
                                                    • Filename: 1719859269.0326595_setup.exe, Detection: malicious, Browse
                                                    • Filename: zyJWi2vy29.exe, Detection: malicious, Browse
                                                    • Filename: 56bDgH9sMQ.exe, Detection: malicious, Browse
                                                    • Filename: vjYcExA6ou.exe, Detection: malicious, Browse
                                                    • Filename: 2E7ZdlxkOL.exe, Detection: malicious, Browse
                                                    • Filename: S8co1ACRdn.exe, Detection: malicious, Browse
                                                    • Filename: M9dfZzH3qn.exe, Detection: malicious, Browse
                                                    • Filename: 5IRIk4f1PO.exe, Detection: malicious, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........7.Z.Y.Z.Y.Z.Y...Z.n.Y...\..Y...]...Y...X.Y.Y.Z.X..Y.O.\.E.Y.O.].U.Y.O.Z.L.Y.l3].[.Y.l3Y.[.Y.l3..[.Y.l3[.[.Y.RichZ.Y.................PE..L...i.`e...........!...%.. .........{D........ ...............................%...........@...........................#..6....$.(.....$.......................$.....`.#.8...........................x.#.@.............$..............................text...G. ....... ................. ..`.rdata...".... ..$.... .............@..@.data...4|... $..b....#.............@....idata........$......^$.............@..@.00cfg........$......p$.............@..@.rsrc.........$......r$.............@..@.reloc..5.....$.......$.............@..B................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:MS Windows registry file, NT/2000 or above
                                                    Category:dropped
                                                    Size (bytes):1835008
                                                    Entropy (8bit):4.4213212996406455
                                                    Encrypted:false
                                                    SSDEEP:6144:NSvfpi6ceLP/9skLmb0OT+WSPHaJG8nAgeMZMMhA2fX4WABlEnN20uhiTw:0vloT+W+EZMM6DFy403w
                                                    MD5:2BC1F7B211A0DCFFEBFA04B27A55B639
                                                    SHA1:7040A99F1ECFB0F77F450562191B031674BFADE2
                                                    SHA-256:EFA30DC27BB45F5FA25D0CB5C393FA685B13E3FF0A8149B7F340F204958231A2
                                                    SHA-512:3600BED193785AB10A7E63389D42F2EC7DF5CA888FA1CC06848168910748DB3FE3D16B4F54FA2F0C81EFEC88901B41E4798C15A77259A657AB31AA9DFFED7C06
                                                    Malicious:false
                                                    Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmN`9.................................................................................................................................................................................................................................................................................................................................................ef/.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):7.16709868413272
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:file.exe
                                                    File size:863'744 bytes
                                                    MD5:e3e6cf9bb53c398d2f75398923f91c11
                                                    SHA1:9af3600fd9befae3aa830e80d9fb2f513c100ab4
                                                    SHA256:eb55557a69adf16683fbc5f5fd822d8c3e338298a98e0769bdec8a7c5787a75d
                                                    SHA512:75d0c835d0777d144c7cc716e468b2424568a3e281e5acf4011c292598af4b5e0f2a0569ac35f9a3819937a8c33c0119633e215f80b903fb195e878c1269a74f
                                                    SSDEEP:24576:Cl1oXdQCg30l6InUuV5731ALRnpCNeTYeV:sDEkInUuVBkpCNcYA
                                                    TLSH:0505AE1135C0803AD77321320AA8F6B68ABEF5741B286ADF17D85A7E9F346C15B3125F
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........~...-...-...-\..,...-\..,&..-\..,...-Mb.,...-Mb.,...-\..,...-...-...-Mb.,...-|a.,...-|a.,...-|a.-...-|a.,...-Rich...-.......
                                                    Icon Hash:00928e8e8686b000
                                                    Entrypoint:0x42c36a
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x6683FC77 [Tue Jul 2 13:11:19 2024 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:6
                                                    OS Version Minor:0
                                                    File Version Major:6
                                                    File Version Minor:0
                                                    Subsystem Version Major:6
                                                    Subsystem Version Minor:0
                                                    Import Hash:a2b3c9bb8bf21aa189ddce7cb05111e0
                                                    Instruction
                                                    call 00007F3E71342677h
                                                    jmp 00007F3E713419ECh
                                                    cmp ecx, dword ptr [0049A040h]
                                                    jne 00007F3E71341BD3h
                                                    ret
                                                    jmp 00007F3E71342A2Fh
                                                    jmp 00007F3E71342D14h
                                                    push ebp
                                                    mov ebp, esp
                                                    jmp 00007F3E71341BDFh
                                                    push dword ptr [ebp+08h]
                                                    call 00007F3E7137D415h
                                                    pop ecx
                                                    test eax, eax
                                                    je 00007F3E71341BE1h
                                                    push dword ptr [ebp+08h]
                                                    call 00007F3E7136E0F5h
                                                    pop ecx
                                                    test eax, eax
                                                    je 00007F3E71341BB8h
                                                    pop ebp
                                                    ret
                                                    cmp dword ptr [ebp+08h], FFFFFFFFh
                                                    je 00007F3E71342D0Ch
                                                    jmp 00007F3E71342CE9h
                                                    push ebp
                                                    mov ebp, esp
                                                    push dword ptr [ebp+08h]
                                                    call 00007F3E71342CD9h
                                                    pop ecx
                                                    pop ebp
                                                    ret
                                                    mov dword ptr [ecx], 0048A520h
                                                    ret
                                                    push ebp
                                                    mov ebp, esp
                                                    test byte ptr [ebp+08h], 00000001h
                                                    push esi
                                                    mov esi, ecx
                                                    mov dword ptr [esi], 0048A520h
                                                    je 00007F3E71341BDCh
                                                    push 0000000Ch
                                                    push esi
                                                    call 00007F3E71341BA6h
                                                    pop ecx
                                                    pop ecx
                                                    mov eax, esi
                                                    pop esi
                                                    pop ebp
                                                    retn 0004h
                                                    push ebp
                                                    mov ebp, esp
                                                    mov eax, dword ptr [ebp+08h]
                                                    push esi
                                                    mov ecx, dword ptr [eax+3Ch]
                                                    add ecx, eax
                                                    movzx eax, word ptr [ecx+14h]
                                                    lea edx, dword ptr [ecx+18h]
                                                    add edx, eax
                                                    movzx eax, word ptr [ecx+06h]
                                                    imul esi, eax, 28h
                                                    add esi, edx
                                                    cmp edx, esi
                                                    je 00007F3E71341BEBh
                                                    mov ecx, dword ptr [ebp+0Ch]
                                                    cmp ecx, dword ptr [edx+0Ch]
                                                    jc 00007F3E71341BDCh
                                                    mov eax, dword ptr [edx+08h]
                                                    add eax, dword ptr [edx+0Ch]
                                                    cmp ecx, eax
                                                    jc 00007F3E71341BDEh
                                                    add edx, 28h
                                                    cmp edx, esi
                                                    jne 00007F3E71341BBCh
                                                    xor eax, eax
                                                    pop esi
                                                    pop ebp
                                                    ret
                                                    mov eax, edx
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x98d600x48.rdata
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x98da80x50.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xd20000x1e0.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xd30000x4abc.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x929500x54.rdata
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x928900x40.rdata
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x880000x20c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x855e70x85600c250debd6068ef1a7c921e73181cfa2eFalse0.41276834875820057data6.666076982015016IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .bss0x870000xf7d0x1000f3a47c3349515baee64657bb8147a892False0.629638671875data6.3506167437003445IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x880000x11a100x11c0014acba9e565d481335e6ba0ae41b24b3False0.3752475792253521data4.851073901041092IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0x9a0000x372700x35a00ffbe02982d67e696f6cbb12538bd444bFalse0.9733983464452215data7.976991516797524IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0xd20000x1e00x200d8a8736d599d5775f0aa4e84f3b1f63cFalse0.525390625data4.69492069540085IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0xd30000x4abc0x4c007d3fb59ba21a0846bc5cf4539ec02a97False0.7359169407894737data6.618161361005907IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_MANIFEST0xd20600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                                    DLLImport
                                                    GDI32.dllSetPixel
                                                    USER32.dllGetDC, OffsetRect, ReleaseDC, GetUpdateRgn
                                                    KERNEL32.dllCreateFileW, HeapSize, GetProcessHeap, SetStdHandle, SetEnvironmentVariableW, VirtualAlloc, WaitForSingleObject, CreateThread, FormatMessageA, WideCharToMultiByte, GetCurrentThreadId, CloseHandle, WaitForSingleObjectEx, Sleep, SwitchToThread, GetExitCodeThread, GetNativeSystemInfo, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, EncodePointer, DecodePointer, LocalFree, GetLocaleInfoEx, MultiByteToWideChar, LCMapStringEx, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, WakeConditionVariable, WakeAllConditionVariable, SleepConditionVariableSRW, QueryPerformanceCounter, QueryPerformanceFrequency, SetFileInformationByHandle, GetTempPathW, InitOnceExecuteOnce, CreateEventExW, CreateSemaphoreExW, FlushProcessWriteBuffers, GetCurrentProcessorNumber, GetSystemTimeAsFileTime, GetTickCount64, FreeLibraryWhenCallbackReturns, CreateThreadpoolTimer, SetThreadpoolTimer, WaitForThreadpoolTimerCallbacks, CloseThreadpoolTimer, CreateThreadpoolWait, SetThreadpoolWait, CloseThreadpoolWait, GetModuleHandleW, GetProcAddress, GetFileInformationByHandleEx, CreateSymbolicLinkW, GetStringTypeW, CompareStringEx, GetCPInfo, IsProcessorFeaturePresent, GetCurrentProcessId, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetCurrentProcess, TerminateProcess, FreeEnvironmentStringsW, RaiseException, RtlUnwind, InterlockedPushEntrySList, InterlockedFlushSList, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetModuleHandleExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetCommandLineA, GetCommandLineW, HeapAlloc, HeapFree, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, GetCurrentThread, SetConsoleCtrlHandler, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, GetFileSizeEx, SetFilePointerEx, ReadConsoleW, HeapReAlloc, GetTimeZoneInformation, OutputDebugStringW, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, WriteConsoleW
                                                    NameOrdinalAddress
                                                    AwakeSound10x487d60
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishUnited States
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jul 2, 2024 16:40:09.699599981 CEST49725443192.168.2.5149.154.167.99
                                                    Jul 2, 2024 16:40:09.699632883 CEST44349725149.154.167.99192.168.2.5
                                                    Jul 2, 2024 16:40:09.699707031 CEST49725443192.168.2.5149.154.167.99
                                                    Jul 2, 2024 16:40:09.704210997 CEST49725443192.168.2.5149.154.167.99
                                                    Jul 2, 2024 16:40:09.704241991 CEST44349725149.154.167.99192.168.2.5
                                                    Jul 2, 2024 16:40:10.332807064 CEST44349725149.154.167.99192.168.2.5
                                                    Jul 2, 2024 16:40:10.332902908 CEST49725443192.168.2.5149.154.167.99
                                                    Jul 2, 2024 16:40:10.404225111 CEST49725443192.168.2.5149.154.167.99
                                                    Jul 2, 2024 16:40:10.404253006 CEST44349725149.154.167.99192.168.2.5
                                                    Jul 2, 2024 16:40:10.404644012 CEST44349725149.154.167.99192.168.2.5
                                                    Jul 2, 2024 16:40:10.404704094 CEST49725443192.168.2.5149.154.167.99
                                                    Jul 2, 2024 16:40:10.407011986 CEST49725443192.168.2.5149.154.167.99
                                                    Jul 2, 2024 16:40:10.452496052 CEST44349725149.154.167.99192.168.2.5
                                                    Jul 2, 2024 16:40:10.646045923 CEST44349725149.154.167.99192.168.2.5
                                                    Jul 2, 2024 16:40:10.646075964 CEST44349725149.154.167.99192.168.2.5
                                                    Jul 2, 2024 16:40:10.646122932 CEST44349725149.154.167.99192.168.2.5
                                                    Jul 2, 2024 16:40:10.646157980 CEST44349725149.154.167.99192.168.2.5
                                                    Jul 2, 2024 16:40:10.646269083 CEST49725443192.168.2.5149.154.167.99
                                                    Jul 2, 2024 16:40:10.646269083 CEST49725443192.168.2.5149.154.167.99
                                                    Jul 2, 2024 16:40:10.646269083 CEST49725443192.168.2.5149.154.167.99
                                                    Jul 2, 2024 16:40:10.648762941 CEST49725443192.168.2.5149.154.167.99
                                                    Jul 2, 2024 16:40:10.648786068 CEST44349725149.154.167.99192.168.2.5
                                                    Jul 2, 2024 16:40:10.654565096 CEST497269000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:10.659354925 CEST90004972649.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:10.659450054 CEST497269000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:10.659738064 CEST497269000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:10.664472103 CEST90004972649.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:11.320254087 CEST90004972649.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:11.320276976 CEST90004972649.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:11.320348024 CEST497269000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:11.320378065 CEST497269000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:11.402357101 CEST497269000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:11.407732964 CEST90004972649.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:11.593226910 CEST90004972649.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:11.593348980 CEST497269000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:11.593797922 CEST497269000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:11.598542929 CEST90004972649.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:12.036896944 CEST90004972649.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:12.036983967 CEST497269000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:12.041028976 CEST497279000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:12.049303055 CEST90004972749.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:12.049463034 CEST497279000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:12.050192118 CEST497279000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:12.056561947 CEST90004972749.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:12.727369070 CEST90004972749.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:12.727544069 CEST497279000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:12.728154898 CEST497279000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:12.729974031 CEST497279000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:12.732912064 CEST90004972749.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:12.734755039 CEST90004972749.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:13.385672092 CEST90004972749.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:13.385745049 CEST497279000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:13.387820005 CEST497269000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:13.388223886 CEST497299000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:13.392903090 CEST90004972649.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:13.392976999 CEST497269000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:13.393073082 CEST90004972949.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:13.393137932 CEST497299000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:13.393412113 CEST497299000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:13.398179054 CEST90004972949.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:14.038003922 CEST90004972949.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:14.038079977 CEST497299000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:14.038625002 CEST497299000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:14.042316914 CEST497299000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:14.043368101 CEST90004972949.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:14.047344923 CEST90004972949.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:14.697382927 CEST90004972949.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:14.697401047 CEST90004972949.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:14.697519064 CEST497299000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:14.698936939 CEST497279000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:14.699383020 CEST497319000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:14.704186916 CEST90004972749.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:14.704200029 CEST90004973149.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:14.704238892 CEST497279000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:14.704302073 CEST497319000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:14.704586983 CEST497319000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:14.709835052 CEST90004973149.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:15.367093086 CEST90004973149.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:15.367223024 CEST497319000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:15.367558956 CEST497319000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:15.369354010 CEST497319000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:15.372296095 CEST90004973149.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:15.374128103 CEST90004973149.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:16.017729998 CEST90004973149.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:16.017749071 CEST90004973149.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:16.017761946 CEST90004973149.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:16.017812014 CEST90004973149.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:16.017818928 CEST497319000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:16.017818928 CEST497319000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:16.017822981 CEST90004973149.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:16.017837048 CEST90004973149.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:16.017885923 CEST497319000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:16.017885923 CEST497319000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:16.020040989 CEST497299000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:16.020719051 CEST497329000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:16.025240898 CEST90004972949.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:16.025290012 CEST497299000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:16.025500059 CEST90004973249.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:16.025557041 CEST497329000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:16.025953054 CEST497329000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:16.030716896 CEST90004973249.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:16.698698997 CEST90004973249.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:16.698781013 CEST497329000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:16.699141979 CEST497329000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:16.701301098 CEST497329000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:16.703912020 CEST90004973249.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:16.708321095 CEST90004973249.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:17.347127914 CEST90004973249.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:17.347246885 CEST497329000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:17.409234047 CEST497319000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:17.409569025 CEST497339000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:17.414302111 CEST90004973149.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:17.414345026 CEST90004973349.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:17.414367914 CEST497319000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:17.414429903 CEST497339000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:17.414830923 CEST497339000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:17.419944048 CEST90004973349.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:18.067476034 CEST90004973349.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:18.067554951 CEST497339000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:18.068348885 CEST497339000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:18.070466042 CEST497339000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:18.070552111 CEST497339000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:18.070552111 CEST497339000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:18.074280977 CEST90004973349.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:18.075504065 CEST90004973349.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:18.075514078 CEST90004973349.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:18.075531960 CEST90004973349.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:18.075545073 CEST90004973349.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:18.075571060 CEST90004973349.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:18.075582027 CEST90004973349.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:18.078275919 CEST90004973349.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:18.078301907 CEST90004973349.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:18.405287027 CEST497329000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:18.405741930 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:18.410725117 CEST90004973249.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:18.410845041 CEST497329000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:18.411413908 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:18.411493063 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:18.411803007 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:18.416594982 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:18.791114092 CEST90004973349.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:18.791215897 CEST497339000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.067728996 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.067856073 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.068288088 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.070054054 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.073348045 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.074776888 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.404460907 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.404524088 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.404536009 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.404567003 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.404578924 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.404638052 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.404638052 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.404691935 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.404717922 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.404742002 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.404748917 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.404748917 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.404756069 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.404768944 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.404772997 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.404803038 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.404803038 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.404829979 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.404968023 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.405021906 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.409571886 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.409611940 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.409658909 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.409658909 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.409687042 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.409770012 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.496953011 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.496973038 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.497138977 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.502351046 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.502403975 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.502415895 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.502454042 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.502454042 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.502496958 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.505872965 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.505903959 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.505916119 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.505935907 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.505950928 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.505965948 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.512842894 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.512919903 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.512931108 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.512943983 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.513000011 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.519639969 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.519668102 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.519680977 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.519697905 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.519722939 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.526361942 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.526453018 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.526464939 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.526480913 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.526494980 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.526561975 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.531496048 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.533202887 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.533226967 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.533241987 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.533287048 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.533288002 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.533288002 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.533340931 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.539999008 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.540047884 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.540059090 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.540083885 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.540083885 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.540173054 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.546940088 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.546997070 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.547008991 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.547009945 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.547049046 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.547049046 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.553738117 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.553836107 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.553845882 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.553878069 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.553878069 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.553946018 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.560760021 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.560775042 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.560839891 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.560839891 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.593645096 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.593677044 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.593689919 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.593703032 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.593729973 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.593729973 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.593760967 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.602375031 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.602411985 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.602422953 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.602469921 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.602469921 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.615869999 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.615917921 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.615935087 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.616025925 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.616025925 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.640351057 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.640495062 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.640507936 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.640508890 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.640561104 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.640561104 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.664669991 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.664690971 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.664702892 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.664715052 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.664803028 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.664881945 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.664916992 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.664925098 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.664925098 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.664927959 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.664972067 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.664972067 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.665572882 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.665689945 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.665703058 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.665731907 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.665733099 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.665951014 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.666209936 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.666260958 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.666270971 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.666297913 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.666297913 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.666333914 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.666373014 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.666373014 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.666409016 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.666502953 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.666544914 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.666548014 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.666548014 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.667184114 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.667232037 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.667232037 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.667280912 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.667290926 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.667361021 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.667372942 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.667385101 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.667397022 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.667404890 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.667404890 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.667999029 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.668040991 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.668050051 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.668050051 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.668055058 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.668102980 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.668102980 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.670089006 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.670121908 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.670133114 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.670169115 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.670169115 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.674829960 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.674868107 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.674881935 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.674937963 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.674937963 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.679758072 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.679800034 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.679816961 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.679867029 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.679867029 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.684937000 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.684984922 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.684997082 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.685009003 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.685241938 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.689887047 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.689943075 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.689986944 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.689987898 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.689996004 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.690009117 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.690057039 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.690057993 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.695569992 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.695585012 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.695596933 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.695607901 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.695683002 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.695683002 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.699785948 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.699815035 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.699831963 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.699889898 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.699889898 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.704667091 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.704732895 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.704742908 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.704754114 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.704761982 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.704786062 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.704786062 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.704843044 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.707783937 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.707854986 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.707866907 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.707876921 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.707892895 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.707911968 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.707911968 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.707954884 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.711570024 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.711613894 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.711625099 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.711653948 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.711653948 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.711688042 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.714250088 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.714289904 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.714303017 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.714335918 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.714335918 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.717400074 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.717420101 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.717442036 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.717454910 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.717499018 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.718024969 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.730930090 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.730969906 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.730983019 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.731024981 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.731295109 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.755594969 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.755660057 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.755671024 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.755752087 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.755752087 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.755754948 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.755767107 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.755810022 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.755903006 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.755913973 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.756010056 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.756020069 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.756061077 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.756061077 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.756673098 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.756730080 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.756795883 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.756841898 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.764226913 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.764288902 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.764292955 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.764305115 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.764338970 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.764354944 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.764396906 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.765775919 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.765849113 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.765862942 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.765894890 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.765894890 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.767683029 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.767739058 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.767739058 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.767750978 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.767795086 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.770781994 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.770852089 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.770853996 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.770863056 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.770889044 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.770900965 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.770930052 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.770930052 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.773525953 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.773571968 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.773587942 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.773627996 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.773669004 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.773669004 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.773691893 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.773880959 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.776382923 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.776453972 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.776464939 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.776496887 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.776496887 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.779192924 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.779244900 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.779249907 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.779267073 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.779309034 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.779309034 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.782027006 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.782079935 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.782093048 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.782107115 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.782206059 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.784778118 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.784830093 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.784873009 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.784885883 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.784903049 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.784903049 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.785003901 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.788945913 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.789000034 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.789011002 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.789024115 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.789068937 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.789068937 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.791220903 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.791268110 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.791279078 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.791284084 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.791371107 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.792519093 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.792568922 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.792581081 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.792587042 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.792627096 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.795113087 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.795160055 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.795170069 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.795205116 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.795205116 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.797547102 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.797624111 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.797637939 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.797646046 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.797674894 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.797688007 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.797688007 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.797756910 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.800123930 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.800182104 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.800194025 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.800195932 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.800225973 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.802521944 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.802568913 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.802581072 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.802592039 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.802634954 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.804599047 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.804696083 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.804706097 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.804738998 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.804738998 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.806577921 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.806608915 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.806618929 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.806642056 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.806664944 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.806698084 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.806698084 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.808538914 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.808552980 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.808604002 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.808617115 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.808640003 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.808640003 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.808760881 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.810523987 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.810560942 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.810575008 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.810579062 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.810592890 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.810615063 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.810615063 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.810714960 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.812370062 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.812417030 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.812427998 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.812432051 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.812465906 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.812489986 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.814263105 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.814277887 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.814291000 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.814321041 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.814332008 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.814332008 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.814481974 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.816036940 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.816121101 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.816133022 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.816143036 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.816145897 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.816174030 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.816214085 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.817959070 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.817995071 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.818011045 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.818034887 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.818034887 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.818087101 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.819792032 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.819827080 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.819840908 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.819863081 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.819863081 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.819924116 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.821573973 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.821651936 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.821757078 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.821769953 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.821825027 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.823518991 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.823550940 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.823563099 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.823571920 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.823642015 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.825110912 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.825154066 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.825165033 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.825220108 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.825237989 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.826895952 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.826940060 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.826947927 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.826951981 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.826989889 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.826989889 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.828773022 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.828828096 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.828831911 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.828839064 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.828872919 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.828877926 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.828877926 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.829040051 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.830388069 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.830452919 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.830480099 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.830492020 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.830522060 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.832262993 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.832323074 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.832333088 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.832351923 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.832489967 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.833863974 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.833911896 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.833913088 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.833924055 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.834009886 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.835604906 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.835669994 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.835679054 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.835680962 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.835692883 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.835735083 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.835735083 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.837425947 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.837472916 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.837495089 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.837507010 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.837538958 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.839257956 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.839322090 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.839334011 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.839343071 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.839376926 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.839376926 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.840960026 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.841017008 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.841027975 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.841047049 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.841233015 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.842716932 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.842777014 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.842778921 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.842822075 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.846084118 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.846164942 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.846179962 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.846205950 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.846205950 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.846241951 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.846299887 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.846332073 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.846348047 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.846364975 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.846365929 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.846365929 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.846400976 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.846400976 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.847981930 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.848026991 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.848042011 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.848059893 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.848066092 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.848067045 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.848095894 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.848095894 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.849735022 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.849786997 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.849805117 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.849816084 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.849827051 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.849827051 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.849858999 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.849858999 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.851505041 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.851545095 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.851597071 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.851597071 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.854891062 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.854932070 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.854960918 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.854969025 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.854983091 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.855005980 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.855005980 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.855025053 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.855129004 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.855191946 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.855318069 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.856494904 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.856530905 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.856553078 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.856600046 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.856846094 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.856884956 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.856897116 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.856904030 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.856940985 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.856969118 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.858597994 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.858633041 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.858649969 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.858668089 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.858697891 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.858697891 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.860342979 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.860393047 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.860402107 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.860425949 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.860426903 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.860455036 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.860629082 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.860820055 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.862157106 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.862200022 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.862210989 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.862210989 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.862250090 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.862294912 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.864314079 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.864357948 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.864373922 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.864379883 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.864418030 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.864418030 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.867212057 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.867223978 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.867238045 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.867290974 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.867290974 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.869730949 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.869782925 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.869784117 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.869793892 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.869843006 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.869847059 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.869883060 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.869911909 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.869923115 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.869955063 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.875350952 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.875392914 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.875403881 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.875417948 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.875478029 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.875499010 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.875511885 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.875524044 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.875536919 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.875560045 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.875560045 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.875612974 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.875727892 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.875885963 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.881742954 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.881815910 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.881834984 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.881859064 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.881861925 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.881906033 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.881922007 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.881930113 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.881934881 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.881990910 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.881990910 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.882004023 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.882201910 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.888175011 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.888231993 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.888238907 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.888251066 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.888319016 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.888333082 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.888335943 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.888372898 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.888457060 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.888469934 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.888487101 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.888521910 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.888521910 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.894052029 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.894119024 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.894130945 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.894155979 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.894184113 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.894184113 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.894193888 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.894224882 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.894224882 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.894378901 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.894406080 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.894422054 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.894435883 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.894444942 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.894444942 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.894459009 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.894474030 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.900363922 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.900425911 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.900439978 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.900499105 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.900506020 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.900512934 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.900541067 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.900635958 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.900649071 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.900651932 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.900660992 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.900697947 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.900775909 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.904901028 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.904916048 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.904932022 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.904997110 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.905014992 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.905025005 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.905026913 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.905035973 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.905035973 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.905141115 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.905179977 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.905191898 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.905237913 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.910375118 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.910413980 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.910427094 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.910486937 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.910486937 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.910602093 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.910617113 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.910686970 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.910702944 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.910713911 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.910725117 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.910753012 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.910797119 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.915761948 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.915779114 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.915791988 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.915843964 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.915844917 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.915846109 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.915915012 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.915935040 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.915981054 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.915990114 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.916002035 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.916052103 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.916052103 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.916069984 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.916124105 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.919214964 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.919255972 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.919266939 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.919290066 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.919312954 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.919441938 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.919452906 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.919487953 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.919498920 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.919523001 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.919523001 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.919569016 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.919569969 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.919580936 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.919703007 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.924433947 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.924503088 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.924520969 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.924539089 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.924588919 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.924626112 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.924638987 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.924674034 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.924701929 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.924719095 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.924763918 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.924796104 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.924850941 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.929802895 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.929837942 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.929847956 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.929869890 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.929897070 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.929897070 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.929943085 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.929955006 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.929991007 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.930077076 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.930088997 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.930099964 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.930145025 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.930145025 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.936858892 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.936875105 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.936887026 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.936949015 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.936949015 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.936960936 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.937017918 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.937020063 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.937096119 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.937110901 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.937120914 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.937134981 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.937135935 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.937175035 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.940386057 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.940429926 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.940440893 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.940448999 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.940470934 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.940507889 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.940572977 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.940586090 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.940633059 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.940633059 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.940686941 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.940700054 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.940943003 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.945278883 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.945337057 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.945349932 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.945353031 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.945377111 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.945399046 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.945446968 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.945462942 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.945506096 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.945506096 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.945537090 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.945575953 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.945580006 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.945689917 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.949182987 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.949235916 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.949246883 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.949259043 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.949300051 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.949326038 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.949368000 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.949414968 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.949425936 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.949461937 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.949474096 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.949496984 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.949496984 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.949604988 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.954761982 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.954835892 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.954847097 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.954854012 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.954874039 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.954914093 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.954960108 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.954971075 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.954998970 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.955018044 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.955066919 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.955079079 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.955111980 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.955146074 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.960412025 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.960437059 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.960510015 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.960510015 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.960527897 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.960542917 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.960577011 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.960597992 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.960617065 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.960628986 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.960676908 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.960676908 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.960746050 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.960757017 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.960792065 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.960809946 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.965955019 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.965995073 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.966006994 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.966049910 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.966049910 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.966074944 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.966087103 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.966099024 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.966145992 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.966145992 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.966236115 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.966275930 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.966314077 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.966314077 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.984976053 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.984999895 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.985012054 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.985065937 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.985097885 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.985117912 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.985168934 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.985182047 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.985193014 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.985208035 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.985208035 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.985234022 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.985399961 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.985444069 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.985457897 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.985469103 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.985482931 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.985482931 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.985501051 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.985685110 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.985696077 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.985707045 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.985759020 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.985759020 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.995465040 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.995547056 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.995557070 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.995563984 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.995604038 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.995615959 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.995625019 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.995657921 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.995749950 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.995760918 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.995771885 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:19.995771885 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.995816946 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:19.995816946 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.001137972 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.001180887 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.001188040 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.001194000 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.001234055 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.001234055 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.001334906 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.001348019 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.001415968 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.001466036 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.001502991 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.001514912 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.001522064 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.001528978 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.001540899 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.001542091 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.001573086 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.001573086 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.001770973 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.001818895 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.001863003 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.001877069 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.001919985 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.001919985 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.001977921 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.002038002 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.006954908 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.007051945 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.007062912 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.007096052 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.007137060 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.007215023 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.007216930 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.007226944 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.007252932 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.007273912 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.007297039 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.007334948 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.009967089 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.009999990 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.010011911 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.010019064 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.010052919 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.010052919 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.010272026 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.010286093 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.010320902 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.010345936 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.010354996 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.010368109 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.010402918 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.010482073 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.015028954 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.015083075 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.015089989 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.015095949 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.015132904 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.015132904 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.015152931 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.015228033 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.015234947 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.015286922 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.015296936 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.015304089 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.015309095 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.015336990 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.015381098 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.020411015 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.020452976 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.020463943 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.020490885 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.020490885 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.020512104 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.020533085 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.020601034 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.020642996 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.020642996 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.020687103 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.020699024 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.020709038 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.020730972 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.020776987 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.027520895 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.027556896 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.027570009 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.027574062 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.027614117 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.027614117 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.027793884 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.027837992 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.027849913 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.027867079 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.027880907 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.027909994 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.027909994 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.027961969 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.031734943 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.031805992 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.031816959 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.031846046 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.031846046 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.031917095 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.031924009 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.031979084 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.031982899 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.031996012 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.032035112 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.032035112 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.032088995 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.032126904 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.035943985 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.035970926 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.035983086 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.036021948 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.036021948 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.036077023 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.036124945 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.036139965 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.036159039 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.036200047 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.036200047 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.036230087 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.036341906 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.039944887 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.040013075 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.040024996 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.040049076 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.040049076 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.040050983 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.040091038 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.040091038 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.040146112 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.040158987 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.040199995 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.040199995 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.040221930 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.040281057 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.045736074 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.045809984 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.045820951 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.045847893 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.045847893 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.045943022 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.045958996 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.045970917 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.045984030 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.045995951 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.046014071 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.046014071 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.046066046 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.053307056 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.053358078 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.053380013 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.053391933 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.053423882 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.053441048 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.053441048 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.053520918 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.053522110 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.053534985 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.053566933 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.053622007 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.053643942 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.053664923 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.053694963 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.053715944 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.056545973 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.056596994 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.056608915 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.056624889 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.056648970 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.056653023 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.056653023 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.056704998 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.056941032 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.056956053 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.056968927 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.056981087 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.057009935 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.057009935 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.057045937 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.075310946 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.075335979 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.075349092 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.075401068 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.075495958 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.075509071 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.075520039 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.075540066 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.075668097 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.075696945 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.075709105 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.075758934 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.075802088 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.075813055 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.075824022 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.075879097 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.075879097 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.075989008 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.076000929 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.076011896 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.076054096 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.076071978 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.086369038 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.086430073 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.086441994 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.086477041 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.086477041 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.086535931 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.086616993 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.086656094 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.086668015 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.086709023 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.086730957 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.086786032 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.091583967 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.091607094 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.091638088 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.091677904 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.091682911 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.091748953 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.091758013 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.091770887 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.091798067 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.091818094 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.091886044 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.091898918 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.091948986 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.091948986 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.092255116 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.092266083 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.092277050 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.092288971 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.092300892 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.092314005 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.092344999 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.092344999 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.092350006 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.092453957 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.092617989 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.092643023 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.092663050 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.092789888 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.097011089 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.097052097 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.097064972 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.097079992 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.097156048 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.097176075 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.097215891 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.097222090 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.097266912 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.097280025 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.097286940 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.097313881 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.097346067 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.100532055 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.100547075 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.100558996 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.100594997 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.100594997 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.100645065 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.100656986 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.100668907 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.100689888 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.100754976 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.100855112 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.100886106 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.100914955 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.100944996 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.105635881 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.105665922 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.105696917 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.105740070 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.105751991 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.105775118 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.105803967 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.105842113 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.105842113 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.105882883 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.105895042 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.105923891 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.105942965 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.106040955 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.118315935 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.118370056 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.118383884 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.118397951 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.118429899 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.118565083 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.118578911 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.118590117 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.118597031 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.118602991 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.118650913 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.118650913 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.118813038 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.118824005 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.118837118 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.118865967 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.118951082 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.118962049 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.118976116 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.118987083 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.119004965 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.119004965 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.119033098 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.126678944 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.126713991 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.126724958 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.126771927 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.126771927 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.126825094 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.126868010 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.126899958 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.126914024 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.126924992 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.126935959 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.126949072 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.126987934 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.126988888 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.127166033 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.127177000 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.127196074 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.127238035 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.127238035 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.127367020 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.127377987 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.127389908 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.127434015 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.127489090 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.130467892 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.130538940 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.130552053 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.130570889 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.130601883 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.130601883 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.130635977 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.130649090 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.130702019 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.130702019 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.130753040 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.130814075 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.130850077 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.130897045 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.136212111 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.136254072 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.136265039 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.136272907 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.136293888 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.136312962 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.136353970 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.136367083 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.136388063 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.136404037 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.136476040 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.136497021 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.136533022 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.136636972 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.136662960 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.136831045 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.144002914 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.144059896 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.144073009 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.144098997 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.144098997 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.144120932 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.144193888 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.144237041 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.144237995 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.144313097 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.144314051 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.144325018 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.144372940 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.144372940 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.147355080 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.147409916 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.147422075 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.147442102 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.147453070 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.147531986 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.147542953 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.147555113 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.147603989 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.147603989 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.147706032 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.147717953 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.148036957 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.180879116 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.180901051 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.180915117 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.180972099 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.181016922 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.181029081 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.181034088 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.181041956 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.181056976 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.181092978 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.181092978 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.181133032 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.181144953 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.181152105 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.181157112 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.181185961 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.181200981 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.181298971 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.181351900 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.181406021 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.181417942 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.181430101 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.181458950 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.181510925 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.182157040 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.182195902 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.182208061 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.182216883 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.182252884 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.182252884 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.182307005 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.182322025 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.182338953 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.182351112 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.182363987 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.182363987 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.182441950 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.182522058 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.182579994 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.182626009 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.182689905 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.182728052 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.182728052 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.182728052 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.182765961 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.182811022 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.182825089 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.182871103 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.182871103 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.182895899 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.183012962 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.183048964 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.183109999 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.183125973 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.183144093 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.183173895 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.183173895 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.183265924 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.183278084 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.183289051 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.183301926 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.183324099 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.183410883 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.183491945 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.183507919 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.183540106 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.183573961 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.187531948 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.187555075 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.187597990 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.187614918 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.187614918 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.187674999 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.187675953 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.187690020 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.187730074 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.187730074 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.187771082 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.187788963 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.187839031 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.187839031 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.187958002 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.188014984 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.191623926 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.191636086 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.191648006 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.191699028 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.191741943 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.191750050 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.191765070 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.191776991 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.191801071 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.191818953 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.191832066 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.191946030 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.196263075 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.196325064 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.196337938 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.196368933 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.196368933 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.196398973 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.196430922 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.196449995 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.196449995 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.196470976 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.196491003 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.196537971 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.196543932 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.196608067 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.208995104 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.209029913 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.209043026 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.209074974 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.209074974 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.209120035 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.209156990 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.209170103 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.209270954 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.209275961 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.209283113 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.209383965 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.209455013 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.209467888 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.209479094 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.209492922 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.209503889 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.209523916 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.209523916 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.209552050 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.209716082 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.209728956 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.209769964 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.217273951 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.217318058 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.217329979 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.217350960 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.217384100 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.217384100 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.217462063 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.217473984 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.217485905 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.217498064 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.217519045 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.217586994 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.217741966 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.217813015 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.217849970 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.217864990 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.217916965 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.217932940 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.217946053 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.217957020 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.217969894 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.217987061 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.218003035 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.221067905 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.221121073 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.221129894 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.221200943 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.221242905 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.221261024 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.221296072 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.221317053 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.221357107 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.221374989 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.221407890 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.221431971 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.221443892 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.221510887 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.234637976 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.234659910 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.234674931 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.234724998 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.234739065 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.234744072 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.234744072 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.234802961 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.234823942 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.234895945 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.234909058 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.234914064 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.234960079 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.234960079 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.235078096 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.235093117 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.235106945 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.235120058 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.235137939 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.235137939 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.235172033 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.235172033 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.235310078 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.235325098 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.235371113 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.235371113 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.238020897 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.238074064 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.238109112 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.238114119 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.238114119 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.238179922 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.238251925 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.238280058 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.238296032 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.238301039 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.238312960 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.238342047 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.238342047 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.238377094 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.277250051 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277268887 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277286053 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277350903 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277359009 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.277364016 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277376890 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277389050 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277401924 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277416945 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277429104 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277440071 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.277441025 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277440071 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.277455091 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277466059 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277467012 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.277477980 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277489901 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277489901 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.277534962 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.277534962 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.277654886 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277667046 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277678967 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277689934 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277702093 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277713060 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277718067 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.277718067 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.277725935 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277762890 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.277795076 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.277818918 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277831078 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277842045 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277853966 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277867079 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277879953 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277887106 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.277898073 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277899981 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.277911901 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277937889 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277941942 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.277941942 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.277951956 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277966022 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277978897 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.277980089 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.277980089 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.277995110 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.278007984 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.278053999 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.282269955 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.282294989 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.282306910 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.282332897 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.282358885 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.282397032 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.282449007 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.282500029 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.282511950 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.282526016 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.282541037 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.282547951 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.282557964 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.282594919 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.282594919 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.282692909 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.282742023 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.282779932 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.282793999 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.282831907 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.282921076 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.282933950 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.282984972 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.290754080 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.290766954 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.290780067 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.290790081 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.290802956 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.290816069 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.290824890 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.290828943 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.290858984 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.290858984 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.290873051 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.300654888 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.300671101 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.300682068 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.300738096 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.300772905 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.300803900 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.300811052 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.300823927 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.300837040 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.300868034 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.300868034 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.300894022 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.300961971 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.300975084 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.301007032 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.301026106 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.301151991 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.301165104 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.301207066 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.301373005 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.301384926 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.301395893 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.301441908 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.301441908 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.309135914 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.309150934 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.309163094 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.309218884 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.309268951 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.309281111 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.309289932 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.309294939 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.309326887 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.309344053 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.309623957 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.309636116 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.309647083 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.309657097 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.309669018 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.309679031 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.309686899 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.309686899 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.309732914 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.309942007 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.309986115 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.310121059 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.310161114 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.326014042 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.326031923 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.326045036 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.326076984 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.326118946 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.326159000 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.326170921 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.326211929 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.326335907 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.326347113 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.326359034 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.326383114 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.326426029 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.326507092 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.326517105 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.326528072 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.326589108 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.326685905 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.326703072 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.326710939 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.326730967 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.326806068 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.326850891 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.326867104 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.326905966 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.326934099 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.327042103 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.327054977 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.327066898 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.327092886 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.327121973 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.327224970 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.327241898 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.327253103 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.327264071 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.327286959 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.327286959 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.327315092 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.328636885 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.328692913 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.328716040 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.328728914 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.328811884 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.328854084 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.328866959 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.328912020 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.328969955 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.328982115 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.329034090 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.361963987 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.362014055 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.362027884 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.362076044 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.362090111 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.362134933 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.362217903 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.362270117 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.362282038 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.362293005 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.362299919 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.362356901 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.362356901 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.362487078 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.362499952 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.362510920 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.362521887 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.362538099 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.362538099 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.362550020 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.362581015 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.362590075 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.365978003 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.366029024 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.366039038 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.366122961 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.366175890 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.366188049 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.366198063 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.366198063 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.366245031 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.366245031 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.366271973 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.366333008 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.366358995 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.366375923 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.366444111 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.366456032 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.366468906 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.366494894 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.366537094 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.366693020 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.366704941 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.366715908 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.366728067 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.366739988 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.366750002 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.366753101 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.366765976 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.366782904 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.366872072 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.367063999 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.367074966 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.367150068 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.367191076 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.367235899 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.367244005 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.367255926 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.367291927 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.367301941 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.367301941 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.367331982 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.372823954 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.372837067 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.372850895 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.372868061 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.372906923 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.372906923 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.372956991 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.372968912 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.372997999 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.373028040 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.373096943 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.373107910 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.373174906 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.373184919 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.373199940 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.373210907 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.373245955 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.373748064 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.373759031 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.373769999 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.373780966 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.373822927 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.373843908 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.375703096 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.375714064 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.375758886 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.377787113 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.377840042 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.377840996 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.377855062 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.377887011 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.377902031 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.377983093 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.377995014 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.378007889 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.378021002 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.378046989 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.378072977 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.392846107 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.392906904 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.392923117 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.392942905 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.392971992 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.392971992 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.393022060 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.393034935 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.393048048 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.393100977 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.393100977 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.393254995 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.393268108 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.393279076 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.393290997 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.393328905 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.393460035 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.393484116 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.393496990 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.393508911 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.393553019 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.393553019 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.395011902 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.395075083 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.401513100 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.401575089 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.401590109 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.401599884 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.401640892 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.401640892 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.401657104 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.401707888 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.401827097 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.401838064 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.401849985 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.401880026 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.401887894 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.401887894 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.401906967 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.401942968 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.402026892 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.402077913 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.402142048 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.402158976 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.402178049 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.402196884 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.402206898 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.402215004 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.402236938 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.402267933 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.402268887 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.415724993 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.415771961 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.415786028 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.415841103 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.415841103 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.415966034 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.415977955 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.416029930 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.416045904 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.416047096 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.416059017 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.416145086 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.416145086 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.416251898 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.416264057 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.416276932 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.416286945 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.416300058 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.416305065 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.416357040 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.416357994 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.416551113 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.416604042 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.416623116 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.416651964 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.416651964 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.416670084 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.416795015 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.416805983 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.416816950 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.416824102 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.416842937 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.416974068 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.416975975 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.417025089 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.419379950 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.419421911 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.419433117 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.419457912 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.419457912 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.419504881 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.419584036 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.419595957 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.419606924 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.419627905 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.419770002 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.452663898 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.452704906 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.452722073 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.452779055 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.452779055 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.452784061 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.452826977 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.452831030 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.452833891 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.452863932 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.452891111 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.452923059 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.452981949 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.452996016 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.453085899 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.453092098 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.453114033 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.453145981 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.453188896 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.453212023 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.453242064 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.453242064 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.453296900 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.453350067 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.453350067 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.453383923 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.453413010 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.453432083 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.453476906 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.453480005 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.453718901 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.456886053 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.456938982 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.456955910 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.456984043 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.456984043 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.457041025 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.457070112 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.457076073 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.457117081 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.457117081 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.457205057 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.457216978 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.457231998 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.457276106 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.457276106 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.457462072 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.457473993 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.457485914 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.457498074 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.457518101 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.457525015 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.457528114 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.457528114 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.457530022 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.457629919 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.457839966 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.457859039 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.457885027 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.457957029 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.457988977 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.458048105 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.458060980 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.458097935 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.458097935 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.458161116 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.458206892 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.463476896 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.463546038 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.463558912 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.463583946 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.463592052 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.463593006 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.463625908 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.463625908 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.463656902 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.463701963 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.463716984 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.463728905 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.463740110 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.463798046 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.463798046 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.463917971 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.463928938 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.463939905 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.463958025 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.463994980 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.463996887 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.464215040 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.464262962 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.464277029 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.464343071 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.468554020 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.468588114 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.468600035 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.468638897 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.468638897 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.468740940 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.468753099 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.468764067 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.468775988 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.468816042 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.468816042 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.482513905 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.482575893 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.482592106 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.482616901 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.482616901 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.482670069 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.482708931 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.482791901 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.482804060 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.482812881 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.482847929 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.482901096 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.482913017 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.482924938 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.482954025 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.483042002 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.483237982 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.483284950 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.483293056 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.483392000 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.483407021 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.483422041 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.483453035 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.483454943 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.483491898 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.483491898 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.489306927 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.489370108 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.489444017 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.489486933 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.489494085 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.489576101 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.489624977 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.489636898 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.489650011 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.489694118 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.489694118 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.489742041 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.489753008 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.489824057 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.489871979 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.489885092 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.489988089 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.490000010 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.490037918 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.490037918 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.490109921 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.490122080 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.490169048 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.490190983 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.490235090 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.490263939 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.490303040 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.490303040 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.506596088 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.506637096 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.506649017 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.506685019 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.506748915 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.506753922 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.506767035 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.506805897 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.506875038 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.506887913 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.506927013 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.506975889 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.506985903 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.507096052 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.507107019 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.507118940 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.507131100 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.507143021 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.507143021 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.507188082 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.507188082 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.507348061 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.507359982 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.507370949 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.507396936 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.507462025 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.507540941 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.507553101 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.507565975 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.507616043 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.507616043 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.507705927 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.507750034 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.507750988 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.507762909 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.507813931 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.510097980 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.510170937 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.510173082 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.510185003 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.510214090 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.510251045 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.510251045 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.510298967 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.510313034 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.510355949 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.510426998 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.510438919 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.510497093 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.543492079 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.543509960 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.543523073 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.543546915 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.543559074 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.543638945 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.543694019 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.543706894 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.543719053 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.543737888 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.543749094 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.543801069 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.543801069 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.543824911 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.543874979 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.543876886 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.543983936 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.543994904 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.544004917 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.544056892 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.544106007 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.544116974 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.544127941 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.544178963 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.544178963 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.547545910 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.547631979 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.547656059 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.547667027 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.547718048 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.547729015 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.547739983 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.547751904 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.547760963 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.547760963 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.547782898 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.547871113 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.547918081 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.547997952 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.548033953 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.548046112 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.548156977 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.548167944 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.548181057 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.548192978 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.548202991 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.548202991 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.548274994 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.548415899 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.548476934 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.548499107 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.548521042 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.548521042 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.548613071 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.548624992 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.548635960 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.548648119 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.548660040 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.548660040 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.548779011 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.548815966 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.548815966 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.554338932 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.554387093 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.554399014 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.554426908 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.554426908 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.554559946 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.554570913 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.554583073 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.554594040 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.554611921 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.554611921 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.554636955 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.554771900 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.554832935 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.554852962 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.554869890 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.554912090 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.554912090 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.554955959 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.554969072 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.555035114 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.555110931 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.555123091 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.555156946 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.558955908 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.559007883 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.559017897 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.559041977 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.559041977 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.559063911 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.559076071 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.559163094 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.559194088 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.559211016 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.559216976 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.559218884 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.559242964 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.559274912 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.573016882 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.573088884 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.573101997 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.573132992 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.573132992 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.573177099 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.573191881 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.573232889 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.573244095 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.573256969 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.573266983 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.573288918 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.573288918 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.573317051 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.573827028 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.573906898 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.573919058 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.573921919 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.573951006 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.574002028 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.574043989 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.574057102 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.574069023 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.574103117 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.574131966 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.574368954 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.574429035 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.579946995 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.580008984 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.580025911 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.580037117 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.580087900 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.580116987 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.580127954 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.580140114 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.580152035 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.580182076 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.580182076 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.580226898 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.580338955 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.580388069 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.580404043 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.580454111 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.580487013 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.580499887 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.580512047 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.580532074 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.580574036 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.580696106 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.580708027 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.580720901 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.580769062 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.580769062 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.580796003 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.580914974 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.597129107 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.597210884 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.597408056 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.597423077 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.597435951 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.597446918 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.597455025 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.597460032 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.597482920 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.597513914 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.597513914 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.597544909 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.597547054 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.597592115 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.597598076 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.597605944 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.597634077 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.597783089 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.597795010 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.597807884 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.597819090 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.597826958 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.597860098 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.597985983 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.598053932 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.598099947 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.598112106 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.598160028 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.598189116 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.598213911 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.598256111 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.598257065 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.598342896 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.598355055 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.598402977 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.598403931 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.600960016 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.601015091 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.601016998 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.601031065 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.601088047 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.601088047 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.601178885 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.601191044 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.601202011 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.601212978 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.601233006 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.601269960 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.634448051 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.634478092 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.634491920 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.634689093 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.634720087 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.634732962 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.634759903 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.634778023 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.634779930 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.634793043 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.634808064 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.634814024 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.634819031 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.634831905 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.634880066 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.634880066 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.635021925 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.635034084 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.635046005 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.635076046 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.635123968 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.638257980 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.638309956 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.638322115 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.638358116 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.638359070 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.638406038 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.638406038 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.638493061 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.638508081 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.638523102 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.638536930 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.638566971 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.638566971 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.638598919 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.638674974 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.638736963 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.638748884 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.638772964 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.638803959 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.638817072 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.638870955 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.638889074 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.638932943 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.638932943 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.639002085 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.639019966 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.639035940 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.639089108 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.639152050 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.639202118 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.639230967 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.639249086 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.639276981 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.639293909 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.639370918 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.639388084 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.639406919 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.639417887 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.639425039 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.639447927 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.639448881 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.639471054 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.645102024 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.645137072 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.645152092 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.645211935 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.645242929 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.645319939 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.645334959 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.645349979 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.645427942 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.645427942 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.645445108 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.645457983 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.645473003 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.645488024 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.645522118 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.645684004 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.645693064 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.645708084 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.645715952 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.645719051 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.645737886 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.645768881 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.649765015 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.649813890 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.649837017 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.649854898 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.649903059 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.649930000 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.649930000 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.650013924 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.650022030 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.650037050 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.650062084 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.650079012 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.650079012 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.650487900 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.663968086 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.663989067 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.664001942 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.664041042 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.664107084 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.664119959 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.664133072 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.664228916 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.664228916 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.670617104 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.670660019 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.670705080 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.670711040 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.670753956 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.670753956 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.670830011 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.670870066 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.670897961 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.670909882 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.671017885 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.671035051 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.671045065 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.671057940 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.671097040 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.671097040 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.671247005 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.671258926 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.671272039 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.671286106 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.671298027 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.671319962 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.671454906 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.671525955 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.671567917 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.671567917 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.671626091 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.671638012 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.671652079 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.671664953 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.671691895 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.671766996 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.671849966 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.671865940 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.671878099 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.671917915 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.671917915 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.687808990 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.687841892 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.687855959 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.687935114 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.687953949 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.687958956 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.687971115 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.687983036 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.687995911 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.688033104 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.688050985 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.688159943 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.688215971 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.688249111 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.688261986 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.688322067 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.688396931 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.688409090 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.688421011 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.688487053 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.688487053 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.688570976 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.688621044 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.688653946 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.688666105 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.688721895 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.688721895 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.688780069 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.688795090 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.688808918 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.688832998 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.688865900 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.688951969 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.688957930 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.689023018 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.691864967 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.691905022 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.691915989 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.691929102 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.691982985 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.692065954 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.692078114 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.692089081 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.692101955 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.692120075 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.692162991 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.724903107 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.724939108 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.724963903 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.724982977 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.725001097 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.725001097 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.725059986 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.725071907 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.725110054 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.725110054 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.725148916 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.725210905 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.725243092 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.725260973 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.725310087 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.725322008 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.725333929 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.725367069 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.725421906 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.725529909 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.725543022 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.725557089 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.725569010 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.725584030 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.725631952 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.728972912 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.729037046 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.729049921 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.729068041 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.729099989 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.729141951 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.729185104 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.729192019 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.729259968 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.729286909 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.729299068 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.729312897 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.729358912 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.729358912 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.729512930 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.729523897 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.729537010 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.729547977 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.729566097 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.729609013 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.729758978 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.729769945 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.729780912 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.729793072 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.729824066 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.729844093 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.729968071 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.729974985 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.729983091 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.730010986 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.730026007 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.730216026 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.730317116 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.730362892 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.730437040 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.735891104 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.735923052 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.735937119 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.735968113 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.736006021 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.736104965 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.736116886 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.736128092 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.736140013 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.736171961 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.736171961 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.736221075 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.736382961 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.736408949 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.736421108 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.736433029 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.736440897 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.736447096 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.736460924 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.736469030 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.736469030 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.736502886 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.736537933 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.736675978 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.736725092 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.740386009 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.740413904 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.740421057 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.740452051 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.740494013 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.740556955 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.740569115 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.740580082 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.740592003 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.740614891 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.740649939 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.740741968 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.740818024 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.754652977 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.754713058 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.754719019 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.754730940 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.754759073 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.754777908 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.754843950 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.754854918 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.754865885 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.754883051 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.754894018 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.754925966 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.761451960 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.761497021 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.761507988 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.761538982 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.761538982 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.761559963 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.761612892 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.761640072 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.761698008 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.761698008 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.761775017 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.761790991 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.761802912 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.761826992 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.761866093 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.762012005 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.762039900 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.762057066 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.762068987 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.762084007 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.762084007 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.762084007 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.762100935 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.762113094 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.762113094 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.762130022 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.762192011 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.762443066 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.762454987 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.762460947 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.762475967 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.762490034 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.762501001 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.762506008 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.762567043 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.762567043 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.762692928 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.762749910 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.778491020 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.778523922 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.778536081 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.778551102 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.778579950 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.778624058 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.778685093 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.778693914 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.778697968 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.778712034 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.778754950 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.778754950 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.778832912 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.778886080 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.778930902 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.778950930 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.778983116 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.779010057 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.779067993 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.779078960 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.779093981 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.779105902 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.779114008 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.779161930 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.779189110 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.779330969 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.779341936 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.779356003 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.779367924 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.779397011 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.779437065 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.779578924 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.779591084 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.779603004 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.779628038 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.779685974 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.782763004 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.782782078 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.782798052 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.782854080 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.782854080 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.782902956 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.782917976 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.782932043 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.782975912 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.783004999 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.783061028 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.783235073 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.815890074 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.815943003 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.815958977 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.815963984 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.815982103 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.815996885 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.815996885 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.816023111 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.816034079 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.816044092 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.816044092 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.816050053 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.816071033 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.816092014 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.816103935 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.816121101 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.816289902 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.816304922 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.816320896 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.816337109 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.816350937 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.816363096 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.816363096 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.816364050 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.816409111 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.819900036 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.819916964 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.819940090 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.819986105 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.819986105 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.820024967 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.820040941 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.820056915 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.820097923 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.820097923 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.820210934 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.820257902 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.820282936 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.820312977 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.820312977 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.820322037 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.820327997 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.820343018 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.820388079 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.820389032 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.820535898 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.820548058 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.820559978 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.820570946 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.820583105 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.820593119 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.820594072 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.820607901 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.820631981 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.820631981 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.820668936 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.820885897 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.820962906 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.820976973 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.820981979 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.821023941 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.821023941 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.821089029 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.821135998 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.826683044 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.826719046 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.826745033 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.826771975 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.826847076 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.826858997 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.826889992 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.826920033 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.826925993 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.826934099 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.826947927 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.826987028 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.826997995 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.827066898 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.827116013 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.827171087 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.827203035 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.827230930 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.827239037 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.827261925 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.827286959 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.827286959 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.827287912 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.827306032 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.827306032 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.827322006 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.827336073 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.827363014 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.827363014 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.827470064 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.827514887 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.850222111 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.850245953 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.850264072 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.850330114 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.850337029 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.850353003 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.850353956 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.850369930 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.850385904 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.850395918 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.850395918 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.850402117 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.850420952 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.850439072 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.850452900 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.850533009 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.850574017 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.850585938 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.850626945 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.850671053 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.850692034 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.850701094 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.850730896 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.850730896 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.850841045 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.850909948 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.851052046 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.851116896 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.852143049 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.852200985 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.852205992 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.852214098 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.852263927 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.852263927 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.852286100 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.852356911 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.852369070 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.852370977 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.852415085 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.852509975 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.852523088 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.852590084 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.852602959 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.852636099 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.852662086 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.852792025 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.852808952 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.852816105 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.852854013 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.852865934 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.852937937 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.852948904 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.852963924 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.852992058 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.853013039 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.853065968 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.853097916 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.853105068 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.853111982 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.853149891 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.853149891 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.853339911 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.853352070 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.853368044 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.853389025 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.853410959 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.853456974 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.853544950 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.869272947 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.869291067 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.869303942 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.869337082 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.869368076 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.869556904 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.869574070 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.869585991 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.869599104 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.869628906 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.869628906 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.869659901 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.869684935 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.869704962 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.869716883 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.869724989 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.869745970 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.869759083 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.870009899 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.870023012 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.870034933 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.870049000 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.870078087 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.870078087 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.870121002 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.870162010 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.870173931 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.870186090 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.870198011 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.870210886 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.870218992 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.870254040 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.870254040 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.870418072 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.870459080 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.870503902 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.870548010 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.906512976 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.906548977 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.906563044 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.906588078 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.906588078 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.906625032 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.906646967 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.906658888 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.906678915 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.906691074 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.906702995 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.906702995 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.906732082 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.906732082 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.906774998 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.906795025 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.906826019 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.906826019 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.906963110 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.906975985 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.906987906 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.907000065 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.907021999 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.907021999 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.907061100 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.907207012 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.907218933 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.907232046 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.907243967 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.907253981 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.907254934 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.907270908 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.907284021 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.907306910 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.907306910 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.907367945 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.910566092 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.910579920 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.910592079 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.910628080 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.910648108 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.910784006 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.910839081 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.910846949 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.910859108 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.910888910 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.910990953 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.911004066 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.911015987 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.911027908 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.911073923 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.911073923 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.911204100 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.911217928 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.911227942 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.911240101 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.911251068 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.911309958 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.911365986 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.911432981 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.911443949 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.911463022 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.911484957 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.911557913 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.911571980 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.911585093 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.911597013 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.911624908 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.911624908 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.911660910 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.911680937 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.911740065 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.917363882 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.917412996 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.917424917 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.917438030 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.917473078 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.917493105 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.917603016 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.917615891 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.917627096 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.917644024 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.917650938 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.917670012 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.917701960 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.940778017 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.940813065 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.940824986 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.940856934 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.940859079 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.940859079 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.940886974 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.940915108 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.940958023 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.940969944 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.941011906 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.941011906 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.941104889 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.941118002 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.941129923 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.941142082 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.941150904 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.941200972 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.941385031 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.941395998 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.941406965 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.941420078 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.941442966 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.941456079 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.941642046 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.941699982 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.941709042 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.941730976 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.941770077 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.941770077 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.941839933 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.941874981 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.941914082 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.941914082 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.941946030 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.941957951 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.941982031 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.942003012 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.942023993 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.942069054 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.942795038 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.942866087 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.942893982 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.942907095 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.942954063 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.942955971 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.942954063 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.942969084 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.943012953 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.943025112 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.943087101 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.943099976 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.943136930 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.943169117 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.943172932 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.943219900 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.943232059 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.943232059 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.943245888 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.943279982 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.943279982 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.943362951 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.943428040 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.943464994 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.943480015 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.943519115 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.943519115 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.943579912 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.943588972 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.943622112 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.943662882 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.943694115 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.943739891 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.943773985 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.943785906 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.943833113 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.943833113 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.943919897 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.943932056 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.943943977 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.943957090 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.943980932 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.943980932 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.944011927 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.960222960 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.960274935 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.960282087 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.960288048 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.960329056 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.960359097 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.960371971 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.960386038 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.960428953 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.960428953 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.960522890 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.960541964 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.960553885 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.960571051 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.960602999 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.960602999 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.960664034 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.960675001 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.960707903 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.960715055 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.960727930 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.960741043 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.960752964 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.960752964 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.960752964 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.960787058 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.960835934 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.961142063 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.961154938 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.961167097 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.961179018 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.961190939 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.961191893 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.961201906 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.961210012 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.961215019 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.961236954 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.961292028 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.997086048 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.997104883 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.997137070 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.997148991 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.997160912 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.997165918 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.997174978 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.997188091 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.997232914 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.997251034 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.997323990 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.997370005 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.997409105 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.997478008 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.997497082 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.997509956 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.997522116 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.997551918 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.997579098 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.997636080 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.997689009 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.997725964 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.997772932 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.997814894 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.997828007 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.997839928 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.997878075 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.997878075 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.998034954 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.998047113 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.998059034 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.998071909 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.998083115 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:20.998095989 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.998111963 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:20.998140097 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.001439095 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.001460075 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.001481056 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.001538992 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.001559019 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.001576900 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.001595974 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.001616955 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.001635075 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.001635075 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.001696110 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.001813889 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.001833916 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.001852036 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.001863003 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.001898050 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.001898050 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.001965046 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.002012968 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.002017021 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.002029896 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.002048969 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.002063036 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.002073050 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.002073050 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.002091885 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.002130032 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.002160072 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.002177000 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.002224922 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.002224922 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.002238035 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.002254963 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.002274036 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.002290964 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.002300978 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.002300978 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.002310038 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.002331972 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.002331972 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.002351999 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.007966995 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.008037090 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.008039951 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.008060932 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.008081913 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.008107901 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.008107901 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.008136034 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.008147001 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.008160114 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.008171082 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.008203983 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.008235931 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.008795023 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.008846045 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.032403946 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.032468081 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.032495975 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.032499075 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.032545090 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.032623053 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.032635927 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.032684088 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.032684088 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.032737017 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.032748938 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.032759905 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.032772064 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.032784939 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.032802105 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.032802105 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.032838106 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.033144951 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.033157110 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.033168077 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.033179045 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.033190966 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.033201933 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.033216000 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.033224106 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.033224106 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.033227921 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.033241987 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.033255100 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.033263922 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.033273935 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.033293962 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.033293962 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.033341885 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.034775972 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.034837961 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.034848928 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.034867048 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.034892082 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.034910917 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.034935951 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.035018921 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.035022020 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.035032034 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.035043955 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.035057068 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.035083055 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.035083055 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.035111904 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.035304070 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.035315990 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.035326958 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.035340071 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.035351038 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.035362005 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.035363913 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.035377026 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.035387993 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.035398960 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.035399914 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.035409927 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.035438061 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.035809040 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.035820961 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.035831928 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.035875082 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.035875082 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.035939932 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.035953045 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.035986900 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.050690889 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.050724983 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.050735950 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.050791025 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.050843000 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.050843954 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.050862074 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.050894976 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.050932884 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.050935984 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.050949097 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.050980091 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.050997972 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.051059961 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.051073074 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.051112890 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.051192045 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.051203012 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.051248074 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.051299095 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.051311016 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.051358938 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.051453114 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.051464081 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.051476002 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.051506996 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.051531076 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.051587105 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.051599026 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.051610947 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.051661968 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.051661968 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.051809072 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.051820993 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.051831007 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.051881075 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.051928043 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.087734938 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.087795973 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.087806940 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.087918997 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.087924957 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.087966919 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.088002920 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.088043928 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.088056087 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.088100910 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.088159084 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.088165045 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.088304043 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.088310957 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.088321924 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.088360071 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.088360071 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.088434935 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.088476896 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.088490963 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.088504076 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.088543892 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.088690996 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.088696957 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.088709116 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.088762999 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.088838100 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.088844061 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.088855028 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.088901043 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.088973999 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.089065075 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.092010975 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.092019081 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.092031956 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.092082024 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.092113972 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.092164040 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.092171907 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.092204094 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.092237949 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.092346907 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.092358112 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.092365026 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.092371941 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.092389107 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.092432022 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.092602968 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.092611074 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.092617035 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.092623949 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.092710972 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.092895031 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.092904091 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.092910051 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.092952013 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.093007088 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.093014002 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.093027115 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.093034029 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.093159914 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.093184948 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.093231916 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.122200012 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.122246981 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.122252941 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.122308016 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.122308016 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.122356892 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.122364044 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.122409105 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.122447014 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.122453928 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.122519970 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.122530937 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.122538090 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.122596025 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.122642040 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.122735023 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.122742891 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.122760057 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.122766972 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.122798920 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.122798920 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.122946978 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.122953892 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.122967005 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.122972012 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.123017073 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.123090982 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.123110056 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.123123884 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.123131037 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.123173952 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.123173952 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.123364925 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.123377085 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.123383999 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.123395920 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.123403072 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.123445034 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.123965025 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.124031067 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.124115944 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.124161005 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.124169111 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.124273062 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.124330044 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.124396086 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.124402046 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.124443054 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.124530077 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.124536991 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.124548912 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.124560118 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.124588013 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.124614954 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.124809027 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.124814987 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.124826908 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.124835968 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.124841928 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.124855042 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.124861002 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.124866962 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.124871016 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.124919891 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.125191927 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.125197887 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.125210047 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.125264883 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.125302076 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.125366926 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.141405106 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.141411066 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.141422987 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.141616106 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.141623020 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.141634941 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.141637087 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.141688108 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.141695976 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.141704082 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.141756058 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.141802073 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.141809940 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.141874075 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.141940117 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.141968966 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.141976118 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.141979933 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.141982079 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.141988993 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.142041922 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.142203093 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.142209053 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.142265081 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.142318964 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.142324924 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.142337084 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.142380953 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.142380953 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.142512083 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.142518044 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.142534018 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.142576933 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.142591953 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.182379961 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.182387114 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.182399035 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.182518005 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.182594061 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.182600021 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.182612896 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.182625055 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.182681084 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.182681084 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.182816029 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.182822943 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.182835102 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.182841063 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.182847977 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.182893991 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.182910919 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.183087111 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.183093071 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.183154106 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.183470964 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.183478117 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.183531046 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.183574915 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.183581114 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.183587074 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.183593988 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.183599949 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.183656931 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.183656931 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.183847904 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.183917999 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.183927059 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.183933020 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.183939934 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.183948994 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.183974028 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.183990955 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.184253931 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.184261084 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.184267044 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.184273005 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.184279919 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.184302092 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.184391975 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.184568882 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.184576035 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.184587955 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.184650898 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.184650898 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.213365078 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.213403940 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.213414907 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.213542938 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.213550091 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.213562965 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.213567972 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.213649988 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.213824987 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.213831902 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.213845015 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.213851929 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.213859081 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.213865042 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.213900089 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.213900089 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.214107037 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.214112997 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.214124918 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.214274883 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.214459896 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.214468002 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.214479923 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.214485884 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.214492083 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.214528084 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.214540958 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.214548111 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.214560032 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.214566946 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.214572906 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.214586020 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.214591026 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.214591026 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.214627981 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.215074062 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.215080023 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.215091944 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.215101004 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.215107918 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.215114117 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.215127945 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.215133905 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.215142012 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.215166092 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.215166092 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.215234995 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.215584993 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.215591908 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.215604067 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.215610981 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.215650082 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.215833902 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.215841055 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.215852976 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.215859890 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.215938091 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.216134071 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.216140032 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.216151953 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.216157913 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.216165066 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.216170073 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.216190100 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.216195107 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.216201067 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.216207027 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.216212988 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.216212988 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.216263056 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.216263056 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.216702938 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.216710091 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.216722012 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.216727972 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.216762066 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.216805935 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.232095957 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.232142925 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.232165098 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.232184887 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.232184887 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.232247114 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.232276917 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.232285023 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.232333899 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.232425928 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.232431889 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.232444048 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.232502937 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.232562065 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.232573032 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.232578039 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.232584000 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.232635975 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.232758999 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.232799053 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.232805967 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.232819080 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.232861996 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.232973099 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.232979059 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.232991934 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.233093977 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.233198881 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.233205080 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.233217955 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.233231068 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.233237028 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.233270884 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.233294964 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.272922039 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.273021936 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.273027897 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.273046970 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.273099899 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.273112059 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.273119926 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.273132086 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.273139000 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.273211956 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.273401022 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.273407936 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.273423910 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.273482084 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.273482084 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.273546934 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.273567915 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.273572922 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.273578882 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.273586035 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.273621082 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.273663044 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.274286985 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.274337053 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.274343014 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.274358034 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.274405956 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.274506092 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.274518967 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.274525881 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.274532080 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.274580002 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.274580002 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.274765968 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.274772882 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.274827957 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.274912119 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.274918079 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.274930000 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.274998903 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.275053024 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.275067091 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.275125980 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.275274992 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.275291920 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.275299072 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.275305033 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.275312901 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.275320053 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.275336027 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.275376081 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.303673029 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.303718090 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.303725958 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.303767920 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.303767920 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.303818941 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.303889990 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.303924084 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.303961039 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.303980112 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.303987026 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.303999901 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.304035902 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.304225922 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.304231882 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.304244995 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.304250956 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.304258108 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.304275990 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.304306030 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.304474115 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.304528952 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.304544926 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.304553032 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.304608107 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.304796934 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.304804087 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.304810047 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.304816008 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.304825068 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.304847002 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.304869890 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.305039883 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.305047035 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.305058956 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.305064917 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.305077076 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.305083990 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.305099010 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.305181980 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.305358887 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.305416107 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.305488110 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.305494070 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.305511951 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.305519104 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.305531025 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.305537939 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.305543900 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.305542946 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.305598021 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.305860043 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.305903912 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.305933952 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.305941105 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.305994987 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.306051016 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.306056976 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.306065083 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.306070089 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.306113958 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.306113958 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.306364059 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.306370020 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.306386948 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.306392908 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.306400061 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.306441069 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.306441069 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.306652069 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.306658030 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.306664944 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.306670904 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.306677103 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.306713104 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.306713104 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.310158014 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.310205936 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.310216904 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.310218096 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.310250998 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.310275078 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.310318947 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.310324907 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.310368061 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.322913885 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.322988033 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.322988987 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.322997093 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.323069096 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.323143005 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.323148966 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.323160887 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.323167086 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.323229074 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.323229074 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.323405027 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.323410034 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.323421955 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.323426962 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.323434114 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.323440075 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.323451996 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.323457956 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.323476076 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.323508978 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.323508978 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.323862076 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.323923111 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.323949099 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.323956013 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.323962927 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.323967934 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.323981047 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.323987007 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.324012041 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.324105024 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.363698959 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.363740921 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.363746881 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.363837004 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.363840103 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.363843918 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.363857985 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.363866091 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.363923073 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.363923073 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.364109039 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.364115953 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.364121914 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.364186049 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.364231110 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.364258051 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.364340067 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.364406109 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.364413977 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.364448071 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.364682913 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.364747047 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.364773035 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.364778996 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.364836931 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.364850998 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.364856958 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.364948034 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.364959955 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.364967108 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.364979029 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.365062952 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.365153074 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.365159035 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.365173101 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.365231991 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.365328074 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.365335941 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.365408897 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.365500927 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.365506887 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.365520000 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.365525961 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.365533113 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.365537882 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.365571976 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.365617990 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.365840912 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.365848064 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.365854025 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.365859032 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.365928888 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.365928888 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.396838903 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.396929979 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.396941900 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.396946907 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.396962881 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.396970987 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.396976948 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.396982908 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.397005081 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.397209883 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.397217035 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.397245884 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.397249937 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.397260904 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.397268057 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.397274017 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.397284985 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.397299051 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.397310972 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.397397041 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.397428036 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.397932053 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.397938967 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.397950888 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.397957087 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.397969007 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.397975922 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.397980928 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.397986889 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.397996902 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.398001909 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.398010015 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.398011923 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.398016930 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.398025036 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.398036957 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.398040056 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.398044109 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.398086071 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.398086071 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.398694992 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.398751020 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.462852955 CEST497339000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.463274956 CEST497359000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.468131065 CEST90004973549.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.468231916 CEST497359000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.468410015 CEST90004973349.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:21.468477011 CEST497339000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.468677044 CEST497359000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:21.473495007 CEST90004973549.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:22.126436949 CEST90004973549.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:22.126544952 CEST497359000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:22.126919031 CEST497359000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:22.129000902 CEST497359000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:22.129041910 CEST497359000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:22.131757021 CEST90004973549.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:22.133793116 CEST90004973549.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:22.133831978 CEST90004973549.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:22.549182892 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:22.549577951 CEST497379000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:22.554375887 CEST90004973449.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:22.554476023 CEST497349000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:22.555022955 CEST90004973749.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:22.555104971 CEST497379000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:22.555361032 CEST497379000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:22.560466051 CEST90004973749.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:22.947280884 CEST90004973549.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:22.947441101 CEST497359000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:23.225694895 CEST90004973749.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:23.225842953 CEST497379000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:23.226556063 CEST497379000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:23.228116989 CEST497379000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:23.231333017 CEST90004973749.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:23.233007908 CEST90004973749.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:23.685802937 CEST497359000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:23.686499119 CEST497389000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:23.692195892 CEST90004973849.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:23.692298889 CEST497389000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:23.692533016 CEST497389000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:23.692648888 CEST90004973549.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:23.692701101 CEST497359000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:23.697325945 CEST90004973849.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:24.055111885 CEST90004973749.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:24.055222988 CEST497379000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:24.381556988 CEST90004973849.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:24.381671906 CEST497389000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:24.382096052 CEST497389000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:24.383873940 CEST497389000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:24.386869907 CEST90004973849.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:24.388721943 CEST90004973849.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:24.811989069 CEST497379000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:24.812553883 CEST497399000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:24.817207098 CEST90004973749.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:24.817403078 CEST90004973949.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:24.817461967 CEST497399000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:24.817590952 CEST497379000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:24.820055962 CEST497399000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:24.824829102 CEST90004973949.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:25.181345940 CEST90004973849.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:25.185383081 CEST497389000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:25.485050917 CEST90004973949.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:25.485117912 CEST497399000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:25.485951900 CEST497399000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:25.488663912 CEST497399000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:25.490720987 CEST90004973949.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:25.490936995 CEST497419000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:25.493782043 CEST90004973949.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:25.493839025 CEST497399000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:25.495717049 CEST90004974149.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:25.495779991 CEST497419000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:25.496134043 CEST497419000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:25.500890017 CEST90004974149.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:26.149976015 CEST90004974149.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:26.150042057 CEST497419000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:26.183257103 CEST497419000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:26.184997082 CEST497419000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:26.188190937 CEST90004974149.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:26.190357924 CEST90004974149.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:26.190403938 CEST497419000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:26.193078995 CEST497439000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:26.198100090 CEST90004974349.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:26.198216915 CEST497439000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:26.201241016 CEST497439000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:26.206093073 CEST90004974349.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:26.849315882 CEST90004974349.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:26.849375963 CEST497439000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:26.850034952 CEST497439000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:26.851708889 CEST497439000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:26.853408098 CEST497459000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:26.854748964 CEST90004974349.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:26.856729031 CEST90004974349.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:26.856779099 CEST497439000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:26.858190060 CEST90004974549.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:26.858267069 CEST497459000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:26.858483076 CEST497459000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:26.863303900 CEST90004974549.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:27.523561954 CEST90004974549.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:27.523633003 CEST497459000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:27.524326086 CEST497459000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:27.525991917 CEST497459000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:27.528333902 CEST497469000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:27.529079914 CEST90004974549.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:27.531037092 CEST90004974549.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:27.531119108 CEST497459000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:27.533123970 CEST90004974649.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:27.533195019 CEST497469000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:27.533684015 CEST497469000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:27.538454056 CEST90004974649.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:28.182903051 CEST90004974649.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:28.182981968 CEST497469000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:28.183434010 CEST497469000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:28.185298920 CEST497469000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:28.187035084 CEST497479000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:28.188122034 CEST90004974649.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:28.190275908 CEST90004974649.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:28.190327883 CEST497469000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:28.191788912 CEST90004974749.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:28.191905022 CEST497479000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:28.192152023 CEST497479000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:28.196926117 CEST90004974749.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:28.863394976 CEST90004974749.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:28.865328074 CEST497479000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:28.870440960 CEST497479000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:28.875452995 CEST90004974749.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:28.907798052 CEST497479000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:40:28.913126945 CEST90004974749.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:40:28.913202047 CEST497479000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:41:35.188205957 CEST90004973849.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:41:35.188263893 CEST497389000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:41:35.190036058 CEST90004973849.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:41:35.190084934 CEST497389000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:41:59.639724016 CEST497389000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:41:59.639760971 CEST497389000192.168.2.549.13.159.121
                                                    Jul 2, 2024 16:41:59.645054102 CEST90004973849.13.159.121192.168.2.5
                                                    Jul 2, 2024 16:41:59.645144939 CEST497389000192.168.2.549.13.159.121
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jul 2, 2024 16:40:09.688724995 CEST6292353192.168.2.51.1.1.1
                                                    Jul 2, 2024 16:40:09.695535898 CEST53629231.1.1.1192.168.2.5
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Jul 2, 2024 16:40:09.688724995 CEST192.168.2.51.1.1.10xee81Standard query (0)t.meA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Jul 2, 2024 16:40:09.695535898 CEST1.1.1.1192.168.2.50xee81No error (0)t.me149.154.167.99A (IP address)IN (0x0001)false
                                                    • t.me
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.549725149.154.167.994436188C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-07-02 14:40:10 UTC84OUTGET /g067n HTTP/1.1
                                                    Host: t.me
                                                    Connection: Keep-Alive
                                                    Cache-Control: no-cache
                                                    2024-07-02 14:40:10 UTC512INHTTP/1.1 200 OK
                                                    Server: nginx/1.18.0
                                                    Date: Tue, 02 Jul 2024 14:40:10 GMT
                                                    Content-Type: text/html; charset=utf-8
                                                    Content-Length: 12305
                                                    Connection: close
                                                    Set-Cookie: stel_ssid=2f2b44dce4018f44e5_17916549681102788446; expires=Wed, 03 Jul 2024 14:40:10 GMT; path=/; samesite=None; secure; HttpOnly
                                                    Pragma: no-cache
                                                    Cache-control: no-store
                                                    X-Frame-Options: ALLOW-FROM https://web.telegram.org
                                                    Content-Security-Policy: frame-ancestors https://web.telegram.org
                                                    Strict-Transport-Security: max-age=35768000
                                                    2024-07-02 14:40:10 UTC12305INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 54 65 6c 65 67 72 61 6d 3a 20 43 6f 6e 74 61 63 74 20 40 67 30 36 37 6e 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20 3c 73 63 72 69 70 74 3e 74 72 79 7b 69 66 28 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74 21 3d 6e 75 6c 6c 26 26 77 69 6e 64 6f 77 21 3d 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74 29 7b 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74 2e
                                                    Data Ascii: <!DOCTYPE html><html> <head> <meta charset="utf-8"> <title>Telegram: Contact @g067n</title> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <script>try{if(window.parent!=null&&window!=window.parent){window.parent.


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:10:40:05
                                                    Start date:02/07/2024
                                                    Path:C:\Users\user\Desktop\file.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\file.exe"
                                                    Imagebase:0x3f0000
                                                    File size:863'744 bytes
                                                    MD5 hash:E3E6CF9BB53C398D2F75398923F91C11
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:1
                                                    Start time:10:40:06
                                                    Start date:02/07/2024
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                    Imagebase:0xa10000
                                                    File size:65'440 bytes
                                                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000001.00000002.3367357842.0000000001011000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:high
                                                    Has exited:false

                                                    Target ID:5
                                                    Start time:10:40:06
                                                    Start date:02/07/2024
                                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6132 -s 264
                                                    Imagebase:0x570000
                                                    File size:483'680 bytes
                                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:0.7%
                                                      Dynamic/Decrypted Code Coverage:74%
                                                      Signature Coverage:18.3%
                                                      Total number of Nodes:339
                                                      Total number of Limit Nodes:6
                                                      execution_graph 61455 41c181 61482 41ce11 61455->61482 61457 41c186 ___unDNameEx 61486 41c568 61457->61486 61459 41c19e 61460 41c2f7 61459->61460 61469 41c1c8 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock std::locale::_Setgloballocale 61459->61469 61509 41ceef 4 API calls 2 library calls 61460->61509 61462 41c2fe 61510 455903 23 API calls std::locale::_Setgloballocale 61462->61510 61464 41c304 61511 4558c0 23 API calls std::locale::_Setgloballocale 61464->61511 61466 41c1e7 61467 41c30c 61468 41c268 61494 455398 61468->61494 61469->61466 61469->61468 61505 444f56 76 API calls 3 library calls 61469->61505 61472 41c26e 61498 477e90 61472->61498 61476 41c28f 61476->61462 61477 41c293 61476->61477 61478 41c29c 61477->61478 61507 4558b1 23 API calls std::locale::_Setgloballocale 61477->61507 61508 41c6d9 85 API calls ___scrt_uninitialize_crt 61478->61508 61481 41c2a5 61481->61466 61483 41ce27 61482->61483 61485 41ce30 61483->61485 61512 41cdc4 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 61483->61512 61485->61457 61487 41c571 61486->61487 61513 41cbb5 IsProcessorFeaturePresent 61487->61513 61489 41c57d 61514 421bde 10 API calls 2 library calls 61489->61514 61491 41c582 61493 41c586 61491->61493 61515 421c10 7 API calls 2 library calls 61491->61515 61493->61459 61495 4553a1 61494->61495 61496 4553a6 61494->61496 61516 454baa 87 API calls 61495->61516 61496->61472 61517 41c387 61498->61517 61502 477ed3 61503 41c285 61502->61503 61563 477f20 106 API calls std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 61502->61563 61506 41d03d GetModuleHandleW 61503->61506 61505->61468 61506->61476 61507->61478 61508->61481 61509->61462 61510->61464 61511->61467 61512->61485 61513->61489 61514->61491 61515->61493 61516->61496 61519 41c38c std::locale::_Locimp::_Locimp_ctor 61517->61519 61518 41c3a6 61526 477d70 61518->61526 61519->61518 61522 41c3a8 Concurrency::cancel_current_task 61519->61522 61564 457bd4 EnterCriticalSection LeaveCriticalSection codecvt 61519->61564 61521 41d4e7 codecvt 61566 41d7f1 RaiseException 61521->61566 61522->61521 61565 41d7f1 RaiseException 61522->61565 61525 41d504 61567 3f1280 61526->61567 61533 41c387 codecvt 3 API calls 61534 477d9b 61533->61534 61535 41c387 codecvt 3 API calls 61534->61535 61536 477da4 61535->61536 61587 42aeba 61536->61587 61538 477dbf 61539 477e03 61538->61539 61540 477dc8 61538->61540 61603 3f96b3 77 API calls CallUnexpected 61539->61603 61541 477e10 61540->61541 61542 477dcd GetCurrentThreadId 61540->61542 61604 3f96b3 77 API calls CallUnexpected 61541->61604 61544 477e17 61542->61544 61545 477dd6 61542->61545 61605 3f96b3 77 API calls CallUnexpected 61544->61605 61602 3fc042 WaitForSingleObjectEx GetExitCodeThread CloseHandle 61545->61602 61549 477de2 61550 477e1e 61549->61550 61552 477de9 61549->61552 61606 3f96b3 77 API calls CallUnexpected 61550->61606 61553 477e25 61552->61553 61554 477df2 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 61552->61554 61607 444f56 76 API calls 3 library calls 61553->61607 61554->61502 61563->61503 61564->61519 61565->61521 61566->61525 61568 3f128c _vsnprintf std::_Rng_abort 61567->61568 61608 4448db 61568->61608 61571 3f5b90 61572 3f5bd1 61571->61572 61627 3f41a0 61572->61627 61575 3f5d5f 61576 3f5d72 61575->61576 61640 3f5160 77 API calls 61575->61640 61579 3f5da0 61576->61579 61577 3f5c26 61632 3f2840 61577->61632 61580 3f5dc5 61579->61580 61653 3f59e0 61580->61653 61582 3f5dcf 61686 3f7560 61582->61686 61585 3f5060 77 API calls 61586 3f5e0a 61585->61586 61586->61533 61588 42aec7 61587->61588 61589 42aedb 61587->61589 61713 44a7d9 14 API calls __Wcrtomb 61588->61713 61704 42ad7d 61589->61704 61592 42aecc 61714 446be1 76 API calls __get_errno 61592->61714 61595 42aef0 CreateThread 61597 42af1b 61595->61597 61598 42af0f GetLastError 61595->61598 61742 42ac01 61595->61742 61596 42aed7 61596->61538 61716 42acb1 61597->61716 61715 44a77f 14 API calls 3 library calls 61598->61715 61602->61549 61603->61541 61604->61544 61605->61550 61606->61553 61609 4448ef _vsnprintf 61608->61609 61610 444911 61609->61610 61612 444938 61609->61612 61623 446b64 76 API calls 3 library calls 61610->61623 61624 42b32f 79 API calls 2 library calls 61612->61624 61613 44492c 61617 435f40 61613->61617 61618 435f4c 61617->61618 61619 435f63 61618->61619 61625 436c40 76 API calls 2 library calls 61618->61625 61622 3f12a7 61619->61622 61626 436c40 76 API calls 2 library calls 61619->61626 61622->61571 61623->61613 61624->61613 61625->61619 61626->61622 61629 3f41bc 61627->61629 61628 3f41d0 61628->61577 61629->61628 61641 3f5060 61629->61641 61633 3f285a 61632->61633 61633->61575 61635 3f2872 61633->61635 61650 41d7f1 RaiseException 61633->61650 61651 3f2770 77 API calls 4 library calls 61635->61651 61637 3f28a8 61652 41d7f1 RaiseException 61637->61652 61639 3f28b7 61639->61575 61640->61576 61642 3f50a1 61641->61642 61646 3f41ef 61641->61646 61643 3f41a0 77 API calls 61642->61643 61644 3f50aa 61643->61644 61645 3f511d 61644->61645 61647 3f2840 77 API calls 61644->61647 61645->61646 61649 3f5160 77 API calls 61645->61649 61646->61577 61647->61645 61649->61646 61650->61635 61651->61637 61652->61639 61693 3f9280 7 API calls std::_Lockit::_Lockit 61653->61693 61655 3f59f2 61661 3f5a2d std::locale::_Locimp::_Locimp_ctor 61655->61661 61694 3f9280 7 API calls std::_Lockit::_Lockit 61655->61694 61657 3f5a50 61696 3f92e7 LeaveCriticalSection LeaveCriticalSection std::_Lockit::~_Lockit 61657->61696 61658 3f5a0c 61695 3f92e7 LeaveCriticalSection LeaveCriticalSection std::_Lockit::~_Lockit 61658->61695 61660 3f5a59 61660->61582 61661->61657 61662 3f5a7f 61661->61662 61664 3f5a98 61662->61664 61665 3f5a83 61662->61665 61666 41c387 codecvt 3 API calls 61664->61666 61697 3f92e7 LeaveCriticalSection LeaveCriticalSection std::_Lockit::~_Lockit 61665->61697 61668 3f5a9f 61666->61668 61698 3f9280 7 API calls std::_Lockit::_Lockit 61668->61698 61669 3f5a8e 61669->61582 61671 3f5acb 61672 3f5b6f 61671->61672 61673 3f5b11 61671->61673 61702 3f9c57 77 API calls 2 library calls 61672->61702 61699 3fb724 100 API calls 2 library calls 61673->61699 61676 3f5b79 61676->61582 61677 3f5b1c 61700 3fba48 76 API calls 2 library calls 61677->61700 61679 3f5b33 61701 3f20e0 100 API calls 2 library calls 61679->61701 61687 3f41a0 77 API calls 61686->61687 61688 3f759e 61687->61688 61689 3f2840 77 API calls 61688->61689 61690 3f7623 61689->61690 61691 3f5e03 61690->61691 61703 3f5160 77 API calls 61690->61703 61691->61585 61693->61655 61694->61658 61695->61661 61696->61660 61697->61669 61698->61671 61699->61677 61700->61679 61702->61676 61703->61691 61724 4585c2 61704->61724 61709 42ada2 GetModuleHandleExW 61710 42adbf 61709->61710 61711 42acb1 __Thrd_start 16 API calls 61710->61711 61712 42adc7 61711->61712 61712->61595 61712->61597 61713->61592 61714->61596 61715->61597 61717 42acbd 61716->61717 61723 42ace1 61716->61723 61718 42acc3 CloseHandle 61717->61718 61719 42accc 61717->61719 61718->61719 61720 42acd2 FreeLibrary 61719->61720 61721 42acdb 61719->61721 61720->61721 61722 458625 ___free_lconv_mon 14 API calls 61721->61722 61722->61723 61723->61538 61725 4585cf 61724->61725 61726 45860f 61725->61726 61727 4585e3 _strftime 61725->61727 61728 4585fa HeapAlloc 61725->61728 61740 44a7d9 14 API calls __Wcrtomb 61726->61740 61727->61726 61727->61728 61739 457bd4 EnterCriticalSection LeaveCriticalSection codecvt 61727->61739 61728->61727 61729 45860d 61728->61729 61731 42ad8e 61729->61731 61733 458625 61731->61733 61734 458630 HeapFree 61733->61734 61738 42ad9b 61733->61738 61735 458645 GetLastError 61734->61735 61734->61738 61736 458652 __dosmaperr 61735->61736 61741 44a7d9 14 API calls __Wcrtomb 61736->61741 61738->61709 61738->61710 61739->61727 61740->61731 61741->61738 61743 42ac0d ___unDNameEx 61742->61743 61744 42ac21 61743->61744 61745 42ac14 GetLastError ExitThread 61743->61745 61756 45a1e8 GetLastError 61744->61756 61750 42ac3d 61789 42af45 17 API calls 61750->61789 61757 45a1fe 61756->61757 61758 45a204 61756->61758 61790 459022 6 API calls std::_Locinfo::_Locinfo_dtor 61757->61790 61762 45a208 SetLastError 61758->61762 61791 459061 6 API calls std::_Locinfo::_Locinfo_dtor 61758->61791 61761 45a220 61761->61762 61764 4585c2 __Thrd_start 14 API calls 61761->61764 61765 45a29d 61762->61765 61766 42ac26 61762->61766 61767 45a235 61764->61767 61796 446d67 76 API calls 3 library calls 61765->61796 61783 45a686 61766->61783 61769 45a23d 61767->61769 61770 45a24e 61767->61770 61792 459061 6 API calls std::_Locinfo::_Locinfo_dtor 61769->61792 61793 459061 6 API calls std::_Locinfo::_Locinfo_dtor 61770->61793 61772 45a2a2 61774 45a25a 61776 45a275 61774->61776 61777 45a25e 61774->61777 61775 45a24b 61779 458625 ___free_lconv_mon 14 API calls 61775->61779 61795 459db1 14 API calls __Getctype 61776->61795 61794 459061 6 API calls std::_Locinfo::_Locinfo_dtor 61777->61794 61779->61762 61781 45a280 61782 458625 ___free_lconv_mon 14 API calls 61781->61782 61782->61762 61784 45a698 GetPEB 61783->61784 61787 42ac31 61783->61787 61785 45a6ab 61784->61785 61784->61787 61797 458e54 61785->61797 61787->61750 61788 459450 5 API calls std::_Locinfo::_Locinfo_dtor 61787->61788 61788->61750 61790->61758 61791->61761 61792->61775 61793->61774 61794->61775 61795->61781 61796->61772 61800 458c74 61797->61800 61801 458ca2 61800->61801 61805 458c9e 61800->61805 61801->61805 61807 458ba9 61801->61807 61804 458cbc GetProcAddress 61804->61805 61806 458ccc std::_Locinfo::_Locinfo_dtor 61804->61806 61805->61787 61806->61805 61812 458bba ___vcrt_InitializeCriticalSectionEx 61807->61812 61808 458c50 61808->61804 61808->61805 61809 458bd8 LoadLibraryExW 61810 458c57 61809->61810 61811 458bf3 GetLastError 61809->61811 61810->61808 61813 458c69 FreeLibrary 61810->61813 61811->61812 61812->61808 61812->61809 61814 458c26 LoadLibraryExW 61812->61814 61813->61808 61814->61810 61814->61812 61815 ff018d 61818 ff01c5 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 61815->61818 61817 ff03a2 WriteProcessMemory 61819 ff03e7 61817->61819 61818->61817 61820 ff03ec WriteProcessMemory 61819->61820 61821 ff0429 WriteProcessMemory Wow64SetThreadContext ResumeThread 61819->61821 61820->61819 61822 477b30 61841 3f8390 61822->61841 61824 477b70 61825 41c387 codecvt 3 API calls 61824->61825 61826 477bac 61825->61826 61855 477540 61826->61855 61830 477be4 61909 4771f0 104 API calls 5 library calls 61830->61909 61832 477c31 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 61910 41c374 61832->61910 61834 477bec 61834->61832 61835 477c4e 61834->61835 61917 446bf1 61835->61917 61836 477c47 61842 3f83c3 61841->61842 61843 3f83a0 61841->61843 61844 3f83d4 61842->61844 61847 41c387 codecvt 3 API calls 61842->61847 61845 3f83da 61843->61845 61846 3f83a7 61843->61846 61844->61824 61922 3f1520 77 API calls 3 library calls 61845->61922 61849 41c387 codecvt 3 API calls 61846->61849 61850 3f83cd 61847->61850 61851 3f83ad 61849->61851 61850->61824 61852 446bf1 std::locale::_Locimp::_Locimp_ctor 76 API calls 61851->61852 61853 3f83b6 61851->61853 61854 3f83e4 61852->61854 61853->61824 61854->61824 61856 477789 61855->61856 61861 47756a std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 61855->61861 61857 41c374 ctype 5 API calls 61856->61857 61858 47779a VirtualAlloc GetUpdateRgn 61857->61858 61865 4778f0 61858->61865 61859 3f6b50 77 API calls 61859->61861 61860 44674a 77 API calls 61860->61861 61861->61856 61861->61859 61861->61860 61862 4777a0 61861->61862 61863 446bf1 std::locale::_Locimp::_Locimp_ctor 76 API calls 61862->61863 61864 4777a5 61863->61864 61866 41c387 codecvt 3 API calls 61865->61866 61868 477909 61866->61868 61869 477983 61868->61869 61923 3f8160 77 API calls 5 library calls 61868->61923 61870 477b1a 61869->61870 61871 4779a8 61869->61871 61890 4779c8 __InternalCxxFrameHandler 61869->61890 61925 3f79d0 77 API calls 2 library calls 61870->61925 61873 4779b7 61871->61873 61874 4779e2 61871->61874 61875 4779c2 61873->61875 61876 477b1f 61873->61876 61879 41c387 codecvt 3 API calls 61874->61879 61874->61890 61878 41c387 codecvt 3 API calls 61875->61878 61926 3f1520 77 API calls 3 library calls 61876->61926 61877 477a9b std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 61880 477b24 61877->61880 61883 477afd std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 61877->61883 61878->61890 61879->61890 61884 446bf1 std::locale::_Locimp::_Locimp_ctor 76 API calls 61880->61884 61882 3f5da0 103 API calls 61882->61890 61886 41c374 ctype 5 API calls 61883->61886 61885 477b29 61884->61885 61889 3f8390 std::locale::_Locimp::_Locimp_ctor 77 API calls 61885->61889 61888 477b16 61886->61888 61887 3f5b90 77 API calls 61887->61890 61888->61830 61891 477b70 61889->61891 61890->61877 61890->61880 61890->61882 61890->61887 61924 44674a 77 API calls 2 library calls 61890->61924 61892 41c387 codecvt 3 API calls 61891->61892 61893 477bac 61892->61893 61895 477540 78 API calls 61893->61895 61896 477bba VirtualAlloc GetUpdateRgn 61895->61896 61897 4778f0 104 API calls 61896->61897 61898 477be4 61897->61898 61927 4771f0 104 API calls 5 library calls 61898->61927 61900 477c31 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 61901 41c374 ctype 5 API calls 61900->61901 61904 477c47 61901->61904 61902 477bec 61902->61900 61903 477c4e 61902->61903 61905 446bf1 std::locale::_Locimp::_Locimp_ctor 76 API calls 61903->61905 61904->61830 61907 477c53 61905->61907 61906 477c9b 61906->61830 61907->61906 61928 3f2b40 77 API calls 61907->61928 61909->61834 61911 41c37d IsProcessorFeaturePresent 61910->61911 61912 41c37c 61910->61912 61914 41d1f1 61911->61914 61912->61836 61929 41d1b4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 61914->61929 61916 41d2d4 61916->61836 61930 446b2d 76 API calls 2 library calls 61917->61930 61919 446c00 61931 446c0e 11 API calls std::locale::_Setgloballocale 61919->61931 61921 446c0d 61922->61851 61923->61868 61924->61890 61925->61876 61926->61880 61927->61902 61928->61907 61929->61916 61930->61919 61931->61921

                                                      Control-flow Graph

                                                      APIs
                                                      • CreateProcessA.KERNELBASE(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00FF00FF,00FF00EF), ref: 00FF02FC
                                                      • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00FF030F
                                                      • Wow64GetThreadContext.KERNEL32(00000124,00000000), ref: 00FF032D
                                                      • ReadProcessMemory.KERNELBASE(00000128,?,00FF0143,00000004,00000000), ref: 00FF0351
                                                      • VirtualAllocEx.KERNELBASE(00000128,?,?,00003000,00000040), ref: 00FF037C
                                                      • WriteProcessMemory.KERNELBASE(00000128,00000000,?,?,00000000,?), ref: 00FF03D4
                                                      • WriteProcessMemory.KERNELBASE(00000128,00400000,?,?,00000000,?,00000028), ref: 00FF041F
                                                      • WriteProcessMemory.KERNELBASE(00000128,-00000008,?,00000004,00000000), ref: 00FF045D
                                                      • Wow64SetThreadContext.KERNEL32(00000124,014E0000), ref: 00FF0499
                                                      • ResumeThread.KERNELBASE(00000124), ref: 00FF04A8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136452812.0000000000FF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ff0000_file.jbxd
                                                      Similarity
                                                      • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$CreateProcessA$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                      • API String ID: 2687962208-1257834847
                                                      • Opcode ID: 6ed679946abb4a161c9f75f6101290084365813039212a6bd0c7882d8dd446c2
                                                      • Instruction ID: 0f6e74e6f69413b8ec6f0f8f33934fb0ee61352d25d6cd0f7fd376e89a28d772
                                                      • Opcode Fuzzy Hash: 6ed679946abb4a161c9f75f6101290084365813039212a6bd0c7882d8dd446c2
                                                      • Instruction Fuzzy Hash: 89B1E77664024AAFDB60CF68CC80BDA77A5FF88714F158524EA0CEB352D774FA418B94

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 112 4778f0-47793d call 41c387 115 477940-477957 112->115 116 477966-477979 call 3f8160 115->116 117 477959-477964 115->117 118 47797d-477981 116->118 117->118 118->115 121 477983-47799a 118->121 122 477a0d-477a14 121->122 123 47799c-4779a2 121->123 124 477a9b-477a9d 122->124 125 477a1a-477a1c 122->125 126 477b1a call 3f79d0 123->126 127 4779a8-4779b5 123->127 128 477a9f-477aac 124->128 129 477ac8-477adc call 41c3b7 124->129 131 477a20-477a99 call 3f5b90 call 3f5da0 call 3f5b90 call 3f5da0 call 44674a 125->131 136 477b1f call 3f1520 126->136 132 4779b7-4779bc 127->132 133 4779e2-4779e4 127->133 139 477abe-477ac5 call 41c3b7 128->139 140 477aae-477abc 128->140 151 477b07-477b19 call 41c374 129->151 152 477ade-477aeb 129->152 131->124 135 4779c2-4779cd call 41c387 132->135 132->136 137 4779f7 133->137 138 4779e6-4779f5 call 41c387 133->138 147 477b24-477bdf call 446bf1 call 3f8390 call 41c387 call 477540 VirtualAlloc GetUpdateRgn call 4778f0 135->147 162 4779d3-4779e0 135->162 136->147 146 4779f9-477a0a call 41e260 137->146 138->146 139->129 140->139 140->147 146->122 182 477be4-477c11 call 4771f0 147->182 160 477afd-477b04 call 41c3b7 152->160 161 477aed-477afb 152->161 160->151 161->147 161->160 162->146 186 477c13-477c1f 182->186 187 477c3b-477c4d call 41c374 182->187 189 477c31-477c38 call 41c3b7 186->189 190 477c21-477c2f 186->190 189->187 190->189 191 477c4e-477c73 call 446bf1 190->191 197 477c75-477c7c 191->197 198 477c9d-477c9f 191->198 199 477c80 197->199 200 477c85-477c94 call 3f2b40 199->200 203 477c96-477c99 200->203 203->199 204 477c9b-477c9c 203->204 204->198
                                                      APIs
                                                        • Part of subcall function 003F1520: ___std_exception_copy.LIBVCRUNTIME ref: 003F155C
                                                      • VirtualAlloc.KERNELBASE(00000000,000004AC,00001000,00000040,?), ref: 00477BC8
                                                      • GetUpdateRgn.USER32(00000000,00000000,00000000), ref: 00477BD9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocUpdateVirtual___std_exception_copy
                                                      • String ID: Earth$Own head
                                                      • API String ID: 3005764785-4036566267
                                                      • Opcode ID: cd2d602fa5c517aed959f37e963a5355cfaa50762e7ab9edad6ae5c3ad6621d1
                                                      • Instruction ID: 22867a5d9b65fd1c9aa9afa69ca78c5a1c411c6305d51e67c59fc81733e3e776
                                                      • Opcode Fuzzy Hash: cd2d602fa5c517aed959f37e963a5355cfaa50762e7ab9edad6ae5c3ad6621d1
                                                      • Instruction Fuzzy Hash: A7A179719043045BD710EF39DC85AEFB7A4EF85308F448A2FF95997242E738EA448799

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 336 45a686-45a696 337 45a6c5-45a6c9 336->337 338 45a698-45a6a9 GetPEB 336->338 339 45a6bc-45a6c3 338->339 340 45a6ab-45a6af call 458e54 338->340 339->337 342 45a6b4-45a6b7 340->342 342->339 343 45a6b9-45a6bb 342->343 343->339
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5002b0d70e95f86d1288d4449541de3daf84258198c15d3ce42bfe123815464a
                                                      • Instruction ID: 23fc32fe04ad2038148f418481fb5c96b71a21bcdebff2541693d556ba07cf13
                                                      • Opcode Fuzzy Hash: 5002b0d70e95f86d1288d4449541de3daf84258198c15d3ce42bfe123815464a
                                                      • Instruction Fuzzy Hash: F6F0A071610264DFCB12DB4DC905B4973A8EB09B16F11405FE840EB252C7B4DE48C7D8

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 23 458ba9-458bb5 24 458c47-458c4a 23->24 25 458c50 24->25 26 458bba-458bcb 24->26 27 458c52-458c56 25->27 28 458bcd-458bd0 26->28 29 458bd8-458bf1 LoadLibraryExW 26->29 32 458bd6 28->32 33 458c70-458c72 28->33 30 458c57-458c67 29->30 31 458bf3-458bfc GetLastError 29->31 30->33 36 458c69-458c6a FreeLibrary 30->36 34 458c35-458c42 31->34 35 458bfe-458c10 call 458588 31->35 37 458c44 32->37 33->27 34->37 35->34 40 458c12-458c24 call 458588 35->40 36->33 37->24 40->34 43 458c26-458c33 LoadLibraryExW 40->43 43->30 43->34
                                                      APIs
                                                      • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,CC824C46,?,00458CB6,?,?,?,00000000), ref: 00458C6A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID: api-ms-$ext-ms-
                                                      • API String ID: 3664257935-537541572
                                                      • Opcode ID: 10968b7388ad6990e9a60113057a7138be01eda5fa6f03b7f51236616197fe9d
                                                      • Instruction ID: 24739658d0481db4b8e19676409cfabd35b988cdbfc0b29ce60cc8048034065e
                                                      • Opcode Fuzzy Hash: 10968b7388ad6990e9a60113057a7138be01eda5fa6f03b7f51236616197fe9d
                                                      • Instruction Fuzzy Hash: 48213871A02115A7CB229B20DC44A5B3368DF01366F24012EEC0AB7392EE38ED45C6EC

                                                      Control-flow Graph

                                                      APIs
                                                      • ___security_init_cookie.LIBCMT ref: 0041C181
                                                        • Part of subcall function 0041CE11: ___get_entropy.LIBCMT ref: 0041CE2B
                                                      • ___scrt_release_startup_lock.LIBCMT ref: 0041C21D
                                                      • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 0041C231
                                                      • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 0041C257
                                                      • ___scrt_uninitialize_crt.LIBCMT ref: 0041C2A0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ___scrt_is_nonwritable_in_current_image$___get_entropy___scrt_release_startup_lock___scrt_uninitialize_crt___security_init_cookie
                                                      • String ID:
                                                      • API String ID: 2539496024-0
                                                      • Opcode ID: 55c37ed9ecdf83e4e2c5e3cea6fb3ea0b561a448c7eebff6c89a2b4d56f24a1b
                                                      • Instruction ID: f3e2e7ea03e0847a2b494764fbd50526c8352aed7dd3c7120ea0b8158ec7e471
                                                      • Opcode Fuzzy Hash: 55c37ed9ecdf83e4e2c5e3cea6fb3ea0b561a448c7eebff6c89a2b4d56f24a1b
                                                      • Instruction Fuzzy Hash: 14312432AC46419BDB207BB69C927EE33609F41769F2004AFF840BB2D3DE7D4885865D

                                                      Control-flow Graph

                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 00477DCD
                                                        • Part of subcall function 003FC042: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000), ref: 003FC04E
                                                        • Part of subcall function 003FC042: GetExitCodeThread.KERNEL32(?,?), ref: 003FC067
                                                        • Part of subcall function 003FC042: CloseHandle.KERNEL32(?), ref: 003FC079
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$CloseCodeCurrentExitHandleObjectSingleWait
                                                      • String ID: Success created.$Success destroyed.$jjj
                                                      • API String ID: 3356992203-3362827742
                                                      • Opcode ID: c59a9b220aaa42066ece6e47896ac5a6f2f7427a64be0da5eb65691620e83995
                                                      • Instruction ID: b98847d71470218d3921eb35424496b4633ca81e09ff52246b4656bc37fd73a1
                                                      • Opcode Fuzzy Hash: c59a9b220aaa42066ece6e47896ac5a6f2f7427a64be0da5eb65691620e83995
                                                      • Instruction Fuzzy Hash: 1011CB7078130A66E7223BB45D07F6B75999F50B41F608C2BF7489D2C2EBB99811836D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 244 42aeba-42aec5 245 42aec7-42aeda call 44a7d9 call 446be1 244->245 246 42aedb-42aeee call 42ad7d 244->246 252 42aef0-42af0d CreateThread 246->252 253 42af1c 246->253 255 42af2b-42af30 252->255 256 42af0f-42af1b GetLastError call 44a77f 252->256 257 42af1e-42af2a call 42acb1 253->257 260 42af32-42af35 255->260 261 42af37-42af3b 255->261 256->253 260->261 261->257
                                                      APIs
                                                      • CreateThread.KERNELBASE(?,00000001,Function_0003AC01,00000000,?,?), ref: 0042AF03
                                                      • GetLastError.KERNEL32(?,?,?,003FC117,00000000,00000000,00000001,?,00000000,?,?,?,003FBFAD,00000000,Function_0000BEFE,?), ref: 0042AF0F
                                                      • __dosmaperr.LIBCMT ref: 0042AF16
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateErrorLastThread__dosmaperr
                                                      • String ID:
                                                      • API String ID: 2744730728-0
                                                      • Opcode ID: b56f4e48e7ebeb4ec0fcc512971ae05f7aeed7d09a21b2874daaca9f2d25841d
                                                      • Instruction ID: 1cb99579514780970580b8442a6ca59bb174033fe607798273de5c70f6851276
                                                      • Opcode Fuzzy Hash: b56f4e48e7ebeb4ec0fcc512971ae05f7aeed7d09a21b2874daaca9f2d25841d
                                                      • Instruction Fuzzy Hash: D901F572600229AFDF149FB1ED05A9F7BA4EF00324F51005AFC0192250DB78DD20EB9A

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 264 477b30-477bdf call 3f8390 call 41c387 call 477540 VirtualAlloc GetUpdateRgn call 4778f0 272 477be4-477c11 call 4771f0 264->272 276 477c13-477c1f 272->276 277 477c3b-477c4d call 41c374 272->277 279 477c31-477c38 call 41c3b7 276->279 280 477c21-477c2f 276->280 279->277 280->279 281 477c4e-477c73 call 446bf1 280->281 287 477c75-477c7c 281->287 288 477c9d-477c9f 281->288 289 477c80 287->289 290 477c85-477c94 call 3f2b40 289->290 293 477c96-477c99 290->293 293->289 294 477c9b-477c9c 293->294 294->288
                                                      APIs
                                                      • VirtualAlloc.KERNELBASE(00000000,000004AC,00001000,00000040,?), ref: 00477BC8
                                                      • GetUpdateRgn.USER32(00000000,00000000,00000000), ref: 00477BD9
                                                        • Part of subcall function 004771F0: OffsetRect.USER32(00000000,00000000,00000000), ref: 004772E8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocOffsetRectUpdateVirtual
                                                      • String ID:
                                                      • API String ID: 3922179882-0
                                                      • Opcode ID: e89bcd4766194bfd74fb4e3ec20635590729bac388267cdbf672ff7413970326
                                                      • Instruction ID: f97be1be9e5b0525c8335a6dea415acef2dc51ee82ef6f9756f682eed8408d63
                                                      • Opcode Fuzzy Hash: e89bcd4766194bfd74fb4e3ec20635590729bac388267cdbf672ff7413970326
                                                      • Instruction Fuzzy Hash: 0A312970E442086BD705EF68ED86BEDB7B1AF45304F50822EFD0467382EB74AA418799

                                                      Control-flow Graph

                                                      APIs
                                                      • GetLastError.KERNEL32(00488110,0000000C), ref: 0042AC14
                                                      • ExitThread.KERNEL32 ref: 0042AC1B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorExitLastThread
                                                      • String ID:
                                                      • API String ID: 1611280651-0
                                                      • Opcode ID: b3fb095c1857b8e208af12ec87c13e5ee5d478c6097b61ba69af61cfb2920b6f
                                                      • Instruction ID: ead37007f6bf6d36b7334a6c685f1034cb81c6f0ceadc33f31a1dacd938aee4d
                                                      • Opcode Fuzzy Hash: b3fb095c1857b8e208af12ec87c13e5ee5d478c6097b61ba69af61cfb2920b6f
                                                      • Instruction Fuzzy Hash: 2EF0AFB0A40200AFDB00BFB1D80AA6E3B64FF05715F60455EF905972A3CF385955CB9A

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 314 458c74-458c9c 315 458ca2-458ca4 314->315 316 458c9e-458ca0 314->316 318 458ca6-458ca8 315->318 319 458caa-458cb1 call 458ba9 315->319 317 458cf3-458cf6 316->317 318->317 321 458cb6-458cba 319->321 322 458cbc-458cca GetProcAddress 321->322 323 458cd9-458cf0 321->323 322->323 324 458ccc-458cd7 call 4582f2 322->324 325 458cf2 323->325 324->325 325->317
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 26e3154ce078eaa8f7456f0a265685b3d8e5522ac69debe14bb3d0a154aafdf3
                                                      • Instruction ID: 44e99025448c94d3d9e4b4b638fedeed54ebb08e99fca266c9f42a6a12c7d5b6
                                                      • Opcode Fuzzy Hash: 26e3154ce078eaa8f7456f0a265685b3d8e5522ac69debe14bb3d0a154aafdf3
                                                      • Instruction Fuzzy Hash: 54014937302111AFAB128E6DEC0095B3396BBC1331724802EFD02EB246DE3CC80987A9
                                                      APIs
                                                      • DName::DName.LIBVCRUNTIME ref: 00424022
                                                      • operator+.LIBVCRUNTIME ref: 0042403C
                                                      • DName::operator+.LIBCMT ref: 0042416A
                                                      • DName::operator+.LIBCMT ref: 00424187
                                                        • Part of subcall function 004253A0: DName::DName.LIBVCRUNTIME ref: 004253E3
                                                      • DName::operator+.LIBCMT ref: 0042423B
                                                      • DName::operator+.LIBCMT ref: 0042424A
                                                        • Part of subcall function 00429B20: DName::operator+.LIBCMT ref: 00429B64
                                                        • Part of subcall function 00429B20: DName::operator+.LIBCMT ref: 00429B70
                                                        • Part of subcall function 00429B20: DName::operator+.LIBCMT ref: 00429BEB
                                                        • Part of subcall function 00429B20: DName::operator+=.LIBCMT ref: 00429C2E
                                                      • DName::operator+.LIBCMT ref: 004241D6
                                                        • Part of subcall function 00423D92: DName::operator=.LIBVCRUNTIME ref: 00423DB3
                                                        • Part of subcall function 00423D3A: shared_ptr.LIBCMT ref: 00423D56
                                                        • Part of subcall function 00425A9C: shared_ptr.LIBCMT ref: 00425B42
                                                      • DName::operator+.LIBCMT ref: 004247B4
                                                      • DName::operator+.LIBCMT ref: 004247D0
                                                      • DName::operator+.LIBCMT ref: 00424A6F
                                                        • Part of subcall function 00423C29: DName::operator+.LIBCMT ref: 00423C4A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Name::operator+$NameName::shared_ptr$Name::operator+=Name::operator=operator+
                                                      • String ID: /
                                                      • API String ID: 848932493-2043925204
                                                      • Opcode ID: ff22ebef9e3755f9ffabba5495e43c344daef2e9c00d036edf9b7db0b00a83e7
                                                      • Instruction ID: b8e2e157c209b56fee61f7df09856f007e268873e8e3e564f5eda867986b78f2
                                                      • Opcode Fuzzy Hash: ff22ebef9e3755f9ffabba5495e43c344daef2e9c00d036edf9b7db0b00a83e7
                                                      • Instruction Fuzzy Hash: 20929272F205299ADB14DEA9EC95BEE77B4EB44304F84413EE512E7280DB7CD908CB18
                                                      APIs
                                                        • Part of subcall function 0045A1E8: GetLastError.KERNEL32(?,?,0042AC26,00488110,0000000C), ref: 0045A1EC
                                                        • Part of subcall function 0045A1E8: SetLastError.KERNEL32(00000000), ref: 0045A28E
                                                      • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 004679E2
                                                      • IsValidCodePage.KERNEL32(00000000), ref: 00467A2B
                                                      • IsValidLocale.KERNEL32(?,00000001), ref: 00467A3A
                                                      • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00467A82
                                                      • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00467AA1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                      • String ID: 0G
                                                      • API String ID: 415426439-2664342302
                                                      • Opcode ID: dd4f8d775d4ace9d8804d40a566d63fcab2a68465792712fba5e9f2b51716444
                                                      • Instruction ID: 75d0200f6c7b78f6c8edf5c6085e23a551d68588925a779a4578e529d5c519f5
                                                      • Opcode Fuzzy Hash: dd4f8d775d4ace9d8804d40a566d63fcab2a68465792712fba5e9f2b51716444
                                                      • Instruction Fuzzy Hash: C55194B1904205ABEF10DFA5CC45AAF77F8FF08708F14456AE904E7251FB789944CB6A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __floor_pentium4
                                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                      • API String ID: 4168288129-2761157908
                                                      • Opcode ID: e89a0196ce638787ad9c432dd6ae22b1a5b31c6c4fb847b99fcbf050f28ce1fe
                                                      • Instruction ID: 061ac9ba7f441c45408cbdc2c7b431fe13a5e85614e2d7f6eacd0f16b152b2c5
                                                      • Opcode Fuzzy Hash: e89a0196ce638787ad9c432dd6ae22b1a5b31c6c4fb847b99fcbf050f28ce1fe
                                                      • Instruction Fuzzy Hash: 6FD23C71E086288FDB65CE28DD407EAB7B5EB45305F1441EBD40DE7240EB78AE858F86
                                                      APIs
                                                        • Part of subcall function 0045A1E8: GetLastError.KERNEL32(?,?,0042AC26,00488110,0000000C), ref: 0045A1EC
                                                        • Part of subcall function 0045A1E8: SetLastError.KERNEL32(00000000), ref: 0045A28E
                                                      • GetACP.KERNEL32(?,?,?,?,?,?,004568CB,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00467015
                                                      • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,004568CB,?,?,?,00000055,?,-00000050,?,?), ref: 00467040
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 004671A3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$CodeInfoLocalePageValid
                                                      • String ID: 0G$utf8
                                                      • API String ID: 607553120-304224658
                                                      • Opcode ID: 6fdfe68272d48abc163ec8587c82545b265efc8326ec77ff07e0203f11ce6e90
                                                      • Instruction ID: f2d0f04cc5a9eb130106e068793921d4236d5caebadbce17d102752e73ebdcbb
                                                      • Opcode Fuzzy Hash: 6fdfe68272d48abc163ec8587c82545b265efc8326ec77ff07e0203f11ce6e90
                                                      • Instruction Fuzzy Hash: CE711771604606AADB24AB36CC46FA773A8EF05718F14442FF905D7281FA7CED41C7AA
                                                      APIs
                                                      • GetLocaleInfoW.KERNEL32(?,2000000B,00467A1F,00000002,00000000,?,?,?,00467A1F,?,00000000), ref: 0046779A
                                                      • GetLocaleInfoW.KERNEL32(?,20001004,00467A1F,00000002,00000000,?,?,?,00467A1F,?,00000000), ref: 004677C3
                                                      • GetACP.KERNEL32(?,?,00467A1F,?,00000000), ref: 004677D8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID: ACP$OCP
                                                      • API String ID: 2299586839-711371036
                                                      • Opcode ID: 806c69bcc762702408ac48ce50980fe9c6cb13b6c0ca833749f87ca428a9c678
                                                      • Instruction ID: 380400eebcfa833d2f3d3eba706d0315b752ea695b09494f77df8ea0e105eb74
                                                      • Opcode Fuzzy Hash: 806c69bcc762702408ac48ce50980fe9c6cb13b6c0ca833749f87ca428a9c678
                                                      • Instruction Fuzzy Hash: CB21D835608104A6D7318F24C900A9773A6EB54B5EB568037E909D7304F73AFD41C35A
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _strrchr
                                                      • String ID:
                                                      • API String ID: 3213747228-0
                                                      • Opcode ID: da1da04466b900b41095eb494a391f24e2040cb7ba2ea0d27411f8f0d746fb28
                                                      • Instruction ID: 6a739e96e061cb17ea7a891450d31e0cfcad13582d80d780832e25556fd54ad8
                                                      • Opcode Fuzzy Hash: da1da04466b900b41095eb494a391f24e2040cb7ba2ea0d27411f8f0d746fb28
                                                      • Instruction Fuzzy Hash: 74B16B329042459FDB16CF58C8817EEBBE5EF05305F14826BED05AB343D2389D19C7AA
                                                      APIs
                                                      • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,00000000,?,00000000), ref: 0046321A
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00463295
                                                      • FindClose.KERNEL32(00000000), ref: 004632B7
                                                      • FindClose.KERNEL32(00000000), ref: 004632DA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Find$CloseFile$FirstNext
                                                      • String ID:
                                                      • API String ID: 1164774033-0
                                                      • Opcode ID: 57b45028f3b0f5c67c00c9cd6a308a03913d6f393da3a7c34936dfaefec17b54
                                                      • Instruction ID: 9c1a762cc1ca8a1245afe0969df32f6278266ee20edb2cf776108bc8c122e513
                                                      • Opcode Fuzzy Hash: 57b45028f3b0f5c67c00c9cd6a308a03913d6f393da3a7c34936dfaefec17b54
                                                      • Instruction Fuzzy Hash: 9941E971A00659AFDB20DF64CC99ABBB778EF85305F1041DBE405D3140FA389F848B6A
                                                      APIs
                                                      • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 0041CEFB
                                                      • IsDebuggerPresent.KERNEL32 ref: 0041CFC7
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041CFE0
                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 0041CFEA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                      • String ID:
                                                      • API String ID: 254469556-0
                                                      • Opcode ID: b0b39a284d49e88871e3a514f073af57dd9b07fefc0a4845180200849941e7e1
                                                      • Instruction ID: 12e907ab44ce974fff965ac7b79e2ef66c279821a0ce06221507f563a903bbfb
                                                      • Opcode Fuzzy Hash: b0b39a284d49e88871e3a514f073af57dd9b07fefc0a4845180200849941e7e1
                                                      • Instruction Fuzzy Hash: 983107B5D012289BDB20DF65DD897CDBBB8AF08304F1041AAE50DAB250EB759AC58F49
                                                      APIs
                                                      • GetLocaleInfoEx.KERNEL32(!x-sys-default-locale,20000001,?,00000002), ref: 003FE9C3
                                                      • FormatMessageA.KERNEL32(00001300,00000000,?,?,?,00000000,00000000), ref: 003FE9EA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FormatInfoLocaleMessage
                                                      • String ID: !x-sys-default-locale
                                                      • API String ID: 4235545615-2729719199
                                                      • Opcode ID: aacb4982d70af1027d1981f74270937e1f7a026110575e566911f329c2127c5d
                                                      • Instruction ID: b3cd55215e911a07756c9fa5cd5f1ec933d4920445c0aef653d42d28402e358f
                                                      • Opcode Fuzzy Hash: aacb4982d70af1027d1981f74270937e1f7a026110575e566911f329c2127c5d
                                                      • Instruction Fuzzy Hash: AEF030B5610118FFEB159BD5DD0ADFB77ACEB08751F10402AB64AD6060E6F0AE449770
                                                      APIs
                                                        • Part of subcall function 0045A1E8: GetLastError.KERNEL32(?,?,0042AC26,00488110,0000000C), ref: 0045A1EC
                                                        • Part of subcall function 0045A1E8: SetLastError.KERNEL32(00000000), ref: 0045A28E
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004673D9
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00467423
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004674E9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoLocale$ErrorLast
                                                      • String ID:
                                                      • API String ID: 661929714-0
                                                      • Opcode ID: 9c806a7300d81096874484c604d58aa03d511c5433145768f90f71dbcafdd56c
                                                      • Instruction ID: 65e1f576b47800ff455fbac98f6b173d32cfdab4d6f35c16edcc4049b6645d57
                                                      • Opcode Fuzzy Hash: 9c806a7300d81096874484c604d58aa03d511c5433145768f90f71dbcafdd56c
                                                      • Instruction Fuzzy Hash: E1615271504207ABDB249F25CC86BBA77A8EF04708F1441BAE906C6685FB3CDD51CB5A
                                                      APIs
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000010), ref: 00446AB9
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000010), ref: 00446AC3
                                                      • UnhandledExceptionFilter.KERNEL32(00487EE8,?,?,?,?,?,00000010), ref: 00446AD0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                      • String ID:
                                                      • API String ID: 3906539128-0
                                                      • Opcode ID: ccd897d0ce0a089baa55247e654a08fd775c3d8f622f7cdfc40f78edf9529180
                                                      • Instruction ID: 26d224c02e80d976b223787caad4abf3f9c9b4d4422a3e329ce4f5d383490204
                                                      • Opcode Fuzzy Hash: ccd897d0ce0a089baa55247e654a08fd775c3d8f622f7cdfc40f78edf9529180
                                                      • Instruction Fuzzy Hash: 6531F4749412289BCB21DF25DC887CDBBB8BF08314F5041EAE40CA6290EB749F818F49
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 88554fab2a861b58216585fa88a552d66bcc3b325aa0be243bc6fdf01ca1c5b8
                                                      • Instruction ID: 8714f04db0820e7a7062501670de9cec521ad8c58189bdff857beb7b3a5d8711
                                                      • Opcode Fuzzy Hash: 88554fab2a861b58216585fa88a552d66bcc3b325aa0be243bc6fdf01ca1c5b8
                                                      • Instruction Fuzzy Hash: 0BF14071E002199FEF14CFA9D9806AEB7B1FF88314F15826EE815AB391D734AD45CB84
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %$+
                                                      • API String ID: 0-2626897407
                                                      • Opcode ID: 36a6a2b16b85ba2849e5d178c59f18e8beb5d9c5f34f8c7dbab4148fb496f9e3
                                                      • Instruction ID: d52d3cd301bff59066a000af103dcc60f87d43c20ae7eafd98871cb9ced9436e
                                                      • Opcode Fuzzy Hash: 36a6a2b16b85ba2849e5d178c59f18e8beb5d9c5f34f8c7dbab4148fb496f9e3
                                                      • Instruction Fuzzy Hash: DAF1E3729083489FC716DF28C841A6FBBE5FFC9740F054A2DFA84AB251D735EA448792
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: #dC$0
                                                      • API String ID: 0-1374298126
                                                      • Opcode ID: 4c444ca3d2d7ffa634d7edd7ebdc583f585a67efe9aa71886902e1ae55ad36fa
                                                      • Instruction ID: 6c52c93072c0f502f615a2f11e85362b20bd2ef046f9d78dd5e382c34aebb8df
                                                      • Opcode Fuzzy Hash: 4c444ca3d2d7ffa634d7edd7ebdc583f585a67efe9aa71886902e1ae55ad36fa
                                                      • Instruction Fuzzy Hash: 75B1C270E0060A8BDB28EF69D5806BFB7B1AF4C314F10691FD466A7350D738A946CB59
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __floor_pentium4
                                                      • String ID:
                                                      • API String ID: 4168288129-0
                                                      • Opcode ID: c6dcb9a33f32913b1121b77cefd39cec9bc72d6c607bcb00cda6d40ac456c89f
                                                      • Instruction ID: d09b48c3728b15114c9e30bb68e65514496e7a693c6aabbf46c87414b60c4a75
                                                      • Opcode Fuzzy Hash: c6dcb9a33f32913b1121b77cefd39cec9bc72d6c607bcb00cda6d40ac456c89f
                                                      • Instruction Fuzzy Hash: 07B23B71E046298FDB65CE28DD407EAB3B9EB44305F1445EBD80EE7240E778AE818F46
                                                      APIs
                                                      • GetTimeZoneInformation.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,004624AC,00000000,00000000,00000000), ref: 0046236B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InformationTimeZone
                                                      • String ID:
                                                      • API String ID: 565725191-0
                                                      • Opcode ID: 8da4e43e3c4b9915991f753ffc5d55cca253570e80aaea2e2331486e548f06c0
                                                      • Instruction ID: 5db3e3ebfe9a4ff53e681f409676464a354e1579271ee126d57042b3435bd5bc
                                                      • Opcode Fuzzy Hash: 8da4e43e3c4b9915991f753ffc5d55cca253570e80aaea2e2331486e548f06c0
                                                      • Instruction Fuzzy Hash: 7AC15871A00211BBDB10ABA5DD02ABF77B9EF05754F14406BF901A7291FBB88E41C79E
                                                      APIs
                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000000), ref: 0045C52C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExceptionRaise
                                                      • String ID:
                                                      • API String ID: 3997070919-0
                                                      • Opcode ID: cf677d2eb6fc521559a46a34caebfcf0a6ebd83b677c8730cfd4a32d8d2228bf
                                                      • Instruction ID: 59b4d6af6fe752d0d8b0c0d8f14623cef09dd45a9fc4b26f90253958bb6ae579
                                                      • Opcode Fuzzy Hash: cf677d2eb6fc521559a46a34caebfcf0a6ebd83b677c8730cfd4a32d8d2228bf
                                                      • Instruction Fuzzy Hash: C0B12A31210708DFDB15CF28C4D6A657BA0FF45366F258659E89ACF3A2C339E986CB44
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2e00b94a54c8ab67656906e90275d90deb24027d7a3a5bc59a9e391743175ccf
                                                      • Instruction ID: 67d2d4974181e072529f1bdb490b9094fd13436a3b646fbc079be7c42591e086
                                                      • Opcode Fuzzy Hash: 2e00b94a54c8ab67656906e90275d90deb24027d7a3a5bc59a9e391743175ccf
                                                      • Instruction Fuzzy Hash: C851F2B5800619BFDB24DF79CC89AEBB7B9EF45304F1441AEE409D3201EA799E448F54
                                                      APIs
                                                      • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0041CBCB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FeaturePresentProcessor
                                                      • String ID:
                                                      • API String ID: 2325560087-0
                                                      • Opcode ID: faf9cd37a97b9b3b6386cb726263ac3f31f8d1dd2cf71c4362aa35bcfbd4639f
                                                      • Instruction ID: c1baa41a410f9814fcbd6447b9046051df3d7879b934a32866a31019b0131d50
                                                      • Opcode Fuzzy Hash: faf9cd37a97b9b3b6386cb726263ac3f31f8d1dd2cf71c4362aa35bcfbd4639f
                                                      • Instruction Fuzzy Hash: C3514C719412058BEB19CF68DCC57AABBF0FB44314F24857AD419EB361D3B89D80CB98
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0
                                                      • API String ID: 0-4108050209
                                                      • Opcode ID: 362cf2cc3a29bafa9205c0e4d52e111d514e3929dcdb11621a59a7385fedfec7
                                                      • Instruction ID: 2b97979562506cc5354605594c9126ceb2225326e6b365b9de92285f39857739
                                                      • Opcode Fuzzy Hash: 362cf2cc3a29bafa9205c0e4d52e111d514e3929dcdb11621a59a7385fedfec7
                                                      • Instruction Fuzzy Hash: AFE1DB70A026058FCB24DF2AC481AAEB7F1BF5D314F64660ED4569B3D1D738AD42CB1A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0
                                                      • API String ID: 0-4108050209
                                                      • Opcode ID: b71a6b7ae9b48fc5f86fc8b6610f9071c236723ae5e9fa81f1223e78fefe8513
                                                      • Instruction ID: cc8971386995d2fa7c5497f2c9a6be099607917f75eb09a27d3a98d63bf1ad3f
                                                      • Opcode Fuzzy Hash: b71a6b7ae9b48fc5f86fc8b6610f9071c236723ae5e9fa81f1223e78fefe8513
                                                      • Instruction Fuzzy Hash: D8E1BD306026058FCB24CF6AC5806AFB7B1BF4D314F24665EE8569B3D0D738AD46CB59
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0
                                                      • API String ID: 0-4108050209
                                                      • Opcode ID: f02a2b27d337e01063048e64a195353d112172e48d52fecf2c1a28a6401d0476
                                                      • Instruction ID: 87a3e780d4071136c5976c1183d8d254507160c4181d416093f21edce74d01da
                                                      • Opcode Fuzzy Hash: f02a2b27d337e01063048e64a195353d112172e48d52fecf2c1a28a6401d0476
                                                      • Instruction Fuzzy Hash: 36E1BA306026068FCB24DF6AC580AAEB7B1BF4D314F24665EE4569B3D0D738AD42CB59
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0
                                                      • API String ID: 0-4108050209
                                                      • Opcode ID: b96e47928427b0a0c21b482cf705d82ce3763537efc10908e0566b1e578aa234
                                                      • Instruction ID: feec03a09c29ca0a0815d8da5c12fda092de3d7f3750945fa29634532b40282b
                                                      • Opcode Fuzzy Hash: b96e47928427b0a0c21b482cf705d82ce3763537efc10908e0566b1e578aa234
                                                      • Instruction Fuzzy Hash: 03C1BE70E006468FDB28CE68D480A6FB7B1AB4D318F14665FD8529B391C739EC46CB5A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0
                                                      • API String ID: 0-4108050209
                                                      • Opcode ID: 1b24a1dadcf75589b94f428cd02406a338e226467e82a81901e73bfc4d8fde86
                                                      • Instruction ID: f1eebeccd454205d242d44322e34987ff8393b10bcece1650c6180ea5249b53a
                                                      • Opcode Fuzzy Hash: 1b24a1dadcf75589b94f428cd02406a338e226467e82a81901e73bfc4d8fde86
                                                      • Instruction Fuzzy Hash: D5C1B0709006068FDB28CF28C4D166FBBB2BF4D314F14661FE456A7391C739A946CB99
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0
                                                      • API String ID: 0-4108050209
                                                      • Opcode ID: 19f3eb2f104937a9ba4ce9bf97ebb5c81e09374cacee412e170d31fae6462d9a
                                                      • Instruction ID: e9a2df74590cb03012087134e02c61f5bda8e9415195c706c89d131491a86a11
                                                      • Opcode Fuzzy Hash: 19f3eb2f104937a9ba4ce9bf97ebb5c81e09374cacee412e170d31fae6462d9a
                                                      • Instruction Fuzzy Hash: B2C1EE70D006058FCB25CE68E4916BFBBB1AB1D308F24662FD46697391C738AC46CB99
                                                      APIs
                                                        • Part of subcall function 0045A1E8: GetLastError.KERNEL32(?,?,0042AC26,00488110,0000000C), ref: 0045A1EC
                                                        • Part of subcall function 0045A1E8: SetLastError.KERNEL32(00000000), ref: 0045A28E
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0046762C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$InfoLocale
                                                      • String ID:
                                                      • API String ID: 3736152602-0
                                                      • Opcode ID: 1b979685bb29ceb73f22035558e28a2fd459352ed36bff75625c5bc00056e102
                                                      • Instruction ID: bb11d71983f9667a6227576f9474d040367b934177b0283d1d6ca234f9df0ff4
                                                      • Opcode Fuzzy Hash: 1b979685bb29ceb73f22035558e28a2fd459352ed36bff75625c5bc00056e102
                                                      • Instruction Fuzzy Hash: 7921B371609606ABDB189B29DC41ABB37A8EF44328F10417FFD05D6242FB3C9D41CB5A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0
                                                      • API String ID: 0-4108050209
                                                      • Opcode ID: ebeada03c770d6bf14a5167a9fbc72d796bbfb2180abd8baf25290e7af970b94
                                                      • Instruction ID: d6a45ad3b5fa27cd2b89abbf3788881750f86e910223ed5087272025b673c5b8
                                                      • Opcode Fuzzy Hash: ebeada03c770d6bf14a5167a9fbc72d796bbfb2180abd8baf25290e7af970b94
                                                      • Instruction Fuzzy Hash: 14B1BC70E0060A8ADB24CF69E981ABFF7B1AF4C304F10691FD456A7390D738AD46CB59
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0
                                                      • API String ID: 0-4108050209
                                                      • Opcode ID: 0d1d6ef029c7c960c48569510a9921d0ec7debf9ecd410e3c89b03bf905ff586
                                                      • Instruction ID: 38580a0737739e9f66d979bf2169e12f227c2b79bcf2f6bba8325e7372df0fa0
                                                      • Opcode Fuzzy Hash: 0d1d6ef029c7c960c48569510a9921d0ec7debf9ecd410e3c89b03bf905ff586
                                                      • Instruction Fuzzy Hash: B0B10170E00A098ACB24DF65D881ABFBBF1AF5C304F10651FE452AB390D738AD46CB59
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0
                                                      • API String ID: 0-4108050209
                                                      • Opcode ID: 0cfc83da8dea6943ba02a26357f17333c8f090607384c5e71c1197662d7e9070
                                                      • Instruction ID: 1a27a992dbbcdb2ab8a7b9f4b2d4714080ad2c4bee61819668de7279470fd946
                                                      • Opcode Fuzzy Hash: 0cfc83da8dea6943ba02a26357f17333c8f090607384c5e71c1197662d7e9070
                                                      • Instruction Fuzzy Hash: 4EB1C27090060A9BCB28DF6989D66BFB7A1AF09304F24251FD852B7391D73CDA42CF59
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0
                                                      • API String ID: 0-4108050209
                                                      • Opcode ID: 6d19cd1d13ac76ecf8266acfa447097619654e493ba946ead0a70bff20f45f9e
                                                      • Instruction ID: 3be2b21145cb6cbc105f352b17f45cfa2c770c676c33eb2f808ca57be6b730dc
                                                      • Opcode Fuzzy Hash: 6d19cd1d13ac76ecf8266acfa447097619654e493ba946ead0a70bff20f45f9e
                                                      • Instruction Fuzzy Hash: 4FB1E07190071A9BCB248F68C4E56BFB7B1AB0C304F24661FD852F7391D738A942CB5A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0
                                                      • API String ID: 0-4108050209
                                                      • Opcode ID: 95066677799f5983d3c47783897273c6c134eb2cbbf4e83d8c014383d022ccf5
                                                      • Instruction ID: 1b462bcf2fcfa2ee43728c1c89adf31b6d502c0fcb87b037d300a39e31fd93e6
                                                      • Opcode Fuzzy Hash: 95066677799f5983d3c47783897273c6c134eb2cbbf4e83d8c014383d022ccf5
                                                      • Instruction Fuzzy Hash: 9AB1AFB090060A8BCB24DF6888D57BFB7A1AF0D314F14261FD556F7391C739A942CB5A
                                                      APIs
                                                        • Part of subcall function 0045A1E8: GetLastError.KERNEL32(?,?,0042AC26,00488110,0000000C), ref: 0045A1EC
                                                        • Part of subcall function 0045A1E8: SetLastError.KERNEL32(00000000), ref: 0045A28E
                                                      • EnumSystemLocalesW.KERNEL32(00467385,00000001,00000000,?,-00000050,?,004679B6,00000000,?,?,?,00000055,?), ref: 004672D1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$EnumLocalesSystem
                                                      • String ID:
                                                      • API String ID: 2417226690-0
                                                      • Opcode ID: 9ee2da1212caff95860b24e5c2deab9f76be5edeb211baa3bd712925980a00b4
                                                      • Instruction ID: 0e373008b811f66bfc53cd95a85ed17c613b527dcf0a9fb3ab194419ca9101e0
                                                      • Opcode Fuzzy Hash: 9ee2da1212caff95860b24e5c2deab9f76be5edeb211baa3bd712925980a00b4
                                                      • Instruction Fuzzy Hash: BA110C3B2047015FDB189F39D8A167ABB91FF8036CB18452EE98787740E7797942C744
                                                      APIs
                                                      • IsDebuggerPresent.KERNEL32 ref: 004627A0
                                                        • Part of subcall function 0046EA8B: OutputDebugStringW.KERNEL32(00000000,?,?,?,?), ref: 0046EAE1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DebugDebuggerOutputPresentString
                                                      • String ID:
                                                      • API String ID: 4086329628-0
                                                      • Opcode ID: 9df79618a6ea69d87d4e1a64e5e017969b54b273366e47cf88bdcfb703f1ad93
                                                      • Instruction ID: 95af80e9bdd58314010cbd1d4e417dd9d23214800fc513518d6e01de1786c604
                                                      • Opcode Fuzzy Hash: 9df79618a6ea69d87d4e1a64e5e017969b54b273366e47cf88bdcfb703f1ad93
                                                      • Instruction Fuzzy Hash: CCF0F431001526BADF213EA25E46FAF270CAF01367F14440BFD149A283EA6DCC15A1BF
                                                      APIs
                                                        • Part of subcall function 0045A1E8: GetLastError.KERNEL32(?,?,0042AC26,00488110,0000000C), ref: 0045A1EC
                                                        • Part of subcall function 0045A1E8: SetLastError.KERNEL32(00000000), ref: 0045A28E
                                                      • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00467682,00000000,00000000,?), ref: 00467833
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$InfoLocale
                                                      • String ID:
                                                      • API String ID: 3736152602-0
                                                      • Opcode ID: dcf8e0b52450cc5d31c129d8f966a4c3d7590ce991316372d978023d88763d4e
                                                      • Instruction ID: da50a92f2d467d9071605e126e847dd024fe15dfb88cfe5addb1bbdbe4a3a30e
                                                      • Opcode Fuzzy Hash: dcf8e0b52450cc5d31c129d8f966a4c3d7590ce991316372d978023d88763d4e
                                                      • Instruction Fuzzy Hash: 16F0F932A04212BBDB246B228C49BBB7754EB4075CF14482AED06A3340FA78FE41C696
                                                      APIs
                                                        • Part of subcall function 0045A1E8: GetLastError.KERNEL32(?,?,0042AC26,00488110,0000000C), ref: 0045A1EC
                                                        • Part of subcall function 0045A1E8: SetLastError.KERNEL32(00000000), ref: 0045A28E
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 004671A3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$InfoLocale
                                                      • String ID: 0G$utf8
                                                      • API String ID: 3736152602-304224658
                                                      • Opcode ID: c4d66a81324911c88fcf208b821201eaeeb271531dcae25a180b4c7a4b1cfb1c
                                                      • Instruction ID: fa072aaf3621b6c600f7ee6d49297d799d099921117ef1e626a9e774d74d0052
                                                      • Opcode Fuzzy Hash: c4d66a81324911c88fcf208b821201eaeeb271531dcae25a180b4c7a4b1cfb1c
                                                      • Instruction Fuzzy Hash: 1EF02832650105ABC714AF35DC45EFE37A8DB45319F10017FBA02D7242EE7CAD058759
                                                      APIs
                                                        • Part of subcall function 0045A1E8: GetLastError.KERNEL32(?,?,0042AC26,00488110,0000000C), ref: 0045A1EC
                                                        • Part of subcall function 0045A1E8: SetLastError.KERNEL32(00000000), ref: 0045A28E
                                                      • EnumSystemLocalesW.KERNEL32(004675D8,00000001,?,?,-00000050,?,0046797A,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 00467344
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$EnumLocalesSystem
                                                      • String ID:
                                                      • API String ID: 2417226690-0
                                                      • Opcode ID: b7a0f810bcfe53e07d7fc70bb075c146880630caba9b778147e9f9a0d2b0c5cc
                                                      • Instruction ID: fc74b1aa4cc07033185a3d517e1fa4bb0f3d8f3c1d36491c739fe7c6330149b4
                                                      • Opcode Fuzzy Hash: b7a0f810bcfe53e07d7fc70bb075c146880630caba9b778147e9f9a0d2b0c5cc
                                                      • Instruction Fuzzy Hash: 6FF046322043041FDB245F359C81A7A7B90EF8136CF08846EFE0A8B780EA75AC82D758
                                                      APIs
                                                        • Part of subcall function 00446CD0: EnterCriticalSection.KERNEL32(?,?,00459A2C,?,004886F0,00000008,00459E1F,?,?,?), ref: 00446CDF
                                                      • EnumSystemLocalesW.KERNEL32(0045865F,00000001,00488690,0000000C,00458F9F,00000000), ref: 004586AA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalEnterEnumLocalesSectionSystem
                                                      • String ID:
                                                      • API String ID: 1272433827-0
                                                      • Opcode ID: dbfcf1c1844c2670dc3e1d1cd3b4c41c7e0815f0b3f5e6156f2c1d3ba676acf2
                                                      • Instruction ID: 5bc693e36aa8646ff851b2630d08f11eefc5b773928b724c4f2137103c0c6ce8
                                                      • Opcode Fuzzy Hash: dbfcf1c1844c2670dc3e1d1cd3b4c41c7e0815f0b3f5e6156f2c1d3ba676acf2
                                                      • Instruction Fuzzy Hash: D0F03772A50200DFD700EF99E842B9D77A0FB09725F20452FF910AB2A1CBB94944CF49
                                                      APIs
                                                      • GetLocaleInfoEx.KERNEL32(?,00000022,00000000,00000002,?,?,00418FEF,00000000,?,00000004,004179DE,?,00000004,00417FE5,00000000,00000000), ref: 0041B826
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID:
                                                      • API String ID: 2299586839-0
                                                      • Opcode ID: c6ef6c353049330d652d419a0b2e035ad532233f5d5632a0da15e87606c45c39
                                                      • Instruction ID: febf0681777082d932c0a5b3cec477021a98970a47090d25a8469f69ea1c011e
                                                      • Opcode Fuzzy Hash: c6ef6c353049330d652d419a0b2e035ad532233f5d5632a0da15e87606c45c39
                                                      • Instruction Fuzzy Hash: 7AE0D836290204B6E709EBBCDD0FFEB369CDB01B0AF104256F106E51C1CBA8CB80D199
                                                      APIs
                                                        • Part of subcall function 0045A1E8: GetLastError.KERNEL32(?,?,0042AC26,00488110,0000000C), ref: 0045A1EC
                                                        • Part of subcall function 0045A1E8: SetLastError.KERNEL32(00000000), ref: 0045A28E
                                                      • EnumSystemLocalesW.KERNEL32(0046714F,00000001,?,?,?,004679D8,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 0046722D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$EnumLocalesSystem
                                                      • String ID:
                                                      • API String ID: 2417226690-0
                                                      • Opcode ID: 10858563b50706b110efb2549e88d005adbe6ccf9c0965e19481c3c1a2a946a4
                                                      • Instruction ID: 48d77c2d811d545978aa0e75d8ef70d8b4718f83900eb4a4eaa4e20278e4d721
                                                      • Opcode Fuzzy Hash: 10858563b50706b110efb2549e88d005adbe6ccf9c0965e19481c3c1a2a946a4
                                                      • Instruction Fuzzy Hash: 29F0553630020557CB04AF35CC156ABBF94EFC2728B4A409EFE198B340DA399883CBA5
                                                      APIs
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,004576BB,?,20001004,00000000,00000002,?,?,00456A33), ref: 00459162
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID:
                                                      • API String ID: 2299586839-0
                                                      • Opcode ID: 344f6520afc24cf18c64a15da9c2abc93e0ce26bc415b2b473480c1388c7168b
                                                      • Instruction ID: fcc5a3cc7e2871adbfd58104ad54b877ca3188bb0237113c517d5ddcd7247c7a
                                                      • Opcode Fuzzy Hash: 344f6520afc24cf18c64a15da9c2abc93e0ce26bc415b2b473480c1388c7168b
                                                      • Instruction Fuzzy Hash: F8E04F31541628FBDF122F61DC09EAE3F19EF44762F04442AFD0966262CF398D21AA99
                                                      APIs
                                                      • EnumSystemLocalesW.KERNEL32(Function_0006865F,00000001), ref: 0045881D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: EnumLocalesSystem
                                                      • String ID:
                                                      • API String ID: 2099609381-0
                                                      • Opcode ID: 0fe193306ef79eca68474028d4a4079bdc2af0d366a8e1bbcade256144c21c12
                                                      • Instruction ID: f01a687fe11880dba9b96032c98ec2ecdd2e8490e8a276ab8ad65a5f60c0743b
                                                      • Opcode Fuzzy Hash: 0fe193306ef79eca68474028d4a4079bdc2af0d366a8e1bbcade256144c21c12
                                                      • Instruction Fuzzy Hash: 28D09231594304ABDB446F52EC4AA143B66F785725F64082EF908662A2DFFA68518A4C
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_0002D08E,0041C174), ref: 0041D084
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: 92c4597ba61eb7137caee8de41abc8c807fdcd7f2ca210af8783842640dc1d05
                                                      • Instruction ID: cc9aedb05a62b1d87b9331fd306dd5cb774320c7ac43f4f888dfe8ccb5d7669e
                                                      • Opcode Fuzzy Hash: 92c4597ba61eb7137caee8de41abc8c807fdcd7f2ca210af8783842640dc1d05
                                                      • Instruction Fuzzy Hash:
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocHeap
                                                      • String ID:
                                                      • API String ID: 4292702814-0
                                                      • Opcode ID: bb43d45be5e09e650bd98d7837c3faac526adc4de985947fbf36a808a616297c
                                                      • Instruction ID: ace1281d83fbfc78b99edd7c53b3effd0b366cfa6e70299e357a6c82325c6cde
                                                      • Opcode Fuzzy Hash: bb43d45be5e09e650bd98d7837c3faac526adc4de985947fbf36a808a616297c
                                                      • Instruction Fuzzy Hash: 2332A474A00206DFCF18CF98CA81ABEB7B5EF46305F24416EDC41A7316D675AE4ACB94
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dc234cc5b6bcedc6e5f4cbfcf4ada8d3665ec171457eb7034c8c541d9753a991
                                                      • Instruction ID: 763259b6fbf7c47b902b8f02445e574d18871aea2058d14c5c16afe085d9f3c4
                                                      • Opcode Fuzzy Hash: dc234cc5b6bcedc6e5f4cbfcf4ada8d3665ec171457eb7034c8c541d9753a991
                                                      • Instruction Fuzzy Hash: A5126E71A012298FEB65CF18C8C0BAAB7B9FF45304F1840EAD949EB245D7749E81CF85
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9e05f526d6c0918f504bedfe13be593fa5d9bb95389b53d6cc604d22c41471a2
                                                      • Instruction ID: 30efc4feacad5b962f27ef9251d6d8f03a02b1f1cc72120d648e012e1214cf6a
                                                      • Opcode Fuzzy Hash: 9e05f526d6c0918f504bedfe13be593fa5d9bb95389b53d6cc604d22c41471a2
                                                      • Instruction Fuzzy Hash: C5E17075A002288FDB25DF58D880BAAB7B8FF46305F1441EBE849A7342D7349E858F46
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 05dbc3d2f66e467b2961a582e45db2979010f1329c0676bb916b8b98d7f6372a
                                                      • Instruction ID: 07180a4dfcab4c9ef81a4d958d75507219a206095ca2d300c739c31b200b4781
                                                      • Opcode Fuzzy Hash: 05dbc3d2f66e467b2961a582e45db2979010f1329c0676bb916b8b98d7f6372a
                                                      • Instruction Fuzzy Hash: B5B1B272D112188BDB11DFB9C4812DDF7B1AFAA314F29C36BD824B7360E735AA818744
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 65070c2f9e41076afd7605473aae0f998b1369b75fbd57c50fe5d59937156dfd
                                                      • Instruction ID: 6ee2794eb5f6d75bff4ba8e1ed424a5af377e3ece473b5fd783f6a92fd368621
                                                      • Opcode Fuzzy Hash: 65070c2f9e41076afd7605473aae0f998b1369b75fbd57c50fe5d59937156dfd
                                                      • Instruction Fuzzy Hash: DFA12C75A001698BDB24DF18C880BEEB7B5FB89304F2541EBDC09A7341D775AE858F85
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6ae62b88f01cb4a4f6514a758ad5d2aa8a52e993fd2c7fac2ce4aaa76944c7f0
                                                      • Instruction ID: b60f13c6188ec48b1cccdcfa597e7a896a271098bd635ec14d0b3111ca6c0ce2
                                                      • Opcode Fuzzy Hash: 6ae62b88f01cb4a4f6514a758ad5d2aa8a52e993fd2c7fac2ce4aaa76944c7f0
                                                      • Instruction Fuzzy Hash: 54516371E00119AFDF14CF99C941AEEBBB1EF84314F19809DE415AB341D734AE51CB95
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                      • Instruction ID: 2e76678fa799f5b04324568693b925fb87d3834662be7ee633d99751084251d9
                                                      • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                      • Instruction Fuzzy Hash: 35110B7F20004183D614862FCDF86F7A795EACA321B2C4377D8424B758F12A95C5A68C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 391a6573f4fe22a487b3b1aca6a1e80b04b61327a8dfff2c957b84f3a8b165d4
                                                      • Instruction ID: 3c6a6e894cb6101d2f68335ecb96ffd08ee090a42de256459aa3be59981486b7
                                                      • Opcode Fuzzy Hash: 391a6573f4fe22a487b3b1aca6a1e80b04b61327a8dfff2c957b84f3a8b165d4
                                                      • Instruction Fuzzy Hash: CEF040322002219BC716DA9CCA48B9573B8EB09B01F004247EA02EB352D2A8CE04C3CA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 44791a8bd089cea976374833b5e5a08ed1a89722e1081bd559db93eb5a52482f
                                                      • Instruction ID: 30e8bbe1eff847ca9a1d5c7d950bfd249b4d87372d0163212749e414f9960af6
                                                      • Opcode Fuzzy Hash: 44791a8bd089cea976374833b5e5a08ed1a89722e1081bd559db93eb5a52482f
                                                      • Instruction Fuzzy Hash: 1DF06D3124020CFFC716CA6DC549F5973E4EB05707F204666AA07DB752E678DE58C60A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e6d9ec40200cb10b7115b5ec3d5aa2eb1304b9d01f7512890e7f56a34e7429e8
                                                      • Instruction ID: 992a941f9a9278038402b39fd98fe1862c14f7ebf83d5bb28925baab49c1af3b
                                                      • Opcode Fuzzy Hash: e6d9ec40200cb10b7115b5ec3d5aa2eb1304b9d01f7512890e7f56a34e7429e8
                                                      • Instruction Fuzzy Hash: 73F0A031610220DBCB12CB8EC845B4973BCEB09B95F11405BE841E7252CBB8ED44CBD4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0fa490093fb1ccd5579076fc6fc5896914ea530780350ad677dbcd92b4cf2393
                                                      • Instruction ID: d9baad4cc46a75719148bddb089033ab6ea5fc5834014878945acf2b2dda3dd3
                                                      • Opcode Fuzzy Hash: 0fa490093fb1ccd5579076fc6fc5896914ea530780350ad677dbcd92b4cf2393
                                                      • Instruction Fuzzy Hash: D8E06D39600248EFCB45CF5AC544F0AB3F8EB49749F10406DE809D7652E738DE44CB54
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 66a8bd449331e0fbaff9db047ca477c3f5c70dcfc62e26df1ed4ec29e47070cf
                                                      • Instruction ID: 59e521a1b95270436db776aa525ad5e9776d56dbc4122a677bba2d83919c8c19
                                                      • Opcode Fuzzy Hash: 66a8bd449331e0fbaff9db047ca477c3f5c70dcfc62e26df1ed4ec29e47070cf
                                                      • Instruction Fuzzy Hash: 94E06D35600248EFCB45CF6AC584F0973F8EB49789F108069E845D7752E738DE44CB54
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d9d4e2dfcbfd14504dd5c583896d366168cbc076de7f7db6caaae018fb7c7fb6
                                                      • Instruction ID: 8a890c79ff57300802864f0d721017863850aa235fe387ff2e2004d40e088d21
                                                      • Opcode Fuzzy Hash: d9d4e2dfcbfd14504dd5c583896d366168cbc076de7f7db6caaae018fb7c7fb6
                                                      • Instruction Fuzzy Hash: 8CE08C32911228EBCB15DB9DC90498AF3FCEB48B06B1201ABF901E3202C674DE04C7D4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a167dba0b7fe516a20e84a041e270c8a941c5198453821c7edd0995884e7b0c9
                                                      • Instruction ID: 90513425b63049aea5bfb43dc6de30ecb73ac61fb036262dec07327c0735fc05
                                                      • Opcode Fuzzy Hash: a167dba0b7fe516a20e84a041e270c8a941c5198453821c7edd0995884e7b0c9
                                                      • Instruction Fuzzy Hash: B6E08230905248EFCB00CBA9C048E4AB3F8EB0834AF2048A9E804D7242D638EE88CA00
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c90b54524ff4a66a353ae9917df2b8be735c315749e427826934948b66141c99
                                                      • Instruction ID: cdb87c87c0ac02fc8090e8aa9c19c02475ebe9987d53c655645564bc5f7521b5
                                                      • Opcode Fuzzy Hash: c90b54524ff4a66a353ae9917df2b8be735c315749e427826934948b66141c99
                                                      • Instruction Fuzzy Hash: 2FC0123804098086CE29CA1882753BA33A8AB9A7C3F80148EC8120AB43C51E9C8ADB05

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1308 426dbc-426dcf 1309 426dd5-426dd7 1308->1309 1310 42714e-42715b call 423c54 1308->1310 1311 426dd9-426ddb 1309->1311 1312 426ddd-426ddf 1309->1312 1320 42715e 1310->1320 1311->1312 1314 426de5-426df5 1311->1314 1312->1314 1316 42714a-42714c 1312->1316 1317 426df7-426dfb 1314->1317 1318 426e1d-426e1f 1314->1318 1319 427140-427148 call 4238b5 1316->1319 1317->1310 1322 426e01-426e11 1317->1322 1318->1316 1323 426e25-426e28 1318->1323 1319->1320 1321 427161-427165 1320->1321 1325 426e13-426e16 1322->1325 1326 426e18-426e1b 1322->1326 1323->1316 1327 426e2e-426e31 1323->1327 1325->1326 1325->1327 1326->1327 1327->1316 1329 426e37-426e52 1327->1329 1330 426e58-426e5b 1329->1330 1331 426f3f-426f42 1329->1331 1334 426e61-426e9e call 423813 call 423c98 1330->1334 1335 426efe-426eff 1330->1335 1332 426fc2-426fd1 1331->1332 1333 426f44-426f53 1331->1333 1338 426fd3-426ff3 call 425a9c call 423c98 1332->1338 1339 426ff5-426fff call 425a9c call 423f22 1332->1339 1336 426fb3-426fbd call 4253a0 call 423f22 1333->1336 1337 426f55-426f83 call 4253a0 call 423c29 call 423c98 1333->1337 1370 426ea0-426ecf call 4283b4 call 423c29 call 423c98 1334->1370 1371 426ed1-426ef0 call 4238b5 call 423c98 1334->1371 1341 426f05-426f09 1335->1341 1336->1332 1337->1332 1365 427004-427008 1338->1365 1339->1365 1347 426f96-426fae call 4238b5 call 423c98 1341->1347 1348 426f0f-426f11 1341->1348 1347->1320 1348->1316 1355 426f17-426f2c 1348->1355 1362 426f85-426f94 call 429394 call 423f22 1355->1362 1363 426f2e-426f3c call 429394 1355->1363 1362->1331 1363->1331 1373 427034-427044 call 4272a0 1365->1373 1374 42700a-427031 call 423c29 call 423cba 1365->1374 1398 426ef3-426efc 1370->1398 1371->1398 1394 427046-42704b 1373->1394 1395 42704d 1373->1395 1374->1373 1399 42704f-427094 call 428385 call 424fe9 call 423c29 call 423cba call 423d92 1394->1399 1395->1399 1398->1341 1411 427096-427098 1399->1411 1412 4270ac-4270b8 1399->1412 1411->1412 1413 42709a-4270a6 call 423d92 1411->1413 1414 4270ba-4270c9 call 42826c call 423d92 1412->1414 1415 4270cb-4270d5 call 42826c call 423f22 1412->1415 1413->1412 1425 4270da-4270fd call 42732a call 423d92 1414->1425 1415->1425 1430 427110-42711a call 4293c3 call 423f22 1425->1430 1431 4270ff-42710e call 4293c3 call 423d92 1425->1431 1439 42711f-427121 1430->1439 1431->1439 1440 427123-42713c 1439->1440 1441 42713e 1439->1441 1440->1321 1441->1319
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Name::operator+$NameName::$Decorator::getReturnTypeoperator+
                                                      • String ID:
                                                      • API String ID: 2932655852-0
                                                      • Opcode ID: 4242e687256c9fc5f5ec6ccd2b453579edffa5275be1e6c6ab62c45d589fed60
                                                      • Instruction ID: a5cde05aafc80c3bfaaca524e4471942dfda28ae7e749830cce3f4058e95a966
                                                      • Opcode Fuzzy Hash: 4242e687256c9fc5f5ec6ccd2b453579edffa5275be1e6c6ab62c45d589fed60
                                                      • Instruction Fuzzy Hash: D6C1A176A04228AFDB04EF95E895EEE77B4EF08304F91006FF501A7381DB389A45CB58

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1442 4283b4-4283ca 1443 4283cc-4283d5 1442->1443 1444 428704-42870d 1443->1444 1445 4283db-4283dd 1443->1445 1446 428720-428725 1444->1446 1447 42870f-428711 1444->1447 1445->1444 1448 4283e3-4283ea 1445->1448 1451 428730-428768 call 4238b5 call 423c76 call 423c98 1446->1451 1452 428727-42872e call 423b92 1446->1452 1449 428713-42871e 1447->1449 1450 42876b-428771 1447->1450 1453 4283f9-4283fc 1448->1453 1454 4283ec-4283f3 1448->1454 1449->1450 1451->1450 1452->1450 1455 428450-428458 1453->1455 1456 4283fe-428431 call 423813 call 423c98 1453->1456 1454->1450 1454->1453 1461 4286d2-4286df call 429c74 1455->1461 1462 42845e-42846d 1455->1462 1456->1455 1486 428433-42844d call 423c29 1456->1486 1479 4286e2 1461->1479 1465 428473-428476 1462->1465 1466 4286b5-4286d0 call 429c74 1462->1466 1471 42865c-4286a8 call 423793 call 423813 call 423c98 1465->1471 1472 42847c-42847f 1465->1472 1466->1479 1505 4286fa-4286fe 1471->1505 1518 4286aa-4286b3 call 423ee2 1471->1518 1477 428485-428489 1472->1477 1478 4285c9-4285cf 1472->1478 1477->1471 1487 42848f-428492 1477->1487 1482 428623-428657 call 4263f1 call 423c29 call 423cba 1478->1482 1483 4285d1-4285d5 1478->1483 1488 4286e5-4286e9 call 423c98 1479->1488 1482->1488 1483->1482 1490 4285d7-428612 call 4273cc call 423c98 1483->1490 1486->1455 1494 428588-4285c4 call 429c74 call 423cba call 423c98 1487->1494 1495 428498-42849b 1487->1495 1498 4286ee-4286f7 1488->1498 1490->1505 1522 428618-42861e 1490->1522 1494->1498 1496 4284af-4284bc 1495->1496 1497 42849d-4284aa call 4271ff 1495->1497 1508 4284c1-4284d6 call 429c74 1496->1508 1497->1488 1498->1505 1505->1443 1505->1444 1524 428524-42852c 1508->1524 1525 4284d8-4284da 1508->1525 1518->1505 1522->1505 1532 42852d-428532 1524->1532 1529 42851c-428522 1525->1529 1530 4284dc-42851a call 423d3a call 423c98 1525->1530 1529->1532 1530->1532 1533 428534-42853c 1532->1533 1534 428578-428583 1532->1534 1533->1508 1536 42853e-428540 1533->1536 1534->1505 1536->1534 1538 428542-428573 call 423c29 call 423cba 1536->1538 1538->1522
                                                      APIs
                                                      • DName::operator+.LIBCMT ref: 0042841F
                                                      • DName::operator+.LIBCMT ref: 00428562
                                                        • Part of subcall function 00423D3A: shared_ptr.LIBCMT ref: 00423D56
                                                      • DName::operator+.LIBCMT ref: 0042850D
                                                      • DName::operator+.LIBCMT ref: 004285AE
                                                      • DName::operator+.LIBCMT ref: 004285BD
                                                      • DName::operator+.LIBCMT ref: 004286E9
                                                      • DName::operator=.LIBVCRUNTIME ref: 00428729
                                                      • DName::DName.LIBVCRUNTIME ref: 00428733
                                                      • DName::operator+.LIBCMT ref: 00428750
                                                      • DName::operator+.LIBCMT ref: 0042875C
                                                        • Part of subcall function 00429C74: Replicator::operator[].LIBCMT ref: 00429CB1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Name::operator+$NameName::Name::operator=Replicator::operator[]shared_ptr
                                                      • String ID:
                                                      • API String ID: 1043660730-0
                                                      • Opcode ID: c1b264d577488d8edfba1feb5eb5c37d4f11401ca2c081994e4791fe3fcdfbe1
                                                      • Instruction ID: 414f92ddf917af93faee912682137a1df939f0604a93fdf62e51079cee6b6001
                                                      • Opcode Fuzzy Hash: c1b264d577488d8edfba1feb5eb5c37d4f11401ca2c081994e4791fe3fcdfbe1
                                                      • Instruction Fuzzy Hash: 94C1C371A012249FDB24DFA4E849FEEB7F4AF15304F94449FE146A7281DB7D9A44CB08
                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 003F59ED
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 003F5A07
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 003F5A28
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 003F5A54
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 003F5A89
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 003F5AC6
                                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 003F5B17
                                                      • __Getctype.LIBCPMT ref: 003F5B2E
                                                      • std::_Facet_Register.LIBCPMT ref: 003F5B47
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 003F5B60
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::~_$Lockit::_$Facet_GetctypeLocinfo::_Locinfo_ctorRegister
                                                      • String ID: bad locale name
                                                      • API String ID: 1407599034-1405518554
                                                      • Opcode ID: b909ad2e58b154654d2c3bff5ea1351cb821a6c31b8570b92b6f00076271cbf6
                                                      • Instruction ID: 634de901754b733bed872be614f8eb2873c56435bf5eb55f4954ffce6664413c
                                                      • Opcode Fuzzy Hash: b909ad2e58b154654d2c3bff5ea1351cb821a6c31b8570b92b6f00076271cbf6
                                                      • Instruction Fuzzy Hash: 574137316043889FC712DF58D880B7AB7E0FF94710F05496EFA899B252DB35E909CB92
                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 003F5F7D
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 003F5F97
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 003F5FB8
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 003F5FE4
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 003F6019
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 003F6056
                                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 003F60A7
                                                      • std::_Facet_Register.LIBCPMT ref: 003F60C6
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 003F60DF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::~_$Lockit::_$Facet_Locinfo::_Locinfo_ctorRegister
                                                      • String ID: bad locale name
                                                      • API String ID: 3434717313-1405518554
                                                      • Opcode ID: dcc3e752a5039425cc3ce0824ec91ad3949885ab0315595d03aab3cac38b8caa
                                                      • Instruction ID: e52dfe4da749d199823bccb10c5e6d914afb6182a4a453fec1939d5ccc40e512
                                                      • Opcode Fuzzy Hash: dcc3e752a5039425cc3ce0824ec91ad3949885ab0315595d03aab3cac38b8caa
                                                      • Instruction Fuzzy Hash: 4E4125312043489FC312DF58D881B6AF7E0EF91310F15486EFA899B261DB35ED09CB96
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: shared_ptr$operator+$Name::operator+Name::operator=
                                                      • String ID:
                                                      • API String ID: 1464150960-0
                                                      • Opcode ID: 8d279420f24d8b2b10f8b99818521fe0743273ec9b623a3c42be63cd3713784c
                                                      • Instruction ID: fce002f16474c29a4ed36056954a21a2618652d5ad34001ea683c8a8fd3cc9df
                                                      • Opcode Fuzzy Hash: 8d279420f24d8b2b10f8b99818521fe0743273ec9b623a3c42be63cd3713784c
                                                      • Instruction Fuzzy Hash: 2CE169B1E0062ADACB04DF95E498AFFBBB4EF04304F90815BD516A7241D77C4A49CF99
                                                      APIs
                                                      • Replicator::operator[].LIBCMT ref: 00429CB1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Replicator::operator[]
                                                      • String ID: @$generic-type-$template-parameter-
                                                      • API String ID: 3676697650-1320211309
                                                      • Opcode ID: b53610955d8068a9a12a771f7b2e73f8559dcd42d76b85e4ca0d07439677619d
                                                      • Instruction ID: 532a77ca1f711164bcbd51e229507536b5a65f36d71e914ad744e0f85bdfa4a4
                                                      • Opcode Fuzzy Hash: b53610955d8068a9a12a771f7b2e73f8559dcd42d76b85e4ca0d07439677619d
                                                      • Instruction Fuzzy Hash: EC61D271E002199FDB10DFA5E845AEEB7B8AF18304F90806BE505A7291DB7C9D05CB9D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __aulldiv
                                                      • String ID: :$f$f$f$p$p$p
                                                      • API String ID: 3732870572-1434680307
                                                      • Opcode ID: 53faec21a0f61ad56f913964f669a59e52bd3e7363a596dc7a2b68de40648e67
                                                      • Instruction ID: 271921236e9888cadef87aeda415862ef256f4db4c08b6b54523f77e52683e30
                                                      • Opcode Fuzzy Hash: 53faec21a0f61ad56f913964f669a59e52bd3e7363a596dc7a2b68de40648e67
                                                      • Instruction Fuzzy Hash: A80292759002189BFF30CF64D6496EEB7B6FF42B14FA1810BD4157B286D7388E858B1A
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00412607
                                                        • Part of subcall function 00409020: __EH_prolog3.LIBCMT ref: 00409027
                                                        • Part of subcall function 00409020: std::_Lockit::_Lockit.LIBCPMT ref: 00409031
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog3$LockitLockit::_std::_
                                                      • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                                      • API String ID: 2181796688-2891247106
                                                      • Opcode ID: ee78f738b5d791e510dcfc4965dbdc39ea97b6c73f5f38c9b9ad9b4424f1a1df
                                                      • Instruction ID: 75655a606b08c9a63ce2cd3c95dc9768b60f5f17d312400a7c17efb4fcc91276
                                                      • Opcode Fuzzy Hash: ee78f738b5d791e510dcfc4965dbdc39ea97b6c73f5f38c9b9ad9b4424f1a1df
                                                      • Instruction Fuzzy Hash: E5C181B250010AAFDF18DF58CA55DFF7BA8EB04304F14411BFA16E6291D678DAA0CB69
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 004129F7
                                                        • Part of subcall function 004090B5: __EH_prolog3.LIBCMT ref: 004090BC
                                                        • Part of subcall function 004090B5: std::_Lockit::_Lockit.LIBCPMT ref: 004090C6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog3$LockitLockit::_std::_
                                                      • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                                      • API String ID: 2181796688-2891247106
                                                      • Opcode ID: 8d4768357198707abb3cfe9af3d93f76d864ed6b8a38e29388da948788bbd64f
                                                      • Instruction ID: 637e9393de0fcaa62c429f9af951396c962f9f37bec9bb7c7b2318c15b26907a
                                                      • Opcode Fuzzy Hash: 8d4768357198707abb3cfe9af3d93f76d864ed6b8a38e29388da948788bbd64f
                                                      • Instruction Fuzzy Hash: 4DC1817250010AABDB18DF58CA65DFF7BB8EF05304F15411BFA06E6251D278DAA0CB69
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00419CEE
                                                        • Part of subcall function 003F59E0: std::_Lockit::_Lockit.LIBCPMT ref: 003F59ED
                                                        • Part of subcall function 003F59E0: std::_Lockit::_Lockit.LIBCPMT ref: 003F5A07
                                                        • Part of subcall function 003F59E0: std::_Lockit::~_Lockit.LIBCPMT ref: 003F5A28
                                                        • Part of subcall function 003F59E0: std::_Lockit::~_Lockit.LIBCPMT ref: 003F5A54
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                                      • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                                      • API String ID: 1383202999-2891247106
                                                      • Opcode ID: 5b7a16d910241c0936fc5ff66c198bb8b78238579b9f4e2117081fd357d08d51
                                                      • Instruction ID: 882cf3528909a99356e8ea24f9475fbddb0d005f209b34a0d2c832906bc422ee
                                                      • Opcode Fuzzy Hash: 5b7a16d910241c0936fc5ff66c198bb8b78238579b9f4e2117081fd357d08d51
                                                      • Instruction Fuzzy Hash: 85C1817254020AAFDB18DF58C965DFF3BE8EB09300F14451BF606E6291D239DE91CB6A
                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 003F7272
                                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 003F72C7
                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 003F7391
                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 003F7396
                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 003F739B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::cancel_current_task$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                      • String ID: bad locale name$false$true
                                                      • API String ID: 164343898-1062449267
                                                      • Opcode ID: 3cedb9d7275991b956e1ab5a0226b29e1aff321f3185218a77d718fa976dd63f
                                                      • Instruction ID: 532247e06a895261ef1f3af79f16cbb1613659b972f69e3b5325bfea70ff3fb3
                                                      • Opcode Fuzzy Hash: 3cedb9d7275991b956e1ab5a0226b29e1aff321f3185218a77d718fa976dd63f
                                                      • Instruction Fuzzy Hash: 9D41DE741483449FD721EF65C841B6ABBE4AF84300F04495EFA888B391D7B9D449CBA6
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 0041B4A1
                                                      • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 0041B4AF
                                                      • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 0041B4C0
                                                      • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 0041B4D1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$HandleModule
                                                      • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                      • API String ID: 667068680-1247241052
                                                      • Opcode ID: 90673c52204e63aee60387260f2789db759f982672676d7f1ecf7504acd61f9d
                                                      • Instruction ID: aecaa4f1ea486f3f9259d2b47d3963f1dfbc341b79e45af4a02591a29ea5c606
                                                      • Opcode Fuzzy Hash: 90673c52204e63aee60387260f2789db759f982672676d7f1ecf7504acd61f9d
                                                      • Instruction Fuzzy Hash: 68E0E631581250AF83106F747C0D99B3E54FA45712311853BF50DD2261EAF944588BBD
                                                      APIs
                                                      • DName::operator+.LIBCMT ref: 00428F91
                                                      • UnDecorator::getSignedDimension.LIBCMT ref: 00428F9C
                                                      • UnDecorator::getSignedDimension.LIBCMT ref: 00429088
                                                      • UnDecorator::getSignedDimension.LIBCMT ref: 004290A5
                                                      • UnDecorator::getSignedDimension.LIBCMT ref: 004290C2
                                                      • DName::operator+.LIBCMT ref: 004290D7
                                                      • UnDecorator::getSignedDimension.LIBCMT ref: 004290F1
                                                      • DName::operator+.LIBCMT ref: 004291C6
                                                        • Part of subcall function 00424E74: DName::DName.LIBVCRUNTIME ref: 00424ED2
                                                      • DName::DName.LIBVCRUNTIME ref: 0042923D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Decorator::getDimensionSigned$Name::operator+$NameName::
                                                      • String ID:
                                                      • API String ID: 3679549980-0
                                                      • Opcode ID: 6a7418aae6068401cf2e3677b3ea113663646030b0632d2233553a8b6a362c6a
                                                      • Instruction ID: 8a7b2423ec6d1cc2b745cb08d35fb137a532b954bbfdd795850540f101d9ae74
                                                      • Opcode Fuzzy Hash: 6a7418aae6068401cf2e3677b3ea113663646030b0632d2233553a8b6a362c6a
                                                      • Instruction Fuzzy Hash: 8591B171F0422A99DB14EFB6F949AFF7779AB04304FE0441FE101A6281DE7C9E05866D
                                                      APIs
                                                      • type_info::operator==.LIBVCRUNTIME ref: 004223D5
                                                      • ___TypeMatch.LIBVCRUNTIME ref: 004224E3
                                                      • _UnwindNestedFrames.LIBCMT ref: 00422635
                                                      • CallUnexpected.LIBVCRUNTIME ref: 00422650
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                      • String ID: csm$csm$csm
                                                      • API String ID: 2751267872-393685449
                                                      • Opcode ID: 729e3641ad9b6972ced4a2ec7db3f9c5dd2ee9ba6b809f257cda40fa4683e341
                                                      • Instruction ID: c748332a4cba55b665b610f13ae1d238824afc5e49b95c579f456394038a283d
                                                      • Opcode Fuzzy Hash: 729e3641ad9b6972ced4a2ec7db3f9c5dd2ee9ba6b809f257cda40fa4683e341
                                                      • Instruction Fuzzy Hash: B1B1BF71A00229FFCF14DFA5EA409AFB7B4FF14304B94815BE8106B212C7B8DA51CB99
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID: 0-3907804496
                                                      • Opcode ID: 77a7d0fa175b6356cb51276f5df019ac61c6ecfbab5930f0b92887b075481b1c
                                                      • Instruction ID: 052bb3f6dd9402d5053cb5c5b5f6bf7052fd4c1a2a06de9c1970dba718f3a4e8
                                                      • Opcode Fuzzy Hash: 77a7d0fa175b6356cb51276f5df019ac61c6ecfbab5930f0b92887b075481b1c
                                                      • Instruction Fuzzy Hash: B5B10471A002099FDB11DF99C880BAE7BB1AF45305F14416BED01AB393C7789D4ECB6A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MaklocchrMaklocstr$H_prolog3_
                                                      • String ID: false$true
                                                      • API String ID: 2404127365-2658103896
                                                      • Opcode ID: 99e7b971e7202e15a6b39e49597b9b4e7ae33bb80f7b3139cdc2819b46701caf
                                                      • Instruction ID: 1c70b92b5409e6932430837e3ce4f43def1d6702eaa523cc892dc406ef23c5a3
                                                      • Opcode Fuzzy Hash: 99e7b971e7202e15a6b39e49597b9b4e7ae33bb80f7b3139cdc2819b46701caf
                                                      • Instruction Fuzzy Hash: F5217CB1C00348AADF14EFA6C885DAEB7B8AF45700F00885BF905AF295EB78D550CB64
                                                      APIs
                                                      • DName::operator+.LIBCMT ref: 00425291
                                                      • DName::operator+.LIBCMT ref: 004252E4
                                                        • Part of subcall function 00423D3A: shared_ptr.LIBCMT ref: 00423D56
                                                        • Part of subcall function 00423C29: DName::operator+.LIBCMT ref: 00423C4A
                                                      • DName::operator+.LIBCMT ref: 004252D5
                                                      • DName::operator+.LIBCMT ref: 00425335
                                                      • DName::operator+.LIBCMT ref: 00425342
                                                      • DName::operator+.LIBCMT ref: 00425389
                                                      • DName::operator+.LIBCMT ref: 00425396
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Name::operator+$shared_ptr
                                                      • String ID:
                                                      • API String ID: 1037112749-0
                                                      • Opcode ID: ee89fda926af3d37fa7e50c54335fa2b0d50928cf5262bd702546002d54e397b
                                                      • Instruction ID: 234f84d9a7f023f6cdf65cd6010f04a78d5fabe4d3f2041c88c689950bc0e1ec
                                                      • Opcode Fuzzy Hash: ee89fda926af3d37fa7e50c54335fa2b0d50928cf5262bd702546002d54e397b
                                                      • Instruction Fuzzy Hash: 00516A72A00228ABDF15DF95E845EEFB7B8AB08305F44445FF505B7281DB789A44CBA8
                                                      APIs
                                                      • _ValidateLocalCookies.LIBCMT ref: 00421AB7
                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 00421ABF
                                                      • _ValidateLocalCookies.LIBCMT ref: 00421B48
                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 00421B73
                                                      • _ValidateLocalCookies.LIBCMT ref: 00421BC8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                      • String ID: csm
                                                      • API String ID: 1170836740-1018135373
                                                      • Opcode ID: 2a3dfc1e3ba5c1e86e37ab9b8a2f17d7bd0752c3226b7fedcf2f6e2ae35e03fe
                                                      • Instruction ID: 5f1ec1f2a8d00edc3a4a40cd5e82d146bc90078225afeccc5f96c88d58ece791
                                                      • Opcode Fuzzy Hash: 2a3dfc1e3ba5c1e86e37ab9b8a2f17d7bd0752c3226b7fedcf2f6e2ae35e03fe
                                                      • Instruction Fuzzy Hash: 8941F630B00228ABCF00DF29D841A9E7FB0BF15318F54805BE8145B362D739AA15CB99
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: false$ios_base::badbit set$true
                                                      • API String ID: 0-1679644946
                                                      • Opcode ID: eb622e4fa44840247af2b3cc5221a64d602236f06c6ff689db2113bbb21223e8
                                                      • Instruction ID: 9fda6c8c7fb04b4ad700603e417afc49ae21b51920335d1474bbb9af5ff26736
                                                      • Opcode Fuzzy Hash: eb622e4fa44840247af2b3cc5221a64d602236f06c6ff689db2113bbb21223e8
                                                      • Instruction Fuzzy Hash: 84313B756043448FD311DF74D841BA7BBE4AF45304F0889AEE9C98B322D7B6D809CBA2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: false$ios_base::badbit set$true
                                                      • API String ID: 0-1679644946
                                                      • Opcode ID: dc946e1c2eedc7c99c32b1fffb6f61f3e935d6d5ec81e82073e39ca32fdb082b
                                                      • Instruction ID: 3e86ccd2c5d50c74e75481cbe853a4367ffc1126d5ed017a479d6b2857806bf6
                                                      • Opcode Fuzzy Hash: dc946e1c2eedc7c99c32b1fffb6f61f3e935d6d5ec81e82073e39ca32fdb082b
                                                      • Instruction Fuzzy Hash: 1A317A751443444FD711EF74A84177BBFA49F52304F0888AEEAC54B312D7B7980AC7A2
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Maklocstr$GetvalsH_prolog3_
                                                      • String ID: false$true
                                                      • API String ID: 1611767717-2658103896
                                                      • Opcode ID: 6e94405daa38bb1ec08c738693b56275eee1a3e29f942cdaf161775e259a5fb2
                                                      • Instruction ID: 9f213076e34317047ad7df5b0bf018d24ce15e682fb15b30164cc2c23dfb59b4
                                                      • Opcode Fuzzy Hash: 6e94405daa38bb1ec08c738693b56275eee1a3e29f942cdaf161775e259a5fb2
                                                      • Instruction Fuzzy Hash: 372171B1D40308AADF14FFE6D885ADE7B68AF05710F00845BF915AF282DB748554CBA5
                                                      APIs
                                                      • GetCPInfo.KERNEL32(015A54D0,015A54D0,?,7FFFFFFF,?,00470AD8,015A54D0,015A54D0,?,015A54D0,?,?,?,?,015A54D0,?), ref: 004708AE
                                                      • __freea.LIBCMT ref: 00470A43
                                                      • __freea.LIBCMT ref: 00470A49
                                                      • __freea.LIBCMT ref: 00470A7F
                                                      • __freea.LIBCMT ref: 00470A85
                                                      • __freea.LIBCMT ref: 00470A95
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __freea$Info
                                                      • String ID:
                                                      • API String ID: 541289543-0
                                                      • Opcode ID: 4bcb24920e72770f31e38220167a8d24629793fcab21cffe7faf691791be7e20
                                                      • Instruction ID: 2ab9b6eb88b1bacaa4a74c92695b4b23228e40199db310b5852f34dc7eec2f67
                                                      • Opcode Fuzzy Hash: 4bcb24920e72770f31e38220167a8d24629793fcab21cffe7faf691791be7e20
                                                      • Instruction Fuzzy Hash: ED71C672901306DBDF21AAA4CC41FEF77B9AF55314F19806BE91DA7282E63DDC008799
                                                      APIs
                                                      • GetCPInfo.KERNEL32(?,?,?,?,?), ref: 0041BE19
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 0041BEA5
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0041BF10
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 0041BF2C
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0041BF8F
                                                      • CompareStringEx.KERNEL32(?,?,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0041BFAC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$CompareInfoString
                                                      • String ID:
                                                      • API String ID: 2984826149-0
                                                      • Opcode ID: 01a52a310d0eed7c9acc899d3a462634c208adcd48b3de2172202c2a7aa56a56
                                                      • Instruction ID: 726af019efacefcd3c971db039ae46f99047a08838126b5d2ccc7db9588ab579
                                                      • Opcode Fuzzy Hash: 01a52a310d0eed7c9acc899d3a462634c208adcd48b3de2172202c2a7aa56a56
                                                      • Instruction Fuzzy Hash: EC71CF32900259ABDF219F64CC85BEF7BB5EF05714F19406AEA04F6291D7388C85CBE9
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 003FEAB0
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 003FEB1B
                                                      • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 003FEB38
                                                      • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 003FEB77
                                                      • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 003FEBD6
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 003FEBF9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharMultiStringWide
                                                      • String ID:
                                                      • API String ID: 2829165498-0
                                                      • Opcode ID: fb9a826fb0dfdf6266b080cc893b156bf170fdc0d3bc059421f36c8a815bb2df
                                                      • Instruction ID: 31db1918b53f5e32b81ffba7d2ff088faa8f97d70afd6d30bf4780179192ed1e
                                                      • Opcode Fuzzy Hash: fb9a826fb0dfdf6266b080cc893b156bf170fdc0d3bc059421f36c8a815bb2df
                                                      • Instruction Fuzzy Hash: 4C519E7250020EABEF229F61CC45FBA7BA9FF44750F164529FA15E6160DB389C548B60
                                                      APIs
                                                      • DName::operator+.LIBCMT ref: 00429B64
                                                      • DName::operator+.LIBCMT ref: 00429B70
                                                        • Part of subcall function 00423D3A: shared_ptr.LIBCMT ref: 00423D56
                                                      • DName::operator+=.LIBCMT ref: 00429C2E
                                                        • Part of subcall function 004283B4: DName::operator+.LIBCMT ref: 0042841F
                                                        • Part of subcall function 004283B4: DName::operator+.LIBCMT ref: 004286E9
                                                        • Part of subcall function 00423C29: DName::operator+.LIBCMT ref: 00423C4A
                                                      • DName::operator+.LIBCMT ref: 00429BEB
                                                        • Part of subcall function 00423D92: DName::operator=.LIBVCRUNTIME ref: 00423DB3
                                                      • DName::DName.LIBVCRUNTIME ref: 00429C52
                                                      • DName::operator+.LIBCMT ref: 00429C5E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Name::operator+$NameName::Name::operator+=Name::operator=shared_ptr
                                                      • String ID:
                                                      • API String ID: 2795783184-0
                                                      • Opcode ID: e3000a6e0272c83d31359d536908e6994c44857775c737a55f139ce3cca35c93
                                                      • Instruction ID: f7aa2e4b69dc9abd6e7ef546431b3a6d33336e0a92faff241f2e17c05be1e86c
                                                      • Opcode Fuzzy Hash: e3000a6e0272c83d31359d536908e6994c44857775c737a55f139ce3cca35c93
                                                      • Instruction Fuzzy Hash: 8241F7B1B00224AFDB14DF65E855BAE7BF9AB09304F90449EE085A7341D73C9E44CB5C
                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 003F69DD
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 003F69FB
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 003F6A1C
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 003F6A6C
                                                      • std::_Facet_Register.LIBCPMT ref: 003F6A96
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 003F6AAF
                                                        • Part of subcall function 003F1FE0: ___std_exception_copy.LIBVCRUNTIME ref: 003F201C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::~_$Lockit::_$Facet_Register___std_exception_copy
                                                      • String ID:
                                                      • API String ID: 728164013-0
                                                      • Opcode ID: cd978813acc066c0ac0cbd82a775847e099c8f083876531838a3d2a072803e12
                                                      • Instruction ID: 7737180bebdf9335b1634f3949cf8efbb56d7ff55eb92bb19baf7d3e1581af86
                                                      • Opcode Fuzzy Hash: cd978813acc066c0ac0cbd82a775847e099c8f083876531838a3d2a072803e12
                                                      • Instruction Fuzzy Hash: 983139759002589FCF12DF04E881A7AB3A4EF85320F15856EEA45AB262D735ED09CBC2
                                                      APIs
                                                        • Part of subcall function 00429C74: Replicator::operator[].LIBCMT ref: 00429CB1
                                                      • DName::operator=.LIBVCRUNTIME ref: 0042881E
                                                        • Part of subcall function 004283B4: DName::operator+.LIBCMT ref: 0042841F
                                                        • Part of subcall function 004283B4: DName::operator+.LIBCMT ref: 004286E9
                                                      • DName::operator+.LIBCMT ref: 004287D8
                                                      • DName::operator+.LIBCMT ref: 004287E4
                                                      • DName::DName.LIBVCRUNTIME ref: 00428828
                                                      • DName::operator+.LIBCMT ref: 00428845
                                                      • DName::operator+.LIBCMT ref: 00428851
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Name::operator+$NameName::Name::operator=Replicator::operator[]
                                                      • String ID:
                                                      • API String ID: 955152517-0
                                                      • Opcode ID: 2f427f8c57a3bef26d619363836e4ae8a6c0fada06093d99690011dca2b2e60e
                                                      • Instruction ID: 8f3c9200c42471270195d3b23c2b6ac9238602f9ca3ef53e8d2f6062f14f9568
                                                      • Opcode Fuzzy Hash: 2f427f8c57a3bef26d619363836e4ae8a6c0fada06093d99690011dca2b2e60e
                                                      • Instruction Fuzzy Hash: 2631F5B1B053249FCB14EF55E854AAEBBF8AF99304F90845EE586A7341DB389904CB1C
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,00421F3F,0041E9DD,0041D0D2), ref: 00421F56
                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00421F64
                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00421F7D
                                                      • SetLastError.KERNEL32(00000000,00421F3F,0041E9DD,0041D0D2), ref: 00421FCF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastValue___vcrt_
                                                      • String ID:
                                                      • API String ID: 3852720340-0
                                                      • Opcode ID: 93d732f7b1222a4bec06db4402f62ca851c84aa42ba73ac84b2d22d9a46949e1
                                                      • Instruction ID: 8cf474bbadd2f4fa3644f2268abde97aa1e32cb48467839a0905d819ed02bf3d
                                                      • Opcode Fuzzy Hash: 93d732f7b1222a4bec06db4402f62ca851c84aa42ba73ac84b2d22d9a46949e1
                                                      • Instruction Fuzzy Hash: 9501F53230C2315FA6102B757E85A1B2A85EB123B8772063FF420911F0EF594C26A24E
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(00000000,004C0482,00000104), ref: 00454250
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileModuleName
                                                      • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                      • API String ID: 514040917-4022980321
                                                      • Opcode ID: 0142e838c9e977559fb57af4fbb14455aefef6f8c4ae5280e741f4afdb6ab2fd
                                                      • Instruction ID: 7b0f498f1d304db4c2d4876cb4f10c36385135e7189c08fb7ac862b784f89904
                                                      • Opcode Fuzzy Hash: 0142e838c9e977559fb57af4fbb14455aefef6f8c4ae5280e741f4afdb6ab2fd
                                                      • Instruction Fuzzy Hash: 2A219B32A4031172D63026624C4BFE7365C8BD17CDF14003BFD099A243FA5DCA89C2AE
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Mpunct$GetvalsH_prolog3
                                                      • String ID: $+xv
                                                      • API String ID: 2204710431-1686923651
                                                      • Opcode ID: 2a4c3fe0f53442eb1887a80412faa889e5adb718468999698c41b05d10af5d58
                                                      • Instruction ID: ceb8a465f8006948509d0d3a052712813ad8ea928c8ca720ea43fb7af6dd789f
                                                      • Opcode Fuzzy Hash: 2a4c3fe0f53442eb1887a80412faa889e5adb718468999698c41b05d10af5d58
                                                      • Instruction Fuzzy Hash: C921E2B0804B526ED721DF76C89077BBEF8AB08304F04492FE458CBA81D738E615CB94
                                                      APIs
                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,CC824C46,?,?,00000000,0047647A,000000FF,?,00455782,00000002,?,00455756,00446DAA), ref: 00455830
                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00455842
                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,0047647A,000000FF,?,00455782,00000002,?,00455756,00446DAA), ref: 00455864
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                      • String ID: CorExitProcess$mscoree.dll
                                                      • API String ID: 4061214504-1276376045
                                                      • Opcode ID: 709d98e77731087f4adbf431e49a843d394955b81cce2e0773dac1e507725177
                                                      • Instruction ID: 318ab5f7c3408982e5b90808bba4063b6360bac0f8c4c1dcebca723d68614561
                                                      • Opcode Fuzzy Hash: 709d98e77731087f4adbf431e49a843d394955b81cce2e0773dac1e507725177
                                                      • Instruction Fuzzy Hash: 6401A731544615EFDB119F50CC09BAEB7B8FB04712F14493EF815A27E0DB789940CB98
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,00458D26), ref: 00458D7C
                                                      • GetLastError.KERNEL32(?,00458D26), ref: 00458D86
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 00458DC4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LibraryLoad$ErrorLast
                                                      • String ID: api-ms-$ext-ms-
                                                      • API String ID: 3177248105-537541572
                                                      • Opcode ID: 1caa1f702caf4895c46f52e5befcae1fa15dd110c6aa43e5027349eae97bddf6
                                                      • Instruction ID: 7f1a127b090d56ddff986e74af32a2bb0324123451cbb03b15b733f4ae94fea0
                                                      • Opcode Fuzzy Hash: 1caa1f702caf4895c46f52e5befcae1fa15dd110c6aa43e5027349eae97bddf6
                                                      • Instruction Fuzzy Hash: B8F0FE71680209B6DB102B61DC06B5A3EA5DB20B59F24442AFE4CB41E3EF79D959C98C
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 0040EBDE
                                                      • ctype.LIBCPMT ref: 0040EC25
                                                        • Part of subcall function 0040E257: __Getctype.LIBCPMT ref: 0040E266
                                                        • Part of subcall function 00409274: __EH_prolog3.LIBCMT ref: 0040927B
                                                        • Part of subcall function 00409274: std::_Lockit::_Lockit.LIBCPMT ref: 00409285
                                                        • Part of subcall function 0040939E: __EH_prolog3.LIBCMT ref: 004093A5
                                                        • Part of subcall function 0040939E: std::_Lockit::_Lockit.LIBCPMT ref: 004093AF
                                                        • Part of subcall function 0040955D: __EH_prolog3.LIBCMT ref: 00409564
                                                        • Part of subcall function 0040955D: std::_Lockit::_Lockit.LIBCPMT ref: 0040956E
                                                        • Part of subcall function 0040955D: std::_Lockit::~_Lockit.LIBCPMT ref: 004095DF
                                                        • Part of subcall function 004094C8: __EH_prolog3.LIBCMT ref: 004094CF
                                                        • Part of subcall function 004094C8: std::_Lockit::_Lockit.LIBCPMT ref: 004094D9
                                                        • Part of subcall function 003FD91A: __EH_prolog3.LIBCMT ref: 003FD921
                                                        • Part of subcall function 003FD91A: std::_Lockit::_Lockit.LIBCPMT ref: 003FD92B
                                                        • Part of subcall function 003FD91A: std::_Lockit::~_Lockit.LIBCPMT ref: 003FD9D2
                                                      • numpunct.LIBCPMT ref: 0040EFD3
                                                        • Part of subcall function 0040A2FC: __EH_prolog3.LIBCMT ref: 0040A303
                                                        • Part of subcall function 00409A9A: __EH_prolog3.LIBCMT ref: 00409AA1
                                                        • Part of subcall function 00409A9A: std::_Lockit::_Lockit.LIBCPMT ref: 00409AAB
                                                        • Part of subcall function 00409A9A: std::_Lockit::~_Lockit.LIBCPMT ref: 00409B1C
                                                        • Part of subcall function 00409BC4: __EH_prolog3.LIBCMT ref: 00409BCB
                                                        • Part of subcall function 00409BC4: std::_Lockit::_Lockit.LIBCPMT ref: 00409BD5
                                                        • Part of subcall function 00409BC4: std::_Lockit::~_Lockit.LIBCPMT ref: 00409C46
                                                        • Part of subcall function 003FD91A: Concurrency::cancel_current_task.LIBCPMT ref: 003FD9DD
                                                        • Part of subcall function 00408DCC: __EH_prolog3.LIBCMT ref: 00408DD3
                                                        • Part of subcall function 00408DCC: std::_Lockit::_Lockit.LIBCPMT ref: 00408DDD
                                                        • Part of subcall function 00408DCC: std::_Lockit::~_Lockit.LIBCPMT ref: 00408E4E
                                                      • __Getcoll.LIBCPMT ref: 0040ED99
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • codecvt.LIBCPMT ref: 0040F084
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Lockitstd::_$H_prolog3$Lockit::_$Lockit::~_$Concurrency::cancel_current_taskGetcollGetctypecodecvtctypenumpunct
                                                      • String ID:
                                                      • API String ID: 778957219-0
                                                      • Opcode ID: 7065f65accd831b29c26487dde7980940dba17c38aafc7414f203b3d63d165f6
                                                      • Instruction ID: f7b8e38ee7a8262a825a0ec0ae874d978e44240d7aba2e4ab89644ddcda4df51
                                                      • Opcode Fuzzy Hash: 7065f65accd831b29c26487dde7980940dba17c38aafc7414f203b3d63d165f6
                                                      • Instruction Fuzzy Hash: FEE11B7180020AABDB126F768C415BF7AA6EF41314F14893FF9187B3D2DB798D108799
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 0040F0BA
                                                      • ctype.LIBCPMT ref: 0040F101
                                                        • Part of subcall function 0040E290: __Getctype.LIBCPMT ref: 0040E29F
                                                        • Part of subcall function 00409309: __EH_prolog3.LIBCMT ref: 00409310
                                                        • Part of subcall function 00409309: std::_Lockit::_Lockit.LIBCPMT ref: 0040931A
                                                        • Part of subcall function 00409433: __EH_prolog3.LIBCMT ref: 0040943A
                                                        • Part of subcall function 00409433: std::_Lockit::_Lockit.LIBCPMT ref: 00409444
                                                        • Part of subcall function 00409687: __EH_prolog3.LIBCMT ref: 0040968E
                                                        • Part of subcall function 00409687: std::_Lockit::_Lockit.LIBCPMT ref: 00409698
                                                        • Part of subcall function 00409687: std::_Lockit::~_Lockit.LIBCPMT ref: 00409709
                                                        • Part of subcall function 004095F2: __EH_prolog3.LIBCMT ref: 004095F9
                                                        • Part of subcall function 004095F2: std::_Lockit::_Lockit.LIBCPMT ref: 00409603
                                                        • Part of subcall function 004095F2: std::_Lockit::~_Lockit.LIBCPMT ref: 00409674
                                                        • Part of subcall function 003FD91A: __EH_prolog3.LIBCMT ref: 003FD921
                                                        • Part of subcall function 003FD91A: std::_Lockit::_Lockit.LIBCPMT ref: 003FD92B
                                                        • Part of subcall function 003FD91A: std::_Lockit::~_Lockit.LIBCPMT ref: 003FD9D2
                                                      • numpunct.LIBCPMT ref: 0040F4AF
                                                        • Part of subcall function 0040A32F: __EH_prolog3.LIBCMT ref: 0040A336
                                                        • Part of subcall function 00409B2F: __EH_prolog3.LIBCMT ref: 00409B36
                                                        • Part of subcall function 00409B2F: std::_Lockit::_Lockit.LIBCPMT ref: 00409B40
                                                        • Part of subcall function 00409B2F: std::_Lockit::~_Lockit.LIBCPMT ref: 00409BB1
                                                        • Part of subcall function 00409C59: __EH_prolog3.LIBCMT ref: 00409C60
                                                        • Part of subcall function 00409C59: std::_Lockit::_Lockit.LIBCPMT ref: 00409C6A
                                                        • Part of subcall function 00409C59: std::_Lockit::~_Lockit.LIBCPMT ref: 00409CDB
                                                        • Part of subcall function 003FD91A: Concurrency::cancel_current_task.LIBCPMT ref: 003FD9DD
                                                        • Part of subcall function 00408E61: __EH_prolog3.LIBCMT ref: 00408E68
                                                        • Part of subcall function 00408E61: std::_Lockit::_Lockit.LIBCPMT ref: 00408E72
                                                        • Part of subcall function 00408E61: std::_Lockit::~_Lockit.LIBCPMT ref: 00408EE3
                                                      • __Getcoll.LIBCPMT ref: 0040F275
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • codecvt.LIBCPMT ref: 0040F560
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Lockitstd::_$H_prolog3$Lockit::_$Lockit::~_$Concurrency::cancel_current_taskGetcollGetctypecodecvtctypenumpunct
                                                      • String ID:
                                                      • API String ID: 778957219-0
                                                      • Opcode ID: 6d6ee8fd834779846f1a0f579139e8630d4ee42f747e9e457608005a0b995436
                                                      • Instruction ID: 2e9e7e88e25c49c52d0a71c17f06b71fe45696ba485025b395d522cb0850f6af
                                                      • Opcode Fuzzy Hash: 6d6ee8fd834779846f1a0f579139e8630d4ee42f747e9e457608005a0b995436
                                                      • Instruction Fuzzy Hash: 5BE1F57180020AABDB226FA58C019BF7AA5EF41314F14853FFD187B7C2DB798D058799
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: operator+shared_ptr$NameName::
                                                      • String ID:
                                                      • API String ID: 2894330373-0
                                                      • Opcode ID: 77e57b9b62fc614b5b6c31a4250db0471d9401dd808bc32d990e83e33a8ef057
                                                      • Instruction ID: aeb423790579d389a98909d938de52f2ddd95e78867ea855bfa3e9598055be96
                                                      • Opcode Fuzzy Hash: 77e57b9b62fc614b5b6c31a4250db0471d9401dd808bc32d990e83e33a8ef057
                                                      • Instruction Fuzzy Hash: 6E61A071A0812AEFCB14DF65E8489BA7BB4FF04304F94C1ABE4159B210D7398A05CF99
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 003FEDB6
                                                      • AcquireSRWLockExclusive.KERNEL32(?,?,003FBF1B,?), ref: 003FEDD5
                                                      • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,003FBF1B,?), ref: 003FEE03
                                                      • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,003FBF1B,?), ref: 003FEE5E
                                                      • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,003FBF1B,?), ref: 003FEE75
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AcquireExclusiveLock$CurrentThread
                                                      • String ID:
                                                      • API String ID: 66001078-0
                                                      • Opcode ID: ac4a25064efc8ee8259e57e9fee27719b0ebb21a5b776445ffd8a78a873fbd30
                                                      • Instruction ID: be6d594d7b593bb19085fdbdda180455fac7361f63a4b029289bfef5e0633f75
                                                      • Opcode Fuzzy Hash: ac4a25064efc8ee8259e57e9fee27719b0ebb21a5b776445ffd8a78a873fbd30
                                                      • Instruction Fuzzy Hash: CA414C3190060ADFCB22DF65E4849BAB3F9FF24310B11492AE65AD7A60D730F984CB55
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 003F9DB1
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 003F9DBB
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • codecvt.LIBCPMT ref: 003F9DF5
                                                      • std::_Facet_Register.LIBCPMT ref: 003F9E0C
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 003F9E2C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                                      • String ID:
                                                      • API String ID: 712880209-0
                                                      • Opcode ID: c506b98b187dc72da6b2974b943bfaff8e60896edbd476531cfa0e1fd8a7d687
                                                      • Instruction ID: 177e85ab82f4d61e27560e381a194b9d66567044a72e1f06020fa574aac7091d
                                                      • Opcode Fuzzy Hash: c506b98b187dc72da6b2974b943bfaff8e60896edbd476531cfa0e1fd8a7d687
                                                      • Instruction Fuzzy Hash: BE11D67190011DABCB06EB94DC41BBEB7A5AF54710F10801BFA096F391CF749E00CB95
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00408DD3
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00408DDD
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • codecvt.LIBCPMT ref: 00408E17
                                                      • std::_Facet_Register.LIBCPMT ref: 00408E2E
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00408E4E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                                      • String ID:
                                                      • API String ID: 712880209-0
                                                      • Opcode ID: 3f5f874b81900ada2ee755a2493e08e37da1b64a81cf08175d4c7692afe19144
                                                      • Instruction ID: 252cdb2244f6ac7bf546911a7f02a042d2bc461a5f364dc35b7061ce02c0b2b8
                                                      • Opcode Fuzzy Hash: 3f5f874b81900ada2ee755a2493e08e37da1b64a81cf08175d4c7692afe19144
                                                      • Instruction Fuzzy Hash: EB01D671900119DBCB06EBA4D9416BEB775AF94320F14452FE529AB3D1CF789E05CBC8
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00408E68
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00408E72
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • codecvt.LIBCPMT ref: 00408EAC
                                                      • std::_Facet_Register.LIBCPMT ref: 00408EC3
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00408EE3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                                      • String ID:
                                                      • API String ID: 712880209-0
                                                      • Opcode ID: e9b747f119d94ceb793b1c746de503cb3d0a78d44047477d819f4a6e08431965
                                                      • Instruction ID: c62dcb6a531a052af91cac97177654820637e81894e8fded75eae2fabcd2b4a7
                                                      • Opcode Fuzzy Hash: e9b747f119d94ceb793b1c746de503cb3d0a78d44047477d819f4a6e08431965
                                                      • Instruction Fuzzy Hash: 4901C4719001199BCB06EBA4D941ABEB771AF84710F14452EE515AB3D2CF789E45CBC8
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 0041748A
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00417494
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • messages.LIBCPMT ref: 004174CE
                                                      • std::_Facet_Register.LIBCPMT ref: 004174E5
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00417505
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermessages
                                                      • String ID:
                                                      • API String ID: 2750803064-0
                                                      • Opcode ID: 56b86be3ba9491d386dde6becf42985c8534c1f65e111aca5c6cd8db27aee768
                                                      • Instruction ID: 53ae6d125e1085abfd9fb53eb52594e5c422d5c5a25254ae22cb47101bb6bfdf
                                                      • Opcode Fuzzy Hash: 56b86be3ba9491d386dde6becf42985c8534c1f65e111aca5c6cd8db27aee768
                                                      • Instruction Fuzzy Hash: 3701D271904119ABCB06EBA4D842AFEB771AF84320F14451AE5156F3E2CF789E45CB98
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00409564
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0040956E
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • moneypunct.LIBCPMT ref: 004095A8
                                                      • std::_Facet_Register.LIBCPMT ref: 004095BF
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 004095DF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                      • String ID:
                                                      • API String ID: 419941038-0
                                                      • Opcode ID: 16190cd0706e9e35a10190d99d73be11a309b406b6e7331f5cfd3215ab167480
                                                      • Instruction ID: 42f98dfe9721051a793b0356701bca8de5c0be6ec0f6ad65a911d3a0bdbffece
                                                      • Opcode Fuzzy Hash: 16190cd0706e9e35a10190d99d73be11a309b406b6e7331f5cfd3215ab167480
                                                      • Instruction Fuzzy Hash: FF01C43290011DABCB06EBA4DC416BEB761AF80310F14452AE515AB3D2CF78DE05CB98
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 004095F9
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00409603
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • moneypunct.LIBCPMT ref: 0040963D
                                                      • std::_Facet_Register.LIBCPMT ref: 00409654
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00409674
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                      • String ID:
                                                      • API String ID: 419941038-0
                                                      • Opcode ID: fd3dcdddb7d20991b82620dc84613adc3af0b1f3617e2fb3a3b29227243a6adc
                                                      • Instruction ID: ebaa08adadf6c9366c2a63d8baa77c5dad341c7182f44447af60396269fbdf33
                                                      • Opcode Fuzzy Hash: fd3dcdddb7d20991b82620dc84613adc3af0b1f3617e2fb3a3b29227243a6adc
                                                      • Instruction Fuzzy Hash: F50104359001199BCB02EBA4C845BBEB765AF80310F10492BE515AB3D2CF789E01CB98
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00417649
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00417653
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • moneypunct.LIBCPMT ref: 0041768D
                                                      • std::_Facet_Register.LIBCPMT ref: 004176A4
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 004176C4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                      • String ID:
                                                      • API String ID: 419941038-0
                                                      • Opcode ID: 584af903ca741bbbd703c5a8440e24fa146c961aceca800bdbe20bdb0ebc9dc8
                                                      • Instruction ID: ec8d1d149b9649a721e893ec8126f55bd9c54b2494e2575f322ff00f0507d589
                                                      • Opcode Fuzzy Hash: 584af903ca741bbbd703c5a8440e24fa146c961aceca800bdbe20bdb0ebc9dc8
                                                      • Instruction Fuzzy Hash: 7B010071900219DBCB06EBA4D841AFEB7B1AF80320F24451AE5156F3E2CF789E40CB98
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 004176DE
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 004176E8
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • moneypunct.LIBCPMT ref: 00417722
                                                      • std::_Facet_Register.LIBCPMT ref: 00417739
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00417759
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                      • String ID:
                                                      • API String ID: 419941038-0
                                                      • Opcode ID: aceaa4c6469f156c85725d5131b1de8147cba0e6e568589b1ab6e7ae1aa72b8d
                                                      • Instruction ID: d811eb99baa7a2c449cccd99a76abf6543ee96c290315180482594cccafc2a2e
                                                      • Opcode Fuzzy Hash: aceaa4c6469f156c85725d5131b1de8147cba0e6e568589b1ab6e7ae1aa72b8d
                                                      • Instruction Fuzzy Hash: 510104359002199FCB02EBA4D881BFEB772AF40710F10451AE615AF3D2CF78AA458B98
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 0040968E
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00409698
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • moneypunct.LIBCPMT ref: 004096D2
                                                      • std::_Facet_Register.LIBCPMT ref: 004096E9
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00409709
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                      • String ID:
                                                      • API String ID: 419941038-0
                                                      • Opcode ID: 81a81cf512cf7db72bc515997c7e50182c631e729282a445e693e3a813334f8c
                                                      • Instruction ID: 1128c78e53d380b2a58bd3b0c680c269c4b236b310af0c341c463e7a7d422aff
                                                      • Opcode Fuzzy Hash: 81a81cf512cf7db72bc515997c7e50182c631e729282a445e693e3a813334f8c
                                                      • Instruction Fuzzy Hash: 7601D676900119DBCB06EBA4D8456BEB771AF80320F24492AF5156B3D2CF789E05CB89
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00409977
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00409981
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • numpunct.LIBCPMT ref: 004099BB
                                                      • std::_Facet_Register.LIBCPMT ref: 004099D2
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 004099F2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registernumpunct
                                                      • String ID:
                                                      • API String ID: 743221004-0
                                                      • Opcode ID: bfcf7082270016f04bc08d3f63cb866d27dd49d59935f92c78c61df802711cc8
                                                      • Instruction ID: 2fb123a2567a7edf0700cfc1e19071a606921be934b7e27775f58c7efffb52ec
                                                      • Opcode Fuzzy Hash: bfcf7082270016f04bc08d3f63cb866d27dd49d59935f92c78c61df802711cc8
                                                      • Instruction Fuzzy Hash: 5B01C07590015A9BCB06EBA4D842BBEB761AF80720F24452FE5156B3D2CF789E44CB88
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00409A0C
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00409A16
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • numpunct.LIBCPMT ref: 00409A50
                                                      • std::_Facet_Register.LIBCPMT ref: 00409A67
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00409A87
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registernumpunct
                                                      • String ID:
                                                      • API String ID: 743221004-0
                                                      • Opcode ID: f9bee813e7d33bbf3fb916ebaaa24aa3ef23e2726ffb4003f019fc97a9b76663
                                                      • Instruction ID: df0d0dfca630b110a72a08da93461b4fa6977c5b7e991bfd07f6e1c6a8ee7ba3
                                                      • Opcode Fuzzy Hash: f9bee813e7d33bbf3fb916ebaaa24aa3ef23e2726ffb4003f019fc97a9b76663
                                                      • Instruction Fuzzy Hash: 0C010431A0011ADBCB02EBA0D8416BFB7B1AF84710F14452BE9156B3E2DF788E04CB98
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 003FB62D
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 003FB638
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 003FB6A6
                                                        • Part of subcall function 003FB7B9: std::locale::_Locimp::_Locimp.LIBCPMT ref: 003FB7D1
                                                      • std::locale::_Setgloballocale.LIBCPMT ref: 003FB653
                                                      • _Yarn.LIBCPMT ref: 003FB669
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                      • String ID:
                                                      • API String ID: 1088826258-0
                                                      • Opcode ID: 0fd271b88863ea352e1281dc38b3ca384c51c69d1cdcc26c9e649599629f0bb1
                                                      • Instruction ID: 3187e02efa79a1b7f9dc23d949640b4aa428978d9d4599885b6b4bc75d2ffcb0
                                                      • Opcode Fuzzy Hash: 0fd271b88863ea352e1281dc38b3ca384c51c69d1cdcc26c9e649599629f0bb1
                                                      • Instruction Fuzzy Hash: 7D01F1B56000259BC70ABB60CC8167CB761AF88310B15401AE9195B792CF786A42CBC8
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __freea
                                                      • String ID: a/p$am/pm
                                                      • API String ID: 240046367-3206640213
                                                      • Opcode ID: 7e4f0acf8f00d4547cb2e1127662fff920add55343fb1bbed263a480ff0486a3
                                                      • Instruction ID: 052252d9201d48e3ff68f6f669081da6920d5c9281f60ec761e944bf2c8b99a5
                                                      • Opcode Fuzzy Hash: 7e4f0acf8f00d4547cb2e1127662fff920add55343fb1bbed263a480ff0486a3
                                                      • Instruction Fuzzy Hash: C4C1D239900215DBDB248F68C6857BB7770FF06702F14409BED01AB352D3B99D4ACB9A
                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 003F24C9
                                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 003F251A
                                                      • __Getctype.LIBCPMT ref: 003F2531
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$GetctypeLocinfo::_Locinfo_ctorLockitLockit::_
                                                      • String ID: bad locale name
                                                      • API String ID: 1612978173-1405518554
                                                      • Opcode ID: 4392e3a8da01af881e313ba4a5d2a216a9a5fecd8997424b91b43f18c6992de6
                                                      • Instruction ID: 23441b2f0870a3c0cf599fafec06828c17b51f8138ae9ad3d839d24b502bf374
                                                      • Opcode Fuzzy Hash: 4392e3a8da01af881e313ba4a5d2a216a9a5fecd8997424b91b43f18c6992de6
                                                      • Instruction Fuzzy Hash: BE31E1B0804344CFC7219F29C841B6BFBE4AF95304F14891EFA889B212D775D948CB93
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 0040E05C
                                                        • Part of subcall function 00405FE3: _Maklocstr.LIBCPMT ref: 00406003
                                                        • Part of subcall function 00405FE3: _Maklocstr.LIBCPMT ref: 00406020
                                                        • Part of subcall function 00405FE3: _Maklocstr.LIBCPMT ref: 0040603D
                                                      • _Mpunct.LIBCPMT ref: 0040E0E9
                                                      • _Mpunct.LIBCPMT ref: 0040E103
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Maklocstr$Mpunct$H_prolog3
                                                      • String ID: $+xv
                                                      • API String ID: 4259326447-1686923651
                                                      • Opcode ID: 31ba906daf15f27ed2f887f074968e7da64ac0addb37d8a844ac1d8b52b3622f
                                                      • Instruction ID: b27b77584c8a3403c63d95012d3651bb42a82be57fe6330e891f0e675cf6801c
                                                      • Opcode Fuzzy Hash: 31ba906daf15f27ed2f887f074968e7da64ac0addb37d8a844ac1d8b52b3622f
                                                      • Instruction Fuzzy Hash: BA21E2B1804B566ED725DF76C88077BBEF8AB08300F04492FE058D7A82E778E601CB94
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Mpunct$H_prolog3
                                                      • String ID: $+xv
                                                      • API String ID: 4281374311-1686923651
                                                      • Opcode ID: b2c02a4d1a55d28f8033abf7aea96d3c47be9c5cccf5944fdece4f21358f50e6
                                                      • Instruction ID: e7345da9fb2929bf4f50f6b94242e35b6ba7db334e7fa940b6c347d929f46e7c
                                                      • Opcode Fuzzy Hash: b2c02a4d1a55d28f8033abf7aea96d3c47be9c5cccf5944fdece4f21358f50e6
                                                      • Instruction Fuzzy Hash: FD21D1B0804A566ED725DF75C8907BBBFF8AB09300F04495FF458C6A41D738EA41CB94
                                                      APIs
                                                      • __is_exception_typeof.LIBVCRUNTIME ref: 0041E9CA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __is_exception_typeof
                                                      • String ID: MOC$RCC$csm
                                                      • API String ID: 3140442014-2671469338
                                                      • Opcode ID: 93355e13ab2b437af53ed2aad950cfb81cb0528d5153333b0e774dbadee3dac5
                                                      • Instruction ID: 1a71bb91fc7b90eb078dee62a451a7adba09545c0c4b1efaf791266ebe21fef2
                                                      • Opcode Fuzzy Hash: 93355e13ab2b437af53ed2aad950cfb81cb0528d5153333b0e774dbadee3dac5
                                                      • Instruction Fuzzy Hash: AC11E175520315DFD704DF57D001BDAB7A8EF00319F11409BE8008B222C7BCE980CB99
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(00000011,00000000,00000800,?,0042A4D3,00000000,00000001,004C0264,?,?,?,0042A72A,00000004,InitializeCriticalSectionEx,0047B5DC,InitializeCriticalSectionEx), ref: 0042A5E3
                                                      • GetLastError.KERNEL32(?,0042A4D3,00000000,00000001,004C0264,?,?,?,0042A72A,00000004,InitializeCriticalSectionEx,0047B5DC,InitializeCriticalSectionEx,00000000,?,0042321D), ref: 0042A5ED
                                                      • LoadLibraryExW.KERNEL32(00000011,00000000,00000000,?,00000011,00421BE3), ref: 0042A615
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LibraryLoad$ErrorLast
                                                      • String ID: api-ms-
                                                      • API String ID: 3177248105-2084034818
                                                      • Opcode ID: fb4337cc2a0e5e147034947e14f6deb5574998701b2eb40fc43e932c75ab8f48
                                                      • Instruction ID: bbb5eeecaf5321407d6fec750caad06851983d2c296bc102cd1fc1a4eb6e2d64
                                                      • Opcode Fuzzy Hash: fb4337cc2a0e5e147034947e14f6deb5574998701b2eb40fc43e932c75ab8f48
                                                      • Instruction Fuzzy Hash: 52E01230380208B7DF101F61EC0AB593E54DB01B54FA44436FD4DA42A1EB759961898D
                                                      APIs
                                                      • GetConsoleOutputCP.KERNEL32(CC824C46,00000010,00000000,?), ref: 0045D931
                                                        • Part of subcall function 00461776: WideCharToMultiByte.KERNEL32(00000010,00000000,00488210,00000010,00000010,00000010,0045E309,0000FDE9,00488210,?,?,?,0045E002,0000FDE9,00000000,?), ref: 00461822
                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0045DB8C
                                                      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0045DBD4
                                                      • GetLastError.KERNEL32 ref: 0045DC77
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                      • String ID:
                                                      • API String ID: 2112829910-0
                                                      • Opcode ID: 8a7a6ca2e146d341cc422be992365cfcae59025cf63b92ea37ab43d9d9693c69
                                                      • Instruction ID: 048ea9e46651d3829ba1a5ccebb2763e7881dc98246415a7cc83d24d0ea544db
                                                      • Opcode Fuzzy Hash: 8a7a6ca2e146d341cc422be992365cfcae59025cf63b92ea37ab43d9d9693c69
                                                      • Instruction Fuzzy Hash: EDD18AB5E002489FCF25CFA8C880AAEBBB5FF09305F18452AE855E7352D734A946CB54
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 004263F8
                                                      • UnDecorator::getSymbolName.LIBCMT ref: 0042648A
                                                      • DName::operator+.LIBCMT ref: 0042658E
                                                      • DName::DName.LIBVCRUNTIME ref: 00426631
                                                        • Part of subcall function 00423D3A: shared_ptr.LIBCMT ref: 00423D56
                                                        • Part of subcall function 00423FD4: DName::DName.LIBVCRUNTIME ref: 00424022
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Name$Name::$Decorator::getH_prolog3Name::operator+Symbolshared_ptr
                                                      • String ID:
                                                      • API String ID: 1134295639-0
                                                      • Opcode ID: 27ef042c050c7dfc1a4df25bbdcb3639e4b4b042e5fe62219c462ae7397ad722
                                                      • Instruction ID: 6434c2e672be3855cfd3d1e5a167d7d96dc60588079a5b4c18f9562f2ba1c13a
                                                      • Opcode Fuzzy Hash: 27ef042c050c7dfc1a4df25bbdcb3639e4b4b042e5fe62219c462ae7397ad722
                                                      • Instruction Fuzzy Hash: 66716D71E01229DFDB50DF94E885AEEBBB4AB08314F96406BE801AB351D7389D45CF98
                                                      APIs
                                                      • DName::operator+.LIBCMT ref: 00426BC5
                                                        • Part of subcall function 00423989: __aulldvrm.LIBCMT ref: 004239BA
                                                      • DName::operator+.LIBCMT ref: 00426B26
                                                      • DName::operator=.LIBVCRUNTIME ref: 00426C0A
                                                      • DName::DName.LIBVCRUNTIME ref: 00426C3C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Name::operator+$NameName::Name::operator=__aulldvrm
                                                      • String ID:
                                                      • API String ID: 2973644308-0
                                                      • Opcode ID: 2a5672ba92114f4d29f065380127dcef9ee622135d31b6802a03330c7224e48e
                                                      • Instruction ID: 108acfa91f267889e3deafb9364d2a09469dce71afb7ad5bbcc7abf628925a85
                                                      • Opcode Fuzzy Hash: 2a5672ba92114f4d29f065380127dcef9ee622135d31b6802a03330c7224e48e
                                                      • Instruction Fuzzy Hash: A561BFB5E00229DFCB15DF46E884AAEBBB4FB45300F51819BE8416B351C778AE41CF98
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AdjustPointer
                                                      • String ID:
                                                      • API String ID: 1740715915-0
                                                      • Opcode ID: 8cdaed41c8b6ce61cfb3588b679f20c4e09c0cc19d0f4c4f220a8a25a3b6a72b
                                                      • Instruction ID: 3154915456ac464c74dccf43d1061fdd9fef4f9a1dd4177011d51e44e4d528af
                                                      • Opcode Fuzzy Hash: 8cdaed41c8b6ce61cfb3588b679f20c4e09c0cc19d0f4c4f220a8a25a3b6a72b
                                                      • Instruction Fuzzy Hash: 405103B5701222BFDB248F11EA40FBA77A4EF00310F90052FEE01472A1D7B9AC91C798
                                                      APIs
                                                      • DName::operator+.LIBCMT ref: 004267F4
                                                        • Part of subcall function 00423CFE: DName::operator+=.LIBCMT ref: 00423D14
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Name::operator+Name::operator+=
                                                      • String ID:
                                                      • API String ID: 382699925-0
                                                      • Opcode ID: e12cd399dd2061f1bf00779b6eb4e560eecc105813ae3714ad3c12dba20654b5
                                                      • Instruction ID: 478966a86f30e740541abfb6bfd4558ed3b54e679ce7df0624610ef3b9055d4e
                                                      • Opcode Fuzzy Hash: e12cd399dd2061f1bf00779b6eb4e560eecc105813ae3714ad3c12dba20654b5
                                                      • Instruction Fuzzy Hash: 414183B1E0122ADACF04DF99E449AEEBBB4EF04304F91405BE405B7351DB789A85CB98
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 003FE87B
                                                        • Part of subcall function 003FB626: __EH_prolog3.LIBCMT ref: 003FB62D
                                                        • Part of subcall function 003FB626: std::_Lockit::_Lockit.LIBCPMT ref: 003FB638
                                                        • Part of subcall function 003FB626: std::locale::_Setgloballocale.LIBCPMT ref: 003FB653
                                                        • Part of subcall function 003FB626: _Yarn.LIBCPMT ref: 003FB669
                                                        • Part of subcall function 003FB626: std::_Lockit::~_Lockit.LIBCPMT ref: 003FB6A6
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 003FE89F
                                                      • std::locale::_Setgloballocale.LIBCPMT ref: 003FE8EE
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 003FE94E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Lockitstd::_$H_prolog3Lockit::_Lockit::~_Setgloballocalestd::locale::_$Yarn
                                                      • String ID:
                                                      • API String ID: 2301162320-0
                                                      • Opcode ID: 2bbc5d8ce141e15258c814e2adeeb4ca51df2ab81c2e5642586a6740e1330bd7
                                                      • Instruction ID: 2531131e8981f2ce1cab44f522452640ee3735122e9ef1e402df4476b7b5a3bc
                                                      • Opcode Fuzzy Hash: 2bbc5d8ce141e15258c814e2adeeb4ca51df2ab81c2e5642586a6740e1330bd7
                                                      • Instruction Fuzzy Hash: 892182716002189FDB45EF68C8C197EB7B4EF49310B05846EE906DF292DF78ED418B95
                                                      APIs
                                                        • Part of subcall function 00461776: WideCharToMultiByte.KERNEL32(00000010,00000000,00488210,00000010,00000010,00000010,0045E309,0000FDE9,00488210,?,?,?,0045E002,0000FDE9,00000000,?), ref: 00461822
                                                      • GetLastError.KERNEL32 ref: 004629E1
                                                      • __dosmaperr.LIBCMT ref: 004629E8
                                                      • GetLastError.KERNEL32(?,?,?,?), ref: 00462A22
                                                      • __dosmaperr.LIBCMT ref: 00462A29
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                      • String ID:
                                                      • API String ID: 1913693674-0
                                                      • Opcode ID: 81c52e9df1b152f8ed9edca7003a71b229a7e2fb64eb07a11a9161f1ca279427
                                                      • Instruction ID: ef0d338ce3b8bb0624f60254d9420ea55616ca72eb2d72c4ac5dfec31c47f43d
                                                      • Opcode Fuzzy Hash: 81c52e9df1b152f8ed9edca7003a71b229a7e2fb64eb07a11a9161f1ca279427
                                                      • Instruction Fuzzy Hash: 7321F871700605BFDB20AFA2CA8086BB7A9EF44368700841FF819D7250F7B8EC10876B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0889d405b80d1747b1bb7a22245d28b2774bbea11af95b404e83402c8fb0db05
                                                      • Instruction ID: bf3fd409b28ed6ef44bcafe8c931ca3c7010773e266128adb61241fc061a6e22
                                                      • Opcode Fuzzy Hash: 0889d405b80d1747b1bb7a22245d28b2774bbea11af95b404e83402c8fb0db05
                                                      • Instruction Fuzzy Hash: 7021F639200205AFDB25AF72CC8186B7768EF0136A7108A1BFD5997253DB38FC549759
                                                      APIs
                                                      • GetEnvironmentStringsW.KERNEL32 ref: 00464633
                                                        • Part of subcall function 00461776: WideCharToMultiByte.KERNEL32(00000010,00000000,00488210,00000010,00000010,00000010,0045E309,0000FDE9,00488210,?,?,?,0045E002,0000FDE9,00000000,?), ref: 00461822
                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0046466B
                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0046468B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                      • String ID:
                                                      • API String ID: 158306478-0
                                                      • Opcode ID: 577dc32945a941317e0b1178fdefa4d0fb35260714244c5e72df998df3e32dd0
                                                      • Instruction ID: 2c7171d519b4c2325cc2d1cf5e8b4cebdab34a6b72652e473e8df350f01496a1
                                                      • Opcode Fuzzy Hash: 577dc32945a941317e0b1178fdefa4d0fb35260714244c5e72df998df3e32dd0
                                                      • Instruction Fuzzy Hash: FD1161F29015157E6B2127B29C8EC6F6A6CDEC63AA710012EF90691112FE6C9E4241BF
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 003FD921
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 003FD92B
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 003FD9D2
                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 003FD9DD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Lockitstd::_$Concurrency::cancel_current_taskH_prolog3Lockit::_Lockit::~_
                                                      • String ID:
                                                      • API String ID: 4244582100-0
                                                      • Opcode ID: f657c4d3eac501b8d9bc5f650f1a8de1ea43285030f79dcbe809da27d1be8860
                                                      • Instruction ID: c99bbd4396d6d68e161ddbe85b39eb3bf5efe2d14c4006959a3a0080905cc18a
                                                      • Opcode Fuzzy Hash: f657c4d3eac501b8d9bc5f650f1a8de1ea43285030f79dcbe809da27d1be8860
                                                      • Instruction Fuzzy Hash: E1217F3464061AAFCB05EF54C895ABDB761FF45310F01845AE9259B3A1CF70ED50CF84
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 003FD6F8
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 003FD702
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • std::_Facet_Register.LIBCPMT ref: 003FD753
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 003FD773
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: b8f31ef2514895096c24f30be83ef3f8dd010271ba02ec86ac7553c94f30e7af
                                                      • Instruction ID: 1b3fd724af3a724a38abc44e92d2ddaa5069e433c8fa6667d2ef45899a53076f
                                                      • Opcode Fuzzy Hash: b8f31ef2514895096c24f30be83ef3f8dd010271ba02ec86ac7553c94f30e7af
                                                      • Instruction Fuzzy Hash: 2D11047190021DABCB06EFA8D845ABEB7B6AF44310F10851AF619AF381CB749E05CB84
                                                      APIs
                                                      • CreateThread.KERNEL32(00000000,?,0042AB81,00000000,00000004,00000000), ref: 0042AE7B
                                                      • GetLastError.KERNEL32 ref: 0042AE87
                                                      • __dosmaperr.LIBCMT ref: 0042AE8E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateErrorLastThread__dosmaperr
                                                      • String ID:
                                                      • API String ID: 2744730728-0
                                                      • Opcode ID: 2b22a5f5e9fc74f5f1c962f32199b3dfc9fbdf9f1788205b955f2d6ed071825d
                                                      • Instruction ID: 9fdabbbabf2342577464fc82418ee6d4bb52de14638f486af2d52ff70a05132f
                                                      • Opcode Fuzzy Hash: 2b22a5f5e9fc74f5f1c962f32199b3dfc9fbdf9f1788205b955f2d6ed071825d
                                                      • Instruction Fuzzy Hash: 3A018E31640214BFDB109B65EC0AB9F7B79DF80375F61021EF924821D0DB78C916D71A
                                                      APIs
                                                      • SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,?), ref: 0046012E
                                                      • GetLastError.KERNEL32(?,?,?,?), ref: 0046013B
                                                      • SetFilePointerEx.KERNEL32(?,?,?,?,?), ref: 00460161
                                                      • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000,?,?,?), ref: 00460187
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FilePointer$ErrorLast
                                                      • String ID:
                                                      • API String ID: 142388799-0
                                                      • Opcode ID: 593907b3f79b5a9fe5b56778b4e842746dd1c7d2caf74d31b3aad9e61bd9a1dc
                                                      • Instruction ID: e6db7d0c27764c3aa72d399c63ad844bfbf414709a742b2e602dce2f74f60f41
                                                      • Opcode Fuzzy Hash: 593907b3f79b5a9fe5b56778b4e842746dd1c7d2caf74d31b3aad9e61bd9a1dc
                                                      • Instruction Fuzzy Hash: 9F117C71900218BBDF109F55CC489DF3F79FF05360F104159F818962A0E736CA91DBA5
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00408EFD
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00408F07
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • std::_Facet_Register.LIBCPMT ref: 00408F58
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00408F78
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: 99408d0a3fd8011434b839247924b93a5bcbc83632bf3744644834f41777a95d
                                                      • Instruction ID: 0040ccbb6f7b27007300daa5f41f95438251a6251562a67fd3f639a1dd737f82
                                                      • Opcode Fuzzy Hash: 99408d0a3fd8011434b839247924b93a5bcbc83632bf3744644834f41777a95d
                                                      • Instruction Fuzzy Hash: 4D01C43190011AEBCB06EBA4D945BBEB762AF84710F14452EE515AB3D1CF789A058B89
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00408F92
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00408F9C
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • std::_Facet_Register.LIBCPMT ref: 00408FED
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0040900D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: 222b11814c8577814627404c8cebc75738c544572ac606d5e0256473ce390de7
                                                      • Instruction ID: b122dbf05ef1910c85ad07c98bb81ffe7fde28174629aac7e4562c00b60f3139
                                                      • Opcode Fuzzy Hash: 222b11814c8577814627404c8cebc75738c544572ac606d5e0256473ce390de7
                                                      • Instruction Fuzzy Hash: 3C012231900219EBCB02FBA4C8456BEB771AF94320F24482BE5156B3D2CF788E01CB88
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 004173F5
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 004173FF
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • std::_Facet_Register.LIBCPMT ref: 00417450
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00417470
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: d7abc30489400e81484b731da0e57914bebdac7175f5ff0e11b8aa01c7afa2b7
                                                      • Instruction ID: 9e37ec08baca6d2693efd30d19a8a7c12b30cd59c3888d5fe2dc0915110c7849
                                                      • Opcode Fuzzy Hash: d7abc30489400e81484b731da0e57914bebdac7175f5ff0e11b8aa01c7afa2b7
                                                      • Instruction Fuzzy Hash: 0B01D2719001199FCB06EBA4D841AFEBB71AF84320F54451AF5156B3E2CF78AE85CF98
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 0041751F
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00417529
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • std::_Facet_Register.LIBCPMT ref: 0041757A
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0041759A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: f01e222f18621794377160519e43bd9fbbe4608f042ccdd31852fd5c4ac07205
                                                      • Instruction ID: d8aaf4ff6e37f6b554c8f62e7946f66656058934e977240c4af4a78b7d637df4
                                                      • Opcode Fuzzy Hash: f01e222f18621794377160519e43bd9fbbe4608f042ccdd31852fd5c4ac07205
                                                      • Instruction Fuzzy Hash: C901C471900119ABCB06EBA4D8416FEB772AF84320F14451BE5196B3D2CF789A45CB99
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 004175B4
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 004175BE
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • std::_Facet_Register.LIBCPMT ref: 0041760F
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0041762F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: 0d7acf0b3206cd3239918613c489c5b1c35cfc38f642fef1df9e69cbca2f0c02
                                                      • Instruction ID: c804a0ccf75692e5a4451afd840f87acdcf3c9e33bbd92b792296ad89897f1ed
                                                      • Opcode Fuzzy Hash: 0d7acf0b3206cd3239918613c489c5b1c35cfc38f642fef1df9e69cbca2f0c02
                                                      • Instruction Fuzzy Hash: 7701C4719001199BCB06EBA8DC416FEB771AF44320F14451AF515AB3D2CFB8DE45CB88
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00417773
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0041777D
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • std::_Facet_Register.LIBCPMT ref: 004177CE
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 004177EE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: 7a3f645d136e94c071687da5c727a70d4f6b387156c50911db59182e0d4e9329
                                                      • Instruction ID: a4468dca0d66ccac40839b0cd1512baa883553104e253858c24d84fb6c0052d9
                                                      • Opcode Fuzzy Hash: 7a3f645d136e94c071687da5c727a70d4f6b387156c50911db59182e0d4e9329
                                                      • Instruction Fuzzy Hash: 3D0126769002199BCB06EBA4C881BFFB771AF44320F14441AE5256B3E2CF789E41CB98
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00409723
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0040972D
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • std::_Facet_Register.LIBCPMT ref: 0040977E
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0040979E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: 3e9ccbf2461bbebd33c5169694f20d57e55005e3383f87e55e7f894717f4d493
                                                      • Instruction ID: d9afba6ca3a59fbd8cc225216a02ef2dee46cd4dfc3def5983d583285d859c0a
                                                      • Opcode Fuzzy Hash: 3e9ccbf2461bbebd33c5169694f20d57e55005e3383f87e55e7f894717f4d493
                                                      • Instruction Fuzzy Hash: 0E01C036900219DBCB06EBA4D841BBEB775AF84720F14452AF5157B3D2CF789E05CB88
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 004097B8
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 004097C2
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • std::_Facet_Register.LIBCPMT ref: 00409813
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00409833
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: 9da9581d0b7b97286736f739827baaccf8dffda11fcbe61b4a8e486d9c34ccdd
                                                      • Instruction ID: a0616de847af782e24b0397b41e41742ef604653ea78ab855124962d15a15135
                                                      • Opcode Fuzzy Hash: 9da9581d0b7b97286736f739827baaccf8dffda11fcbe61b4a8e486d9c34ccdd
                                                      • Instruction Fuzzy Hash: 41010032910119DBCB06EBA4D841ABFB761AF80320F14852BE515BB3D2CF789E01CB88
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 0040984D
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00409857
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • std::_Facet_Register.LIBCPMT ref: 004098A8
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 004098C8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: e021a4183a4d6a51c9a86f461114c3bd935f60fe9a80cc6a6d9e1dec23a70199
                                                      • Instruction ID: fff9089c5da57cc43cd8a390c3014f1424484e176f4a0458313377d29e125c7f
                                                      • Opcode Fuzzy Hash: e021a4183a4d6a51c9a86f461114c3bd935f60fe9a80cc6a6d9e1dec23a70199
                                                      • Instruction Fuzzy Hash: 95010476900119DBCB06FBA4D8557BEB761AF80320F14842BF5196B3D2CF7C9E048B98
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00417808
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00417812
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • std::_Facet_Register.LIBCPMT ref: 00417863
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00417883
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: 635664989a476907a141e5f093ed9a9eccc1414bbb838d7d1ac424d53ec6e0e6
                                                      • Instruction ID: f9fe9cd10136606b33c5f52acc221a2de26795a50c48ad938fc1d81cdbf3f0bf
                                                      • Opcode Fuzzy Hash: 635664989a476907a141e5f093ed9a9eccc1414bbb838d7d1ac424d53ec6e0e6
                                                      • Instruction Fuzzy Hash: 1B0104329441199BCB06FBA4C8457FEB771AF80310F14451AE515AB3D2CF789A45CB98
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 004098E2
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 004098EC
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • std::_Facet_Register.LIBCPMT ref: 0040993D
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0040995D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: 9f55fbf905afb7e3e0258f10702b47596b2edb8ae54cd31f80974248cf7f254d
                                                      • Instruction ID: 7ab08fc78382e803f3b41d2012399a8314e1e075562a15db3a25213af077f3bc
                                                      • Opcode Fuzzy Hash: 9f55fbf905afb7e3e0258f10702b47596b2edb8ae54cd31f80974248cf7f254d
                                                      • Instruction Fuzzy Hash: 2B01007190021AABCB02FBA4C841ABEB761AF84310F10452EE5197B3D2CF789E018B88
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00409AA1
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00409AAB
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • std::_Facet_Register.LIBCPMT ref: 00409AFC
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00409B1C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: ff7911f25e1333a44fc020ba20a12bda1ed74b8da5431a96d8f0c5e769cb5f26
                                                      • Instruction ID: a62e2980c5c1579b74527667938f25a21b39e4bb9a249f0fd8127c0e0499f8bb
                                                      • Opcode Fuzzy Hash: ff7911f25e1333a44fc020ba20a12bda1ed74b8da5431a96d8f0c5e769cb5f26
                                                      • Instruction Fuzzy Hash: B4012231900119DBCB06EBA4EC41ABEB771AF80320F24452BE5157B3D2CF789E01CB98
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00409B36
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00409B40
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • std::_Facet_Register.LIBCPMT ref: 00409B91
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00409BB1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: af71c8e0a787e129c3922abc7e445029941bf9ff09ac987e0b1a5de50b8fffe3
                                                      • Instruction ID: 719dc2150be5196cddba55af7d0650b26526f515197a12d4fb3d4c861cf8bbb1
                                                      • Opcode Fuzzy Hash: af71c8e0a787e129c3922abc7e445029941bf9ff09ac987e0b1a5de50b8fffe3
                                                      • Instruction Fuzzy Hash: FA01C0319001199BCB06EBA4E841AFEB775BF80720F14452AE5157B3D2CF78AE058B88
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00409BCB
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00409BD5
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • std::_Facet_Register.LIBCPMT ref: 00409C26
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00409C46
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: d3802a7f53451cbb195795dd65ba592578b401237ea9901e362e9d258f53c5ba
                                                      • Instruction ID: ba032b302b7c3767394b48b8e9d5dd2d23f43621e096a7990745041024b70d65
                                                      • Opcode Fuzzy Hash: d3802a7f53451cbb195795dd65ba592578b401237ea9901e362e9d258f53c5ba
                                                      • Instruction Fuzzy Hash: 44010031900119EBDB06EBA0D9416BEB7A1AF90320F24452AE514AB3D2CF789E40CB98
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00409C60
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00409C6A
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • std::_Facet_Register.LIBCPMT ref: 00409CBB
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00409CDB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: ba3efa1cd3a8c0edab29bfe4b59b91d87b9cc6e134491db8c7fe1caa7e12cb17
                                                      • Instruction ID: e47fddde52b08d1682bef5668bef082b668b66254ec579a2a40b161c63cfbe47
                                                      • Opcode Fuzzy Hash: ba3efa1cd3a8c0edab29bfe4b59b91d87b9cc6e134491db8c7fe1caa7e12cb17
                                                      • Instruction Fuzzy Hash: D5012271900119DBCB06EBA8D8456FEB7A1AF80320F14452FE4157B3D2CF788E00CB98
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00409027
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00409031
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • ctype.LIBCPMT ref: 0040906B
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 004090A2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3ctype
                                                      • String ID:
                                                      • API String ID: 3358926169-0
                                                      • Opcode ID: 33d61f94bc3f345c7080ff29bb2da9dac65a7afe49e8179375978d0b347a7119
                                                      • Instruction ID: f6dd6a4f0dd17ea97d2a480c73d2720e5ca8e54911eef9c81ceae2b1e21828f7
                                                      • Opcode Fuzzy Hash: 33d61f94bc3f345c7080ff29bb2da9dac65a7afe49e8179375978d0b347a7119
                                                      • Instruction Fuzzy Hash: 4AF0903194021EABDB06FBA4C842BBF7225AF50324F50492AF6157B2D2DF7D8E05C789
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 004090BC
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 004090C6
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • ctype.LIBCPMT ref: 00409100
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00409137
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3ctype
                                                      • String ID:
                                                      • API String ID: 3358926169-0
                                                      • Opcode ID: 27a852e07d0ed0f5c5fc039213fc87b0c3b337574fc85409fdb73d806f72feaf
                                                      • Instruction ID: 8ec8076080fa4566934b2920a0059671b448cade1b54252dfc4d2b105df40c6e
                                                      • Opcode Fuzzy Hash: 27a852e07d0ed0f5c5fc039213fc87b0c3b337574fc85409fdb73d806f72feaf
                                                      • Instruction Fuzzy Hash: D1F0963194011EABDB06FBA0DC46BBF3221AF50714F50452AF5246F2D2DF3C8E088798
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00409151
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0040915B
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • messages.LIBCPMT ref: 00409195
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 004091CC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3messages
                                                      • String ID:
                                                      • API String ID: 50917705-0
                                                      • Opcode ID: b61e32995e15f1f4985625efcf3586603dffed9c720337406ce930bc24ceed30
                                                      • Instruction ID: 7e9dee5ffd4c62991cbc15967ccd3aa59db6c04b97f516b4388d4229528e91fe
                                                      • Opcode Fuzzy Hash: b61e32995e15f1f4985625efcf3586603dffed9c720337406ce930bc24ceed30
                                                      • Instruction Fuzzy Hash: 6CF0903194021EABDB06F7A0C846BBF7225AF50714F60452AF6157F2D2DF3C9E088788
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 004091E6
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 004091F0
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • messages.LIBCPMT ref: 0040922A
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00409261
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3messages
                                                      • String ID:
                                                      • API String ID: 50917705-0
                                                      • Opcode ID: 10beacea46b4aefc3167c169c8840a161ce9f231ed3417057cfcba48cf248669
                                                      • Instruction ID: ca3619d2b1bac6949c1463f8e298e2f0191cbd9cbdfe4b41ceba6da386be8a33
                                                      • Opcode Fuzzy Hash: 10beacea46b4aefc3167c169c8840a161ce9f231ed3417057cfcba48cf248669
                                                      • Instruction Fuzzy Hash: 18F06235940119AACB06FBA0D8427BE72259B50724F50496AF6156B2D2DF3C8E048798
                                                      APIs
                                                      • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 00470395
                                                      • GetLastError.KERNEL32 ref: 004703A1
                                                        • Part of subcall function 0047044A: CloseHandle.KERNEL32(FFFFFFFE,00470494,?,0046BF8F,00000010,00000001,00000010,?,?,0045DCCB,?,00000010,00000000,?,?), ref: 0047045A
                                                      • ___initconout.LIBCMT ref: 004703B1
                                                        • Part of subcall function 0047040C: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0047043B,0046BF7C,?,?,0045DCCB,?,00000010,00000000,?), ref: 0047041F
                                                      • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 004703C5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                      • String ID:
                                                      • API String ID: 2744216297-0
                                                      • Opcode ID: d6e50a9dca69a58f631a250c5b76557231198a9c8f2d39f9c01a0a7a42e105ee
                                                      • Instruction ID: f71021113f8a465a77b1ed9a1a2f13af96ac5ba92957d0417c7d3a142c164671
                                                      • Opcode Fuzzy Hash: d6e50a9dca69a58f631a250c5b76557231198a9c8f2d39f9c01a0a7a42e105ee
                                                      • Instruction Fuzzy Hash: 7BF08236101601EBCB222B96DC08D877FB6FFC8320710842EFA4D82531DB7198A1DB99
                                                      APIs
                                                      • WriteConsoleW.KERNEL32(00000010,00000000,00488210,00000000,00000010,?,0046BF8F,00000010,00000001,00000010,?,?,0045DCCB,?,00000010,00000000), ref: 00470478
                                                      • GetLastError.KERNEL32(?,0046BF8F,00000010,00000001,00000010,?,?,0045DCCB,?,00000010,00000000,?,?,?,0045E29A,00000010), ref: 00470484
                                                        • Part of subcall function 0047044A: CloseHandle.KERNEL32(FFFFFFFE,00470494,?,0046BF8F,00000010,00000001,00000010,?,?,0045DCCB,?,00000010,00000000,?,?), ref: 0047045A
                                                      • ___initconout.LIBCMT ref: 00470494
                                                        • Part of subcall function 0047040C: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0047043B,0046BF7C,?,?,0045DCCB,?,00000010,00000000,?), ref: 0047041F
                                                      • WriteConsoleW.KERNEL32(00000010,00000000,00488210,00000000,?,0046BF8F,00000010,00000001,00000010,?,?,0045DCCB,?,00000010,00000000,?), ref: 004704A9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                      • String ID:
                                                      • API String ID: 2744216297-0
                                                      • Opcode ID: 3843ec8779c65fad743e79d6b467dc512e3adfff911dc11bc9ba712615aa7a72
                                                      • Instruction ID: 1ebe5adf811e31578d286b2542e0242d03b56feba61295b25810b9de6d57fa01
                                                      • Opcode Fuzzy Hash: 3843ec8779c65fad743e79d6b467dc512e3adfff911dc11bc9ba712615aa7a72
                                                      • Instruction Fuzzy Hash: 10F01C36141225FBCF222F91DC089CA3F26FB083A4B408429FA0D95231DA768860DBD9
                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 004094CF
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 004094D9
                                                        • Part of subcall function 003F2220: std::_Lockit::_Lockit.LIBCPMT ref: 003F222F
                                                        • Part of subcall function 003F2220: std::_Lockit::~_Lockit.LIBCPMT ref: 003F224A
                                                      • moneypunct.LIBCPMT ref: 00409513
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 0040954A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3moneypunct
                                                      • String ID:
                                                      • API String ID: 3160146232-0
                                                      • Opcode ID: d094151d7c84c10ab40ce635427787974411a8c81ac5efb164173f6447cab7ba
                                                      • Instruction ID: 01a4a2272aea1c981d0dacae9e6e9a1298f3becd3589b95f8d0df6e91dff8feb
                                                      • Opcode Fuzzy Hash: d094151d7c84c10ab40ce635427787974411a8c81ac5efb164173f6447cab7ba
                                                      • Instruction Fuzzy Hash: C7F05E3194021DB7CB02FBA0CC42BFF7225AB90304F40442AB5146B2D2CB789E04CB98
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __aulldiv
                                                      • String ID: +$-
                                                      • API String ID: 3732870572-2137968064
                                                      • Opcode ID: 2aa0a1fdbdad134754cd3774889f26da487012c11bb058aa3aad14e1fe060bdc
                                                      • Instruction ID: 218138463a48f8e104dbe51309dd0a7739c27e37855774a4cad35ffe4c1cc4f2
                                                      • Opcode Fuzzy Hash: 2aa0a1fdbdad134754cd3774889f26da487012c11bb058aa3aad14e1fe060bdc
                                                      • Instruction Fuzzy Hash: EAA1E870D40A58DFEF14CE65C8517EF7BA1EF45324F14865BE8A1EB382D2389902CB59
                                                      APIs
                                                      • OffsetRect.USER32(00000000,00000000,00000000), ref: 004772E8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: OffsetRect
                                                      • String ID: 0$Zatlat
                                                      • API String ID: 177026234-1547964091
                                                      • Opcode ID: 75e49a921a13663d4a1c15516fd4770134de10fc5ffc5b7b7dc58d22444bc414
                                                      • Instruction ID: 7cd403b66d5bba3dbf378f84fa681bd5096f5e06e9bcf2f2a070b00e8b819cb3
                                                      • Opcode Fuzzy Hash: 75e49a921a13663d4a1c15516fd4770134de10fc5ffc5b7b7dc58d22444bc414
                                                      • Instruction Fuzzy Hash: 519114715083805BE304DF25CC897AFBBE0AFC5308F54492EF9D98B292D779D8488B66
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog3___cftoe
                                                      • String ID: !%x
                                                      • API String ID: 855520168-1893981228
                                                      • Opcode ID: 896c238e10dba1e7f9eb88d110a733ddcd7668695e80f56e503d61ee0dd6bc3a
                                                      • Instruction ID: 4910a529e5d57984444b8ab8d98bd85328caf16ca1f3c76a3f59d7176f2e67a2
                                                      • Opcode Fuzzy Hash: 896c238e10dba1e7f9eb88d110a733ddcd7668695e80f56e503d61ee0dd6bc3a
                                                      • Instruction Fuzzy Hash: BA717C71D00209EFDF14EFA8E881AEEB7B5EF48304F14452AF515A7351EB39A981CB58
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog3___cftoe
                                                      • String ID: !%x
                                                      • API String ID: 855520168-1893981228
                                                      • Opcode ID: 5214e2e064ec55604ade760fb49ea90012d4f1880e3e4dde7be66d02913b5110
                                                      • Instruction ID: c02dc20e1a9d20da1c8dbda38ad30d8ca9f50ca8e872ca446a76aa6bb66af18a
                                                      • Opcode Fuzzy Hash: 5214e2e064ec55604ade760fb49ea90012d4f1880e3e4dde7be66d02913b5110
                                                      • Instruction Fuzzy Hash: B3714E71D00209EFDF14EFA8E885AEEB7B5EF48304F10452AF515A7251EB39AA81CB54
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __aulldiv
                                                      • String ID: -$0123456789abcdefghijklmnopqrstuvwxyz
                                                      • API String ID: 3732870572-1956417402
                                                      • Opcode ID: 04f189a045be0e8ba7698d57dfc0a9a37a9111c417826018bc59e8d4154053c2
                                                      • Instruction ID: 0a43d3ca93c6b755b990a56b25bcf6eff88a9b94a62e2ae78c373b2e59619954
                                                      • Opcode Fuzzy Hash: 04f189a045be0e8ba7698d57dfc0a9a37a9111c417826018bc59e8d4154053c2
                                                      • Instruction Fuzzy Hash: 9651D430A042589ACF25CEA984917FFBBB5EF45300F14845FE895D7342C37889D28B99
                                                      APIs
                                                      • EncodePointer.KERNEL32(00000000,?), ref: 00422680
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: EncodePointer
                                                      • String ID: MOC$RCC
                                                      • API String ID: 2118026453-2084237596
                                                      • Opcode ID: cb4b3a9696ecdef80fd3afce56382333f81cde124eec54d39bf01260e39fa056
                                                      • Instruction ID: 878550cd544333cb34dba5bb3b7623e75e63b1f1aef057334b7847be9581ae6b
                                                      • Opcode Fuzzy Hash: cb4b3a9696ecdef80fd3afce56382333f81cde124eec54d39bf01260e39fa056
                                                      • Instruction Fuzzy Hash: B641BA72A00219BFCF15DF94DE81AEEBBB5BF48304F14809AF904A7221D3799950DB68
                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 00414216
                                                        • Part of subcall function 00409020: __EH_prolog3.LIBCMT ref: 00409027
                                                        • Part of subcall function 00409020: std::_Lockit::_Lockit.LIBCPMT ref: 00409031
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog3H_prolog3_LockitLockit::_std::_
                                                      • String ID: %.0Lf$0123456789-
                                                      • API String ID: 79917597-3094241602
                                                      • Opcode ID: bdc66482b15c8d824a69c4d16d839c582f027f0cc0613ddb4d36372962892ca9
                                                      • Instruction ID: c76441a513f776d0e8c78e3885c6740a923229904bd8ce964ab7a06b14cf57e6
                                                      • Opcode Fuzzy Hash: bdc66482b15c8d824a69c4d16d839c582f027f0cc0613ddb4d36372962892ca9
                                                      • Instruction Fuzzy Hash: 2C416A71900119DFCF05EFE4C9819EE7BB5BF48314F10006AF915AB291DB389D96CB98
                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 00414543
                                                        • Part of subcall function 004090B5: __EH_prolog3.LIBCMT ref: 004090BC
                                                        • Part of subcall function 004090B5: std::_Lockit::_Lockit.LIBCPMT ref: 004090C6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog3H_prolog3_LockitLockit::_std::_
                                                      • String ID: 0123456789-$0123456789-
                                                      • API String ID: 79917597-2494171821
                                                      • Opcode ID: 75acd2c97f63a05e880fbeebb1b8799dae985a552d8a556b69318f71fd240b7c
                                                      • Instruction ID: 74853a2d94bb8ea05d74bfa8b8deb29fea9c58cdfaee9c502657e9890e934b1f
                                                      • Opcode Fuzzy Hash: 75acd2c97f63a05e880fbeebb1b8799dae985a552d8a556b69318f71fd240b7c
                                                      • Instruction Fuzzy Hash: 5A417C71900119EFCF05EFA4C9819EEBBB5FF48314F10406AE911AB291DB389D96CB99
                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 0041A837
                                                        • Part of subcall function 003F59E0: std::_Lockit::_Lockit.LIBCPMT ref: 003F59ED
                                                        • Part of subcall function 003F59E0: std::_Lockit::_Lockit.LIBCPMT ref: 003F5A07
                                                        • Part of subcall function 003F59E0: std::_Lockit::~_Lockit.LIBCPMT ref: 003F5A28
                                                        • Part of subcall function 003F59E0: std::_Lockit::~_Lockit.LIBCPMT ref: 003F5A54
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3_
                                                      • String ID: 0123456789-$0123456789-
                                                      • API String ID: 2088892359-2494171821
                                                      • Opcode ID: 768ca265ce7a4c6597f4ada9baa2e3e83b00fae9a07aec98a59c3ff025c3a6d9
                                                      • Instruction ID: 5dc1228feef890516719f7349d0e17e4eae940697df03d44ae61327872d6521f
                                                      • Opcode Fuzzy Hash: 768ca265ce7a4c6597f4ada9baa2e3e83b00fae9a07aec98a59c3ff025c3a6d9
                                                      • Instruction Fuzzy Hash: 9541AD31D01209EFCF06EFA4D8819EEBBB5AF08310F10405AF911AB252DB399E56DF59
                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 003F7429
                                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 003F747A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                      • String ID: bad locale name
                                                      • API String ID: 3988782225-1405518554
                                                      • Opcode ID: 46d2e1771e53825ee0f654e623fc8eb47b986efb7ef754f4ce66130f2e1d4dce
                                                      • Instruction ID: 7e80a8eb28c2e2b23eea15c9ffaba063a0b19bf738e6764e14bb31362f04765f
                                                      • Opcode Fuzzy Hash: 46d2e1771e53825ee0f654e623fc8eb47b986efb7ef754f4ce66130f2e1d4dce
                                                      • Instruction Fuzzy Hash: A321BB705093449FD312DF29C840B6BBFF0AF94704F18885EF6889B241D3BAC80ACB92
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: NameName::
                                                      • String ID: A
                                                      • API String ID: 1333004437-3554254475
                                                      • Opcode ID: 28a211898a6e07c77dd1159ae5f62e734e0a41320836a3bfb55ea7dad1118e7a
                                                      • Instruction ID: fa546840a5276ebb6c482e5a5a0c4948ad4eddefca6547fd74bacaecb3e9d336
                                                      • Opcode Fuzzy Hash: 28a211898a6e07c77dd1159ae5f62e734e0a41320836a3bfb55ea7dad1118e7a
                                                      • Instruction Fuzzy Hash: 5821ACB5B00128EEDF10DF54E815AAD7BB1EB44304F91809EE405AB251C7389E86CF49
                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 003F2075
                                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 003F20BA
                                                        • Part of subcall function 003FB724: _Yarn.LIBCPMT ref: 003FB743
                                                        • Part of subcall function 003FB724: _Yarn.LIBCPMT ref: 003FB767
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                      • String ID: bad locale name
                                                      • API String ID: 1908188788-1405518554
                                                      • Opcode ID: a6aba1eff4cae0b7e209b68ac50a776a54394ddbc85280954fa0d1fe87c5516a
                                                      • Instruction ID: e12e53d2b2e405dab77fb967af16be843ffd29bf7fdd21867df52cc4931a2159
                                                      • Opcode Fuzzy Hash: a6aba1eff4cae0b7e209b68ac50a776a54394ddbc85280954fa0d1fe87c5516a
                                                      • Instruction Fuzzy Hash: C3F01D61101B409ED371DF368505757BEE4AF25310F048E1ED6CAC7A51D375E508CBA5
                                                      APIs
                                                      • GetSystemTimePreciseAsFileTime.KERNEL32(?,003FF361,?,00000000,00000000,?,003FF2A9,?,?,?,?,003FEE2C,?,?), ref: 0041B5D8
                                                      • GetSystemTimeAsFileTime.KERNEL32(?,CC824C46,?,?,0047634B,000000FF,?,003FF361,?,00000000,00000000,?,003FF2A9,?,?), ref: 0041B5DC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2136125171.00000000003F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003F0000, based on PE: true
                                                      • Associated: 00000000.00000002.2136104661.00000000003F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136236821.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.000000000048A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136268298.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2136311348.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_3f0000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Time$FileSystem$Precise
                                                      • String ID: ,?
                                                      • API String ID: 743729956-1694507155
                                                      • Opcode ID: d3d76a689d58b587d1dc2022a2b04e6dd282885324ac0f14848571cbe51b1335
                                                      • Instruction ID: b024b9f2366c2c8b13c12f36b6783ccff10a4680abf421fc8a7080da201f2e5b
                                                      • Opcode Fuzzy Hash: d3d76a689d58b587d1dc2022a2b04e6dd282885324ac0f14848571cbe51b1335
                                                      • Instruction Fuzzy Hash: 62F0E572A44954EFC7018F44DC04B9DBBA9F708B14F10423BEC1793390DB78A8008BC8

                                                      Execution Graph

                                                      Execution Coverage:4.2%
                                                      Dynamic/Decrypted Code Coverage:0.7%
                                                      Signature Coverage:12%
                                                      Total number of Nodes:2000
                                                      Total number of Limit Nodes:39
                                                      execution_graph 90053 1fc5fd40 90055 1fc5fd67 90053->90055 90054 1fc5fdf4 ReadFile 90054->90055 90056 1fc5fd83 90054->90056 90055->90054 90055->90056 90057 1fc67d30 90058 1fc67d43 90057->90058 90060 1fc67d49 90057->90060 90061 1fde8d80 90058->90061 90063 1fde8d8f __vsnprintf 90061->90063 90062 1fde8e6f 90062->90060 90063->90062 90065 1fc64cf0 90063->90065 90066 1fc64d30 90065->90066 90067 1fc64ed5 CreateFileW 90066->90067 90068 1fc6506d 90066->90068 90067->90066 90068->90062 90069 41a76b 6 API calls 90070 41a7e2 17 API calls 90069->90070 90071 41a7bc GetProcAddress GetProcAddress 90069->90071 90101 402339 90070->90101 90071->90070 90079 41a955 90203 41185b 90079->90203 90081 41a975 90082 41185b 4 API calls 90081->90082 90083 41a97c 90082->90083 90084 41185b 4 API calls 90083->90084 90085 41a983 90084->90085 90211 41177a 90085->90211 90087 41a98c 90088 41a9a4 12 API calls 90087->90088 90089 41aa04 90088->90089 90090 41ab51 12 API calls 90089->90090 90091 41aa0d 6 API calls 90089->90091 90215 418fd9 90090->90215 90595 41193a 90091->90595 90095 41aa45 OpenEventA 90096 41aad8 8 API calls 90095->90096 90097 41aa5c 6 API calls 90095->90097 90099 41ab1c 6 API calls 90096->90099 90596 41193a 90097->90596 90099->90089 90100 41aa94 7 API calls 90100->90090 90597 404239 LocalAlloc 90101->90597 90103 40234d 90104 404239 12 API calls 90103->90104 90105 402366 90104->90105 90106 404239 12 API calls 90105->90106 90107 40237f 90106->90107 90108 404239 12 API calls 90107->90108 90109 402398 90108->90109 90110 404239 12 API calls 90109->90110 90111 4023b1 90110->90111 90112 404239 12 API calls 90111->90112 90113 4023ca 90112->90113 90114 404239 12 API calls 90113->90114 90115 4023e3 90114->90115 90116 404239 12 API calls 90115->90116 90117 4023fc 90116->90117 90118 404239 12 API calls 90117->90118 90119 402415 90118->90119 90120 404239 12 API calls 90119->90120 90121 40242e 90120->90121 90122 404239 12 API calls 90121->90122 90123 402447 90122->90123 90124 404239 12 API calls 90123->90124 90125 402460 90124->90125 90126 404239 12 API calls 90125->90126 90127 402479 90126->90127 90128 404239 12 API calls 90127->90128 90129 402492 90128->90129 90130 404239 12 API calls 90129->90130 90131 4024ab 90130->90131 90132 404239 12 API calls 90131->90132 90133 4024c4 90132->90133 90134 404239 12 API calls 90133->90134 90135 4024dd 90134->90135 90136 404239 12 API calls 90135->90136 90137 4024f6 90136->90137 90138 404239 12 API calls 90137->90138 90139 40250f 90138->90139 90140 404239 12 API calls 90139->90140 90141 402528 90140->90141 90142 404239 12 API calls 90141->90142 90143 402541 90142->90143 90144 404239 12 API calls 90143->90144 90145 40255a 90144->90145 90146 404239 12 API calls 90145->90146 90147 402573 90146->90147 90148 404239 12 API calls 90147->90148 90149 40258c 90148->90149 90150 404239 12 API calls 90149->90150 90151 4025a5 90150->90151 90152 404239 12 API calls 90151->90152 90153 4025be 90152->90153 90154 404239 12 API calls 90153->90154 90155 4025d7 90154->90155 90156 404239 12 API calls 90155->90156 90157 4025f0 90156->90157 90158 404239 12 API calls 90157->90158 90159 402609 90158->90159 90160 404239 12 API calls 90159->90160 90161 402622 90160->90161 90162 404239 12 API calls 90161->90162 90163 40263b 90162->90163 90164 404239 12 API calls 90163->90164 90165 402654 90164->90165 90166 404239 12 API calls 90165->90166 90167 40266d 90166->90167 90168 404239 12 API calls 90167->90168 90169 402686 90168->90169 90170 404239 12 API calls 90169->90170 90171 40269f 90170->90171 90172 404239 12 API calls 90171->90172 90173 4026b8 90172->90173 90174 404239 12 API calls 90173->90174 90175 4026d1 90174->90175 90176 404239 12 API calls 90175->90176 90177 4026ea 90176->90177 90178 404239 12 API calls 90177->90178 90179 402703 90178->90179 90180 404239 12 API calls 90179->90180 90181 40271c 6 API calls 90180->90181 90182 41ad16 90181->90182 90601 41acf3 GetPEB 90182->90601 90184 41ad1e 90185 41ad30 90184->90185 90186 41af2b LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 90184->90186 90189 41ad41 21 API calls 90185->90189 90187 41afa0 90186->90187 90188 41af89 GetProcAddress 90186->90188 90190 41afd7 90187->90190 90191 41afa9 GetProcAddress GetProcAddress 90187->90191 90188->90187 90189->90186 90192 41afe0 GetProcAddress 90190->90192 90193 41aff7 90190->90193 90191->90190 90192->90193 90194 41b000 GetProcAddress 90193->90194 90195 41b017 90193->90195 90194->90195 90196 41b020 GetProcAddress GetProcAddress 90195->90196 90197 41a8b3 12 API calls 90195->90197 90196->90197 90198 411668 90197->90198 90199 411677 90198->90199 90200 4116ad 6 API calls 90199->90200 90201 41169f lstrcpyA 90199->90201 90202 411bec GetProcessHeap HeapAlloc GetUserNameA 90200->90202 90201->90200 90202->90079 90602 411648 90203->90602 90205 41186c lstrlenA 90206 411888 90205->90206 90207 4118ba 90206->90207 90209 4118a0 lstrcpyA lstrcatA 90206->90209 90603 4116b4 90207->90603 90209->90207 90210 4118c6 90210->90081 90212 411795 90211->90212 90213 4117d9 90212->90213 90214 4117c9 lstrcpyA 90212->90214 90213->90087 90214->90213 90216 418fe6 90215->90216 90217 411668 lstrcpyA 90216->90217 90218 418ff8 90217->90218 90607 411715 lstrlenA 90218->90607 90221 411715 2 API calls 90222 419025 90221->90222 90611 402727 90222->90611 90226 41922c 90228 411668 lstrcpyA 90226->90228 90420 4195ac 90226->90420 90230 419249 90228->90230 90229 4195d7 90231 41177a lstrcpyA 90229->90231 90232 41185b 4 API calls 90230->90232 90234 4195e2 90231->90234 90233 419260 90232->90233 90235 41177a lstrcpyA 90233->90235 90237 411668 lstrcpyA 90234->90237 90236 41926c 90235->90236 90239 41185b 4 API calls 90236->90239 90238 4195fd 90237->90238 90240 41185b 4 API calls 90238->90240 90241 41928e 90239->90241 90242 419620 90240->90242 90243 41177a lstrcpyA 90241->90243 91212 4117e0 90242->91212 90246 41929a 90243->90246 90245 419627 90247 41177a lstrcpyA 90245->90247 90248 41185b 4 API calls 90246->90248 90250 419633 90247->90250 90249 4192bc 90248->90249 90251 41177a lstrcpyA 90249->90251 90253 419656 CreateDirectoryA 90250->90253 90252 4192c8 90251->90252 90254 41185b 4 API calls 90252->90254 91218 40134c 90253->91218 90256 4192ea 90254->90256 90258 41177a lstrcpyA 90256->90258 90260 4192f6 90258->90260 90264 41185b 4 API calls 90260->90264 90261 419677 91330 41a4cb 90261->91330 90263 419686 90266 41177a lstrcpyA 90263->90266 90265 419318 90264->90265 90267 41177a lstrcpyA 90265->90267 90268 4196a0 90266->90268 90269 419324 90267->90269 90270 41177a lstrcpyA 90268->90270 90273 41185b 4 API calls 90269->90273 90271 4196af 90270->90271 90272 4116b4 lstrcpyA 90271->90272 90274 4196be 90272->90274 90275 419346 90273->90275 90276 41185b 4 API calls 90274->90276 90277 41177a lstrcpyA 90275->90277 90279 4196d5 90276->90279 90278 419352 90277->90278 90282 41185b 4 API calls 90278->90282 90280 41177a lstrcpyA 90279->90280 90281 4196e1 90280->90281 90285 4117e0 3 API calls 90281->90285 90283 419374 90282->90283 90284 41177a lstrcpyA 90283->90284 90286 419380 90284->90286 90287 419705 90285->90287 90289 41185b 4 API calls 90286->90289 90288 41177a lstrcpyA 90287->90288 90291 419711 90288->90291 90290 4193a2 90289->90290 90292 41177a lstrcpyA 90290->90292 90293 41972c InternetOpenA 90291->90293 90294 4193ae 90292->90294 91337 41193a 90293->91337 90298 41185b 4 API calls 90294->90298 90296 419746 InternetOpenA 90297 4116b4 lstrcpyA 90296->90297 90300 419767 90297->90300 90299 4193d0 90298->90299 90301 41177a lstrcpyA 90299->90301 90303 411668 lstrcpyA 90300->90303 90302 4193dc 90301->90302 90305 41185b 4 API calls 90302->90305 90304 419777 90303->90304 91338 411948 GetWindowsDirectoryA 90304->91338 90307 4193fe 90305->90307 90309 41177a lstrcpyA 90307->90309 90312 41940a 90309->90312 90310 4116b4 lstrcpyA 90311 41978f 90310->90311 91357 4043fa 90311->91357 90316 41185b 4 API calls 90312->90316 90314 419795 91497 414f8c 90314->91497 90318 41942c 90316->90318 90317 41979d 90320 411668 lstrcpyA 90317->90320 90319 41177a lstrcpyA 90318->90319 90321 419438 90319->90321 90322 4197cc 90320->90322 90324 41185b 4 API calls 90321->90324 90323 40134c lstrcpyA 90322->90323 90325 4197da 90323->90325 90326 41945a 90324->90326 91517 4058c4 90325->91517 90328 41177a lstrcpyA 90326->90328 90330 419466 90328->90330 90329 4197e0 91698 4148a0 90329->91698 90335 41185b 4 API calls 90330->90335 90332 4197e8 90333 411668 lstrcpyA 90332->90333 90334 41980a 90333->90334 90336 40134c lstrcpyA 90334->90336 90337 419488 90335->90337 90338 419818 90336->90338 90339 41177a lstrcpyA 90337->90339 90340 4058c4 40 API calls 90338->90340 90341 419494 90339->90341 90342 41981e 90340->90342 90345 41185b 4 API calls 90341->90345 91705 4145d9 90342->91705 90344 419826 90346 411668 lstrcpyA 90344->90346 90347 4194b6 90345->90347 90348 419848 90346->90348 90349 41177a lstrcpyA 90347->90349 90351 40134c lstrcpyA 90348->90351 90350 4194c2 90349->90350 90354 41185b 4 API calls 90350->90354 90352 419856 90351->90352 90353 4058c4 40 API calls 90352->90353 90355 41985c 90353->90355 90356 4194e4 90354->90356 91716 4147a4 90355->91716 90358 41177a lstrcpyA 90356->90358 90360 4194f0 90358->90360 90359 419864 90361 40134c lstrcpyA 90359->90361 90365 41185b 4 API calls 90360->90365 90362 419875 90361->90362 91724 4151e4 90362->91724 90364 41987a 90366 4116b4 lstrcpyA 90364->90366 90367 419512 90365->90367 90368 41988b 90366->90368 90369 41177a lstrcpyA 90367->90369 90371 411668 lstrcpyA 90368->90371 90370 41951e 90369->90370 90373 41185b 4 API calls 90370->90373 90372 4198a1 90371->90372 92064 404ad5 90372->92064 90374 419540 90373->90374 90376 41177a lstrcpyA 90374->90376 90378 41954c 90376->90378 90377 4198a6 90379 40134c lstrcpyA 90377->90379 90382 41185b 4 API calls 90378->90382 90384 41956e 90382->90384 90387 41177a lstrcpyA 90384->90387 90400 41957a 90387->90400 91195 4138ba CreateToolhelp32Snapshot Process32First 90400->91195 91204 412d64 90420->91204 90595->90095 90596->90100 90598 40425e 90597->90598 90599 4042dd wcslen wcslen wcslen wcslen 90598->90599 90600 40426d 7 API calls 90598->90600 90599->90103 90600->90598 90601->90184 90602->90205 90604 4116d4 90603->90604 90605 4116fa 90604->90605 90606 4116ea lstrcpyA 90604->90606 90605->90210 90606->90605 90609 411733 90607->90609 90608 411773 90608->90221 90609->90608 90610 411765 lstrcpyA 90609->90610 90610->90608 90612 404239 12 API calls 90611->90612 90613 40273b 90612->90613 90614 404239 12 API calls 90613->90614 90615 402754 90614->90615 90616 404239 12 API calls 90615->90616 90617 40276d 90616->90617 90618 404239 12 API calls 90617->90618 90619 402786 90618->90619 90620 404239 12 API calls 90619->90620 90621 40279f 90620->90621 90622 404239 12 API calls 90621->90622 90623 4027b8 90622->90623 90624 404239 12 API calls 90623->90624 90625 4027d1 90624->90625 90626 404239 12 API calls 90625->90626 90627 4027ea 90626->90627 90628 404239 12 API calls 90627->90628 90629 402803 90628->90629 90630 404239 12 API calls 90629->90630 90631 40281c 90630->90631 90632 404239 12 API calls 90631->90632 90633 402835 90632->90633 90634 404239 12 API calls 90633->90634 90635 40284e 90634->90635 90636 404239 12 API calls 90635->90636 90637 402867 90636->90637 90638 404239 12 API calls 90637->90638 90639 402880 90638->90639 90640 404239 12 API calls 90639->90640 90641 402899 90640->90641 90642 404239 12 API calls 90641->90642 90643 4028b2 90642->90643 90644 404239 12 API calls 90643->90644 90645 4028cb 90644->90645 90646 404239 12 API calls 90645->90646 90647 4028e4 90646->90647 90648 404239 12 API calls 90647->90648 90649 4028fd 90648->90649 90650 404239 12 API calls 90649->90650 90651 402916 90650->90651 90652 404239 12 API calls 90651->90652 90653 40292f 90652->90653 90654 404239 12 API calls 90653->90654 90655 402948 90654->90655 90656 404239 12 API calls 90655->90656 90657 402961 90656->90657 90658 404239 12 API calls 90657->90658 90659 40297a 90658->90659 90660 404239 12 API calls 90659->90660 90661 402993 90660->90661 90662 404239 12 API calls 90661->90662 90663 4029ac 90662->90663 90664 404239 12 API calls 90663->90664 90665 4029c5 90664->90665 90666 404239 12 API calls 90665->90666 90667 4029de 90666->90667 90668 404239 12 API calls 90667->90668 90669 4029f7 90668->90669 90670 404239 12 API calls 90669->90670 90671 402a10 90670->90671 90672 404239 12 API calls 90671->90672 90673 402a29 90672->90673 90674 404239 12 API calls 90673->90674 90675 402a42 90674->90675 90676 404239 12 API calls 90675->90676 90677 402a5b 90676->90677 90678 404239 12 API calls 90677->90678 90679 402a74 90678->90679 90680 404239 12 API calls 90679->90680 90681 402a8d 90680->90681 90682 404239 12 API calls 90681->90682 90683 402aa6 90682->90683 90684 404239 12 API calls 90683->90684 90685 402abf 90684->90685 90686 404239 12 API calls 90685->90686 90687 402ad8 90686->90687 90688 404239 12 API calls 90687->90688 90689 402af1 90688->90689 90690 404239 12 API calls 90689->90690 90691 402b0a 90690->90691 90692 404239 12 API calls 90691->90692 90693 402b23 90692->90693 90694 404239 12 API calls 90693->90694 90695 402b3c 90694->90695 90696 404239 12 API calls 90695->90696 90697 402b55 90696->90697 90698 404239 12 API calls 90697->90698 90699 402b6e 90698->90699 90700 404239 12 API calls 90699->90700 90701 402b87 90700->90701 90702 404239 12 API calls 90701->90702 90703 402ba0 90702->90703 90704 404239 12 API calls 90703->90704 90705 402bb9 90704->90705 90706 404239 12 API calls 90705->90706 90707 402bd2 90706->90707 90708 404239 12 API calls 90707->90708 90709 402beb 90708->90709 90710 404239 12 API calls 90709->90710 90711 402c04 90710->90711 90712 404239 12 API calls 90711->90712 90713 402c1d 90712->90713 90714 404239 12 API calls 90713->90714 90715 402c36 90714->90715 90716 404239 12 API calls 90715->90716 90717 402c4f 90716->90717 90718 404239 12 API calls 90717->90718 90719 402c68 90718->90719 90720 404239 12 API calls 90719->90720 90721 402c81 90720->90721 90722 404239 12 API calls 90721->90722 90723 402c9a 90722->90723 90724 404239 12 API calls 90723->90724 90725 402cb3 90724->90725 90726 404239 12 API calls 90725->90726 90727 402ccc 90726->90727 90728 404239 12 API calls 90727->90728 90729 402ce5 90728->90729 90730 404239 12 API calls 90729->90730 90731 402cfe 90730->90731 90732 404239 12 API calls 90731->90732 90733 402d17 90732->90733 90734 404239 12 API calls 90733->90734 90735 402d30 90734->90735 90736 404239 12 API calls 90735->90736 90737 402d49 90736->90737 90738 404239 12 API calls 90737->90738 90739 402d62 90738->90739 90740 404239 12 API calls 90739->90740 90741 402d7b 90740->90741 90742 404239 12 API calls 90741->90742 90743 402d94 90742->90743 90744 404239 12 API calls 90743->90744 90745 402dad 90744->90745 90746 404239 12 API calls 90745->90746 90747 402dc6 90746->90747 90748 404239 12 API calls 90747->90748 90749 402ddf 90748->90749 90750 404239 12 API calls 90749->90750 90751 402df8 90750->90751 90752 404239 12 API calls 90751->90752 90753 402e11 90752->90753 90754 404239 12 API calls 90753->90754 90755 402e2a 90754->90755 90756 404239 12 API calls 90755->90756 90757 402e43 90756->90757 90758 404239 12 API calls 90757->90758 90759 402e5c 90758->90759 90760 404239 12 API calls 90759->90760 90761 402e75 90760->90761 90762 404239 12 API calls 90761->90762 90763 402e8e 90762->90763 90764 404239 12 API calls 90763->90764 90765 402ea7 90764->90765 90766 404239 12 API calls 90765->90766 90767 402ec0 90766->90767 90768 404239 12 API calls 90767->90768 90769 402ed9 90768->90769 90770 404239 12 API calls 90769->90770 90771 402ef2 90770->90771 90772 404239 12 API calls 90771->90772 90773 402f0b 90772->90773 90774 404239 12 API calls 90773->90774 90775 402f24 90774->90775 90776 404239 12 API calls 90775->90776 90777 402f3d 90776->90777 90778 404239 12 API calls 90777->90778 90779 402f56 90778->90779 90780 404239 12 API calls 90779->90780 90781 402f6f 90780->90781 90782 404239 12 API calls 90781->90782 90783 402f88 90782->90783 90784 404239 12 API calls 90783->90784 90785 402fa1 90784->90785 90786 404239 12 API calls 90785->90786 90787 402fba 90786->90787 90788 404239 12 API calls 90787->90788 90789 402fd3 90788->90789 90790 404239 12 API calls 90789->90790 90791 402fec 90790->90791 90792 404239 12 API calls 90791->90792 90793 403005 90792->90793 90794 404239 12 API calls 90793->90794 90795 40301e 90794->90795 90796 404239 12 API calls 90795->90796 90797 403037 90796->90797 90798 404239 12 API calls 90797->90798 90799 403050 90798->90799 90800 404239 12 API calls 90799->90800 90801 403069 90800->90801 90802 404239 12 API calls 90801->90802 90803 403082 90802->90803 90804 404239 12 API calls 90803->90804 90805 40309b 90804->90805 90806 404239 12 API calls 90805->90806 90807 4030b4 90806->90807 90808 404239 12 API calls 90807->90808 90809 4030cd 90808->90809 90810 404239 12 API calls 90809->90810 90811 4030e6 90810->90811 90812 404239 12 API calls 90811->90812 90813 4030ff 90812->90813 90814 404239 12 API calls 90813->90814 90815 403118 90814->90815 90816 404239 12 API calls 90815->90816 90817 403131 90816->90817 90818 404239 12 API calls 90817->90818 90819 40314a 90818->90819 90820 404239 12 API calls 90819->90820 90821 403163 90820->90821 90822 404239 12 API calls 90821->90822 90823 40317c 90822->90823 90824 404239 12 API calls 90823->90824 90825 403195 90824->90825 90826 404239 12 API calls 90825->90826 90827 4031ae 90826->90827 90828 404239 12 API calls 90827->90828 90829 4031c7 90828->90829 90830 404239 12 API calls 90829->90830 90831 4031e0 90830->90831 90832 404239 12 API calls 90831->90832 90833 4031f9 90832->90833 90834 404239 12 API calls 90833->90834 90835 403212 90834->90835 90836 404239 12 API calls 90835->90836 90837 40322b 90836->90837 90838 404239 12 API calls 90837->90838 90839 403244 90838->90839 90840 404239 12 API calls 90839->90840 90841 40325d 90840->90841 90842 404239 12 API calls 90841->90842 90843 403276 90842->90843 90844 404239 12 API calls 90843->90844 90845 40328f 90844->90845 90846 404239 12 API calls 90845->90846 90847 4032a8 90846->90847 90848 404239 12 API calls 90847->90848 90849 4032c1 90848->90849 90850 404239 12 API calls 90849->90850 90851 4032da 90850->90851 90852 404239 12 API calls 90851->90852 90853 4032f3 90852->90853 90854 404239 12 API calls 90853->90854 90855 40330c 90854->90855 90856 404239 12 API calls 90855->90856 90857 403325 90856->90857 90858 404239 12 API calls 90857->90858 90859 40333e 90858->90859 90860 404239 12 API calls 90859->90860 90861 403357 90860->90861 90862 404239 12 API calls 90861->90862 90863 403370 90862->90863 90864 404239 12 API calls 90863->90864 90865 403389 90864->90865 90866 404239 12 API calls 90865->90866 90867 4033a2 90866->90867 90868 404239 12 API calls 90867->90868 90869 4033bb 90868->90869 90870 404239 12 API calls 90869->90870 90871 4033d4 90870->90871 90872 404239 12 API calls 90871->90872 90873 4033ed 90872->90873 90874 404239 12 API calls 90873->90874 90875 403406 90874->90875 90876 404239 12 API calls 90875->90876 90877 40341f 90876->90877 90878 404239 12 API calls 90877->90878 90879 403438 90878->90879 90880 404239 12 API calls 90879->90880 90881 403451 90880->90881 90882 404239 12 API calls 90881->90882 90883 40346a 90882->90883 90884 404239 12 API calls 90883->90884 90885 403483 90884->90885 90886 404239 12 API calls 90885->90886 90887 40349c 90886->90887 90888 404239 12 API calls 90887->90888 90889 4034b5 90888->90889 90890 404239 12 API calls 90889->90890 90891 4034ce 90890->90891 90892 404239 12 API calls 90891->90892 90893 4034e7 90892->90893 90894 404239 12 API calls 90893->90894 90895 403500 90894->90895 90896 404239 12 API calls 90895->90896 90897 403519 90896->90897 90898 404239 12 API calls 90897->90898 90899 403532 90898->90899 90900 404239 12 API calls 90899->90900 90901 40354b 90900->90901 90902 404239 12 API calls 90901->90902 90903 403564 90902->90903 90904 404239 12 API calls 90903->90904 90905 40357d 90904->90905 90906 404239 12 API calls 90905->90906 90907 403596 90906->90907 90908 404239 12 API calls 90907->90908 90909 4035af 90908->90909 90910 404239 12 API calls 90909->90910 90911 4035c8 90910->90911 90912 404239 12 API calls 90911->90912 90913 4035e1 90912->90913 90914 404239 12 API calls 90913->90914 90915 4035fa 90914->90915 90916 404239 12 API calls 90915->90916 90917 403613 90916->90917 90918 404239 12 API calls 90917->90918 90919 40362c 90918->90919 90920 404239 12 API calls 90919->90920 90921 403645 90920->90921 90922 404239 12 API calls 90921->90922 90923 40365e 90922->90923 90924 404239 12 API calls 90923->90924 90925 403677 90924->90925 90926 404239 12 API calls 90925->90926 90927 403690 90926->90927 90928 404239 12 API calls 90927->90928 90929 4036a9 90928->90929 90930 404239 12 API calls 90929->90930 90931 4036c2 90930->90931 90932 404239 12 API calls 90931->90932 90933 4036db 90932->90933 90934 404239 12 API calls 90933->90934 90935 4036f4 90934->90935 90936 404239 12 API calls 90935->90936 90937 40370d 90936->90937 90938 404239 12 API calls 90937->90938 90939 403726 90938->90939 90940 404239 12 API calls 90939->90940 90941 40373f 90940->90941 90942 404239 12 API calls 90941->90942 90943 403758 90942->90943 90944 404239 12 API calls 90943->90944 90945 403771 90944->90945 90946 404239 12 API calls 90945->90946 90947 40378a 90946->90947 90948 404239 12 API calls 90947->90948 90949 4037a3 90948->90949 90950 404239 12 API calls 90949->90950 90951 4037bc 90950->90951 90952 404239 12 API calls 90951->90952 90953 4037d5 90952->90953 90954 404239 12 API calls 90953->90954 90955 4037ee 90954->90955 90956 404239 12 API calls 90955->90956 90957 403807 90956->90957 90958 404239 12 API calls 90957->90958 90959 403820 90958->90959 90960 404239 12 API calls 90959->90960 90961 403839 90960->90961 90962 404239 12 API calls 90961->90962 90963 403852 90962->90963 90964 404239 12 API calls 90963->90964 90965 40386b 90964->90965 90966 404239 12 API calls 90965->90966 90967 403884 90966->90967 90968 404239 12 API calls 90967->90968 90969 40389d 90968->90969 90970 404239 12 API calls 90969->90970 90971 4038b6 90970->90971 90972 404239 12 API calls 90971->90972 90973 4038cf 90972->90973 90974 404239 12 API calls 90973->90974 90975 4038e8 90974->90975 90976 404239 12 API calls 90975->90976 90977 403901 90976->90977 90978 404239 12 API calls 90977->90978 90979 40391a 90978->90979 90980 404239 12 API calls 90979->90980 90981 403933 90980->90981 90982 404239 12 API calls 90981->90982 90983 40394c 90982->90983 90984 404239 12 API calls 90983->90984 90985 403965 90984->90985 90986 404239 12 API calls 90985->90986 90987 40397e 90986->90987 90988 404239 12 API calls 90987->90988 90989 403997 90988->90989 90990 404239 12 API calls 90989->90990 90991 4039b0 90990->90991 90992 404239 12 API calls 90991->90992 90993 4039c9 90992->90993 90994 404239 12 API calls 90993->90994 90995 4039e2 90994->90995 90996 404239 12 API calls 90995->90996 90997 4039fb 90996->90997 90998 404239 12 API calls 90997->90998 90999 403a14 90998->90999 91000 404239 12 API calls 90999->91000 91001 403a2d 91000->91001 91002 404239 12 API calls 91001->91002 91003 403a46 91002->91003 91004 404239 12 API calls 91003->91004 91005 403a5f 91004->91005 91006 404239 12 API calls 91005->91006 91007 403a78 91006->91007 91008 404239 12 API calls 91007->91008 91009 403a91 91008->91009 91010 404239 12 API calls 91009->91010 91011 403aaa 91010->91011 91012 404239 12 API calls 91011->91012 91013 403ac3 91012->91013 91014 404239 12 API calls 91013->91014 91015 403adc 91014->91015 91016 404239 12 API calls 91015->91016 91017 403af5 91016->91017 91018 404239 12 API calls 91017->91018 91019 403b0e 91018->91019 91020 404239 12 API calls 91019->91020 91021 403b27 91020->91021 91022 404239 12 API calls 91021->91022 91023 403b40 91022->91023 91024 404239 12 API calls 91023->91024 91025 403b59 91024->91025 91026 404239 12 API calls 91025->91026 91027 403b72 91026->91027 91028 404239 12 API calls 91027->91028 91029 403b8b 91028->91029 91030 404239 12 API calls 91029->91030 91031 403ba4 91030->91031 91032 404239 12 API calls 91031->91032 91033 403bbd 91032->91033 91034 404239 12 API calls 91033->91034 91035 403bd6 91034->91035 91036 404239 12 API calls 91035->91036 91037 403bef 91036->91037 91038 404239 12 API calls 91037->91038 91039 403c08 91038->91039 91040 404239 12 API calls 91039->91040 91041 403c21 91040->91041 91042 404239 12 API calls 91041->91042 91043 403c3a 91042->91043 91044 404239 12 API calls 91043->91044 91045 403c53 91044->91045 91046 404239 12 API calls 91045->91046 91047 403c6c 91046->91047 91048 404239 12 API calls 91047->91048 91049 403c85 91048->91049 91050 404239 12 API calls 91049->91050 91051 403c9e 91050->91051 91052 404239 12 API calls 91051->91052 91053 403cb7 91052->91053 91054 404239 12 API calls 91053->91054 91055 403cd0 91054->91055 91056 404239 12 API calls 91055->91056 91057 403ce9 91056->91057 91058 404239 12 API calls 91057->91058 91059 403d02 91058->91059 91060 404239 12 API calls 91059->91060 91061 403d1b 91060->91061 91062 404239 12 API calls 91061->91062 91063 403d34 91062->91063 91064 404239 12 API calls 91063->91064 91065 403d4d 91064->91065 91066 404239 12 API calls 91065->91066 91067 403d66 91066->91067 91068 404239 12 API calls 91067->91068 91069 403d7f 91068->91069 91070 404239 12 API calls 91069->91070 91071 403d98 91070->91071 91072 404239 12 API calls 91071->91072 91073 403db1 91072->91073 91074 404239 12 API calls 91073->91074 91075 403dca 91074->91075 91076 404239 12 API calls 91075->91076 91077 403de3 91076->91077 91078 404239 12 API calls 91077->91078 91079 403dfc 91078->91079 91080 404239 12 API calls 91079->91080 91081 403e15 91080->91081 91082 404239 12 API calls 91081->91082 91083 403e2e 91082->91083 91084 404239 12 API calls 91083->91084 91085 403e47 91084->91085 91086 404239 12 API calls 91085->91086 91087 403e60 91086->91087 91088 404239 12 API calls 91087->91088 91089 403e79 91088->91089 91090 404239 12 API calls 91089->91090 91091 403e92 91090->91091 91092 404239 12 API calls 91091->91092 91093 403eab 91092->91093 91094 404239 12 API calls 91093->91094 91095 403ec4 91094->91095 91096 404239 12 API calls 91095->91096 91097 403edd 91096->91097 91098 404239 12 API calls 91097->91098 91099 403ef6 91098->91099 91100 404239 12 API calls 91099->91100 91101 403f0f 91100->91101 91102 404239 12 API calls 91101->91102 91103 403f28 91102->91103 91104 404239 12 API calls 91103->91104 91105 403f41 91104->91105 91106 404239 12 API calls 91105->91106 91107 403f5a 91106->91107 91108 404239 12 API calls 91107->91108 91109 403f73 91108->91109 91110 404239 12 API calls 91109->91110 91111 403f8c 91110->91111 91112 404239 12 API calls 91111->91112 91113 403fa5 91112->91113 91114 404239 12 API calls 91113->91114 91115 403fbe 91114->91115 91116 404239 12 API calls 91115->91116 91117 403fd7 91116->91117 91118 404239 12 API calls 91117->91118 91119 403ff0 91118->91119 91120 404239 12 API calls 91119->91120 91121 404009 91120->91121 91122 404239 12 API calls 91121->91122 91123 404022 91122->91123 91124 404239 12 API calls 91123->91124 91125 40403b 91124->91125 91126 404239 12 API calls 91125->91126 91127 404054 91126->91127 91128 404239 12 API calls 91127->91128 91129 40406d 91128->91129 91130 404239 12 API calls 91129->91130 91131 404086 91130->91131 91132 404239 12 API calls 91131->91132 91133 40409f 91132->91133 91134 404239 12 API calls 91133->91134 91135 4040b8 91134->91135 91136 404239 12 API calls 91135->91136 91137 4040d1 91136->91137 91138 404239 12 API calls 91137->91138 91139 4040ea 91138->91139 91140 404239 12 API calls 91139->91140 91141 404103 91140->91141 91142 404239 12 API calls 91141->91142 91143 40411c 91142->91143 91144 404239 12 API calls 91143->91144 91145 404135 91144->91145 91146 404239 12 API calls 91145->91146 91147 40414e 91146->91147 91148 404239 12 API calls 91147->91148 91149 404167 91148->91149 91150 404239 12 API calls 91149->91150 91151 404180 91150->91151 91152 404239 12 API calls 91151->91152 91153 404199 91152->91153 91154 404239 12 API calls 91153->91154 91155 4041b2 91154->91155 91156 404239 12 API calls 91155->91156 91157 4041cb 91156->91157 91158 404239 12 API calls 91157->91158 91159 4041e4 91158->91159 91160 404239 12 API calls 91159->91160 91161 4041fd 91160->91161 91162 404239 12 API calls 91161->91162 91163 404216 91162->91163 91164 404239 12 API calls 91163->91164 91165 40422f 91164->91165 91166 41b050 91165->91166 91167 41b060 50 API calls 91166->91167 91168 41b4d7 9 API calls 91166->91168 91167->91168 91169 41b578 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 91168->91169 91170 41b5eb 91168->91170 91169->91170 91171 41b6b0 91170->91171 91172 41b5f8 8 API calls 91170->91172 91173 41b6b9 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 91171->91173 91174 41b72c 91171->91174 91172->91171 91173->91174 91175 41b7c3 91174->91175 91176 41b739 6 API calls 91174->91176 91177 41b7d0 9 API calls 91175->91177 91178 41b89f 91175->91178 91176->91175 91177->91178 91179 41b8a8 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 91178->91179 91180 41b91b 91178->91180 91179->91180 91181 41b952 91180->91181 91182 41b924 GetProcAddress GetProcAddress 91180->91182 91183 41b989 91181->91183 91184 41b95b GetProcAddress GetProcAddress 91181->91184 91182->91181 91185 41b996 10 API calls 91183->91185 91186 41ba7a 91183->91186 91184->91183 91185->91186 91187 41ba83 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 91186->91187 91188 41badf 91186->91188 91187->91188 91189 41bae8 GetProcAddress 91188->91189 91190 41baff 91188->91190 91189->91190 91191 41bb64 91190->91191 91192 41bb08 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 91190->91192 91193 41bb83 91191->91193 91194 41bb6d GetProcAddress 91191->91194 91192->91191 91193->90226 91194->91193 91196 413940 FindCloseChangeNotification 91195->91196 91197 413912 Process32Next 91195->91197 91199 41395c 91196->91199 91197->91196 91198 413926 StrCmpCA 91197->91198 91200 41393a 91198->91200 91199->90420 91201 4216c8 91199->91201 91200->91197 92406 4214fa 91201->92406 91203 4216db 91203->90420 91205 411668 lstrcpyA 91204->91205 91206 412d78 91205->91206 91207 411668 lstrcpyA 91206->91207 91208 412d86 GetSystemTime 91207->91208 91209 412d9d 91208->91209 91210 4116b4 lstrcpyA 91209->91210 91211 412df5 91210->91211 91211->90229 91213 4117f1 91212->91213 91214 411840 91213->91214 91217 411824 lstrcpyA lstrcatA 91213->91217 91215 4116b4 lstrcpyA 91214->91215 91216 41184c 91215->91216 91216->90245 91217->91214 91219 4116b4 lstrcpyA 91218->91219 91220 40135e 91219->91220 91221 4116b4 lstrcpyA 91220->91221 91222 401370 91221->91222 91223 4116b4 lstrcpyA 91222->91223 91224 401382 91223->91224 91225 4116b4 lstrcpyA 91224->91225 91226 4013ac 91225->91226 91227 418167 91226->91227 91228 418178 91227->91228 91229 411715 2 API calls 91228->91229 91230 418185 91229->91230 91231 411715 2 API calls 91230->91231 91232 418192 91231->91232 91233 411715 2 API calls 91232->91233 91234 41819f 91233->91234 91235 411668 lstrcpyA 91234->91235 91236 4181ac 91235->91236 91237 411668 lstrcpyA 91236->91237 91238 4181b9 91237->91238 91239 411668 lstrcpyA 91238->91239 91240 4181c6 91239->91240 91241 411668 lstrcpyA 91240->91241 91242 4181d3 91241->91242 91243 411668 lstrcpyA 91242->91243 91244 4181e0 91243->91244 91245 411668 lstrcpyA 91244->91245 91328 4181ed 91245->91328 91246 402282 lstrcpyA 91246->91328 91247 417f35 28 API calls 91247->91328 91248 4182bc StrCmpCA 91248->91328 91249 4022c1 lstrcpyA 91249->91328 91250 418320 StrCmpCA 91251 418469 91250->91251 91250->91328 91252 41177a lstrcpyA 91251->91252 91253 418475 91252->91253 92429 4022c1 91253->92429 91256 41177a lstrcpyA 91258 41848b 91256->91258 91257 418518 StrCmpCA 91260 418661 91257->91260 91257->91328 92432 40230f lstrcpyA 91258->92432 91259 402297 lstrcpyA 91259->91328 91261 41177a lstrcpyA 91260->91261 91264 41866d 91261->91264 91262 4022ac lstrcpyA 91262->91328 91266 4022c1 lstrcpyA 91264->91266 91265 4184a2 91267 41177a lstrcpyA 91265->91267 91268 418679 91266->91268 91272 4184ac 91267->91272 91269 41177a lstrcpyA 91268->91269 91274 418683 91269->91274 91270 418710 StrCmpCA 91271 418859 91270->91271 91270->91328 91275 41177a lstrcpyA 91271->91275 92433 418c28 lstrcpyA 91272->92433 92434 40230f lstrcpyA 91274->92434 91277 418865 91275->91277 92436 4022d6 lstrcpyA 91277->92436 91278 41869a 91281 41177a lstrcpyA 91278->91281 91280 40134c lstrcpyA 91280->91328 91283 4186a4 91281->91283 91282 418871 91284 41177a lstrcpyA 91282->91284 92435 418c28 lstrcpyA 91283->92435 91287 41887b 91284->91287 91285 41840d StrCmpCA 91285->91328 91286 418908 StrCmpCA 91288 418a51 91286->91288 91286->91328 92437 402324 lstrcpyA 91287->92437 91290 41177a lstrcpyA 91288->91290 91293 418a5d 91290->91293 91291 4022eb lstrcpyA 91291->91328 92439 4022d6 lstrcpyA 91293->92439 91294 418892 91297 41177a lstrcpyA 91294->91297 91296 418a69 91298 41177a lstrcpyA 91296->91298 91299 41889c 91297->91299 91300 418a73 91298->91300 92438 418c28 lstrcpyA 91299->92438 92440 402324 lstrcpyA 91300->92440 91301 4022d6 lstrcpyA 91301->91328 91302 418605 StrCmpCA 91302->91328 91303 418b00 StrCmpCA 91304 418b20 91303->91304 91305 418b0b Sleep 91303->91305 91307 41177a lstrcpyA 91304->91307 91305->91328 91308 418b2c 91307->91308 92442 4022d6 lstrcpyA 91308->92442 91311 418a8a 91313 41177a lstrcpyA 91311->91313 91312 418b38 91314 41177a lstrcpyA 91312->91314 91315 418a94 91313->91315 91317 418b42 91314->91317 92441 418c28 lstrcpyA 91315->92441 91316 4187fd StrCmpCA 91316->91328 92443 4022d6 lstrcpyA 91317->92443 91320 418b59 91321 41177a lstrcpyA 91320->91321 91322 418b63 91321->91322 92444 418c28 lstrcpyA 91322->92444 91323 4189f5 StrCmpCA 91323->91328 91324 417e48 23 API calls 91324->91328 91326 41177a lstrcpyA 91326->91328 91327 4116b4 lstrcpyA 91327->91328 91328->91246 91328->91247 91328->91248 91328->91249 91328->91250 91328->91257 91328->91259 91328->91262 91328->91270 91328->91280 91328->91285 91328->91286 91328->91291 91328->91301 91328->91302 91328->91303 91328->91316 91328->91323 91328->91324 91328->91326 91328->91327 91329 4184c3 91329->90261 91331 41177a lstrcpyA 91330->91331 91332 41a4dd 91331->91332 91333 41177a lstrcpyA 91332->91333 91334 41a4ef 91333->91334 91335 41177a lstrcpyA 91334->91335 91336 41a501 91335->91336 91336->90263 91337->90296 91339 411975 GetVolumeInformationA 91338->91339 91340 41196e 91338->91340 91341 4119b3 91339->91341 91340->91339 91342 411a11 GetProcessHeap HeapAlloc 91341->91342 91343 411a40 wsprintfA lstrcatA 91342->91343 91344 411a2e 91342->91344 92445 412667 GetCurrentHwProfileA 91343->92445 91345 411668 lstrcpyA 91344->91345 91347 411a38 91345->91347 91347->90310 91348 411a74 91349 411a7d lstrlenA 91348->91349 91350 411a91 91349->91350 92451 4136ce lstrcpyA malloc strncpy 91350->92451 91352 411a9e 91353 411aa8 lstrcatA 91352->91353 91354 411abd 91353->91354 91355 411668 lstrcpyA 91354->91355 91356 411ad0 91355->91356 91356->91347 91358 4116b4 lstrcpyA 91357->91358 91359 404413 91358->91359 92452 40430f 91359->92452 91361 40441f 91362 411668 lstrcpyA 91361->91362 91363 40444d 91362->91363 91364 411668 lstrcpyA 91363->91364 91365 40445a 91364->91365 91366 411668 lstrcpyA 91365->91366 91367 404467 91366->91367 91368 411668 lstrcpyA 91367->91368 91369 404474 91368->91369 91370 411668 lstrcpyA 91369->91370 91371 404481 91370->91371 91372 404491 InternetOpenA StrCmpCA 91371->91372 91373 4044bc 91372->91373 91374 404a55 InternetCloseHandle 91373->91374 91375 412d64 3 API calls 91373->91375 91379 404a69 moneypunct 91374->91379 91376 4044db 91375->91376 91377 4117e0 3 API calls 91376->91377 91378 4044ed 91377->91378 91381 41177a lstrcpyA 91378->91381 91380 4116b4 lstrcpyA 91379->91380 91392 404a83 91380->91392 91382 4044f6 91381->91382 91383 41185b 4 API calls 91382->91383 91384 404520 91383->91384 91385 41177a lstrcpyA 91384->91385 91386 404529 91385->91386 91387 41185b 4 API calls 91386->91387 91388 404548 91387->91388 91389 41177a lstrcpyA 91388->91389 91390 404551 91389->91390 91391 4117e0 3 API calls 91390->91391 91393 40456f 91391->91393 91392->90314 91394 41177a lstrcpyA 91393->91394 91395 404578 91394->91395 91396 41185b 4 API calls 91395->91396 91397 404597 91396->91397 91398 41177a lstrcpyA 91397->91398 91399 4045a0 91398->91399 91400 41185b 4 API calls 91399->91400 91401 4045bf 91400->91401 91402 41177a lstrcpyA 91401->91402 91403 4045c8 91402->91403 91404 41185b 4 API calls 91403->91404 91405 4045f3 91404->91405 91406 4117e0 3 API calls 91405->91406 91407 4045fa 91406->91407 91408 41177a lstrcpyA 91407->91408 91409 404603 91408->91409 91410 404619 InternetConnectA 91409->91410 91410->91374 91411 404645 HttpOpenRequestA 91410->91411 91413 404695 91411->91413 91414 404a49 InternetCloseHandle 91411->91414 91415 4046c0 91413->91415 91416 40469b InternetSetOptionA 91413->91416 91414->91374 91417 41185b 4 API calls 91415->91417 91416->91415 91418 4046d4 91417->91418 91419 41177a lstrcpyA 91418->91419 91420 4046dd 91419->91420 91421 4117e0 3 API calls 91420->91421 91422 4046fb 91421->91422 91423 41177a lstrcpyA 91422->91423 91424 404704 91423->91424 91425 41185b 4 API calls 91424->91425 91426 404723 91425->91426 91427 41177a lstrcpyA 91426->91427 91428 40472c 91427->91428 91429 41185b 4 API calls 91428->91429 91430 40474c 91429->91430 91431 41177a lstrcpyA 91430->91431 91432 404755 91431->91432 91433 41185b 4 API calls 91432->91433 91434 404774 91433->91434 91435 41177a lstrcpyA 91434->91435 91436 40477d 91435->91436 91437 41185b 4 API calls 91436->91437 91438 40479c 91437->91438 91439 41177a lstrcpyA 91438->91439 91440 4047a5 91439->91440 91441 4117e0 3 API calls 91440->91441 91442 4047c3 91441->91442 91443 41177a lstrcpyA 91442->91443 91444 4047cc 91443->91444 91445 41185b 4 API calls 91444->91445 91446 4047eb 91445->91446 91447 41177a lstrcpyA 91446->91447 91448 4047f4 91447->91448 91449 41185b 4 API calls 91448->91449 91450 404813 91449->91450 91451 41177a lstrcpyA 91450->91451 91452 40481c 91451->91452 91453 4117e0 3 API calls 91452->91453 91454 40483a 91453->91454 91455 41177a lstrcpyA 91454->91455 91456 404843 91455->91456 91457 41185b 4 API calls 91456->91457 91458 404862 91457->91458 91459 41177a lstrcpyA 91458->91459 91460 40486b 91459->91460 91461 41185b 4 API calls 91460->91461 91462 40488b 91461->91462 91463 41177a lstrcpyA 91462->91463 91464 404894 91463->91464 91465 41185b 4 API calls 91464->91465 91466 4048b3 91465->91466 91467 41177a lstrcpyA 91466->91467 91468 4048bc 91467->91468 91469 41185b 4 API calls 91468->91469 91470 4048db 91469->91470 91471 41177a lstrcpyA 91470->91471 91472 4048e4 91471->91472 91473 4117e0 3 API calls 91472->91473 91474 404902 91473->91474 91475 41177a lstrcpyA 91474->91475 91476 40490b 91475->91476 91477 411668 lstrcpyA 91476->91477 91478 404926 91477->91478 91479 4117e0 3 API calls 91478->91479 91480 404947 91479->91480 91481 4117e0 3 API calls 91480->91481 91482 40494e 91481->91482 91483 41177a lstrcpyA 91482->91483 91484 40495a 91483->91484 91485 40497b lstrlenA 91484->91485 91486 40498e 91485->91486 91487 404997 lstrlenA 91486->91487 92460 41193a 91487->92460 91489 4049a7 HttpSendRequestA 91490 4049bf InternetReadFile 91489->91490 91491 4049f3 InternetCloseHandle 91490->91491 91496 4049ea 91490->91496 92461 411701 91491->92461 91493 41185b 4 API calls 91493->91496 91495 41177a lstrcpyA 91495->91496 91496->91490 91496->91491 91496->91493 91496->91495 92465 41193a 91497->92465 91499 414fb0 StrCmpCA 91500 414fc3 91499->91500 91501 414fbb ExitProcess 91499->91501 91502 414fd3 strtok_s 91500->91502 91515 414fdf 91502->91515 91503 4151a9 91503->90317 91504 415188 strtok_s 91504->91515 91505 4150a1 StrCmpCA 91505->91515 91506 4150e3 StrCmpCA 91506->91515 91507 415163 StrCmpCA 91507->91515 91508 4150c2 StrCmpCA 91508->91515 91509 415104 StrCmpCA 91509->91515 91510 41502b StrCmpCA 91510->91515 91511 41512b StrCmpCA 91511->91515 91512 41500a StrCmpCA 91512->91515 91513 41506d StrCmpCA 91513->91515 91514 41504c StrCmpCA 91514->91515 91515->91503 91515->91504 91515->91505 91515->91506 91515->91507 91515->91508 91515->91509 91515->91510 91515->91511 91515->91512 91515->91513 91515->91514 91516 411715 2 API calls 91515->91516 91516->91515 91518 4116b4 lstrcpyA 91517->91518 91519 4058dd 91518->91519 91520 40430f 5 API calls 91519->91520 91521 4058e9 91520->91521 91522 411668 lstrcpyA 91521->91522 91523 40591a 91522->91523 91524 411668 lstrcpyA 91523->91524 91525 405927 91524->91525 91526 411668 lstrcpyA 91525->91526 91527 405934 91526->91527 91528 411668 lstrcpyA 91527->91528 91529 405941 91528->91529 91530 411668 lstrcpyA 91529->91530 91531 40594e 91530->91531 91532 40595e InternetOpenA StrCmpCA 91531->91532 91533 40597f 91532->91533 91534 406073 InternetCloseHandle 91533->91534 91535 412d64 3 API calls 91533->91535 91536 40608f 91534->91536 91537 40599e 91535->91537 92472 407dc2 CryptStringToBinaryA 91536->92472 91538 4117e0 3 API calls 91537->91538 91540 4059b0 91538->91540 91542 41177a lstrcpyA 91540->91542 91547 4059b9 91542->91547 91543 411715 2 API calls 91544 4060ac 91543->91544 91546 41185b 4 API calls 91544->91546 91545 4060cd moneypunct 91549 4116b4 lstrcpyA 91545->91549 91548 4060c1 91546->91548 91551 41185b 4 API calls 91547->91551 91550 41177a lstrcpyA 91548->91550 91559 4060fd 91549->91559 91550->91545 91552 4059e3 91551->91552 91553 41177a lstrcpyA 91552->91553 91554 4059ec 91553->91554 91555 41185b 4 API calls 91554->91555 91556 405a0b 91555->91556 91557 41177a lstrcpyA 91556->91557 91558 405a14 91557->91558 91560 4117e0 3 API calls 91558->91560 91559->90329 91561 405a32 91560->91561 91562 41177a lstrcpyA 91561->91562 91563 405a3b 91562->91563 91564 41185b 4 API calls 91563->91564 91565 405a5a 91564->91565 91566 41177a lstrcpyA 91565->91566 91567 405a63 91566->91567 91568 41185b 4 API calls 91567->91568 91569 405a82 91568->91569 91570 41177a lstrcpyA 91569->91570 91571 405a8b 91570->91571 91572 41185b 4 API calls 91571->91572 91573 405ab6 91572->91573 91574 4117e0 3 API calls 91573->91574 91575 405abd 91574->91575 91576 41177a lstrcpyA 91575->91576 91577 405ac6 91576->91577 91578 405adc InternetConnectA 91577->91578 91578->91534 91579 405b08 HttpOpenRequestA 91578->91579 91581 406067 InternetCloseHandle 91579->91581 91582 405b5f 91579->91582 91581->91534 91583 405b65 InternetSetOptionA 91582->91583 91584 405b8a 91582->91584 91583->91584 91585 41185b 4 API calls 91584->91585 91586 405b9e 91585->91586 91587 41177a lstrcpyA 91586->91587 91588 405ba7 91587->91588 91589 4117e0 3 API calls 91588->91589 91590 405bc5 91589->91590 91591 41177a lstrcpyA 91590->91591 91592 405bce 91591->91592 91593 41185b 4 API calls 91592->91593 91594 405bed 91593->91594 91595 41177a lstrcpyA 91594->91595 91596 405bf6 91595->91596 91597 41185b 4 API calls 91596->91597 91598 405c16 91597->91598 91599 41177a lstrcpyA 91598->91599 91600 405c1f 91599->91600 91601 41185b 4 API calls 91600->91601 91602 405c3f 91601->91602 91603 41177a lstrcpyA 91602->91603 91604 405c48 91603->91604 91605 41185b 4 API calls 91604->91605 91606 405c67 91605->91606 91607 41177a lstrcpyA 91606->91607 91608 405c70 91607->91608 91609 4117e0 3 API calls 91608->91609 91610 405c8e 91609->91610 91611 41177a lstrcpyA 91610->91611 91612 405c97 91611->91612 91613 41185b 4 API calls 91612->91613 91614 405cb6 91613->91614 91615 41177a lstrcpyA 91614->91615 91616 405cbf 91615->91616 91617 41185b 4 API calls 91616->91617 91618 405cde 91617->91618 91619 41177a lstrcpyA 91618->91619 91620 405ce7 91619->91620 91621 4117e0 3 API calls 91620->91621 91622 405d05 91621->91622 91623 41177a lstrcpyA 91622->91623 91624 405d0e 91623->91624 91625 41185b 4 API calls 91624->91625 91626 405d2d 91625->91626 91627 41177a lstrcpyA 91626->91627 91628 405d36 91627->91628 91629 41185b 4 API calls 91628->91629 91630 405d56 91629->91630 91631 41177a lstrcpyA 91630->91631 91632 405d5f 91631->91632 91633 41185b 4 API calls 91632->91633 91634 405d7e 91633->91634 91635 41177a lstrcpyA 91634->91635 91636 405d87 91635->91636 91637 41185b 4 API calls 91636->91637 91638 405da6 91637->91638 91639 41177a lstrcpyA 91638->91639 91640 405daf 91639->91640 91641 41185b 4 API calls 91640->91641 91642 405dcf 91641->91642 91643 41177a lstrcpyA 91642->91643 91644 405dd8 91643->91644 91645 41185b 4 API calls 91644->91645 91646 405df7 91645->91646 91647 41177a lstrcpyA 91646->91647 91648 405e00 91647->91648 91649 41185b 4 API calls 91648->91649 91650 405e1f 91649->91650 91651 41177a lstrcpyA 91650->91651 91652 405e28 91651->91652 91653 4117e0 3 API calls 91652->91653 91654 405e46 91653->91654 91655 41177a lstrcpyA 91654->91655 91656 405e4f 91655->91656 91657 41185b 4 API calls 91656->91657 91658 405e6e 91657->91658 91659 41177a lstrcpyA 91658->91659 91660 405e77 91659->91660 91661 41185b 4 API calls 91660->91661 91662 405e97 91661->91662 91663 41177a lstrcpyA 91662->91663 91664 405ea0 91663->91664 91665 41185b 4 API calls 91664->91665 91666 405ebf 91665->91666 91667 41177a lstrcpyA 91666->91667 91668 405ec8 91667->91668 91669 41185b 4 API calls 91668->91669 91670 405ee7 91669->91670 91671 41177a lstrcpyA 91670->91671 91672 405ef0 91671->91672 91673 4117e0 3 API calls 91672->91673 91674 405f0e 91673->91674 91675 41177a lstrcpyA 91674->91675 91676 405f17 91675->91676 91677 405f2a lstrlenA 91676->91677 92466 41193a 91677->92466 91679 405f3b lstrlenA GetProcessHeap HeapAlloc 92467 41193a 91679->92467 91681 405f67 lstrlenA 92468 41193a 91681->92468 91683 405f77 memcpy 92469 41193a 91683->92469 91685 405f8e lstrlenA 91686 405f9e 91685->91686 91687 405fa7 lstrlenA memcpy 91686->91687 92470 41193a 91687->92470 91689 405fce lstrlenA 92471 41193a 91689->92471 91691 405fde HttpSendRequestA 91692 405fe8 InternetReadFile 91691->91692 91693 40601c InternetCloseHandle 91692->91693 91697 406013 91692->91697 91693->91581 91695 41185b 4 API calls 91695->91697 91696 41177a lstrcpyA 91696->91697 91697->91692 91697->91693 91697->91695 91697->91696 92477 41193a 91698->92477 91700 4148c7 strtok_s 91702 4148d3 91700->91702 91701 414971 91701->90332 91702->91701 91703 411715 lstrlenA lstrcpyA 91702->91703 91704 414950 strtok_s 91702->91704 91703->91702 91704->91702 92478 41193a 91705->92478 91707 414600 strtok_s 91710 41460c 91707->91710 91708 41479a 91708->90344 91709 414669 StrCmpCA 91709->91710 91710->91708 91710->91709 91711 414779 strtok_s 91710->91711 91712 411715 lstrlenA lstrcpyA 91710->91712 91713 4146c1 StrCmpCA 91710->91713 91714 4146fa StrCmpCA 91710->91714 91715 414733 StrCmpCA 91710->91715 91711->91710 91712->91710 91713->91710 91714->91710 91715->91710 92479 41193a 91716->92479 91718 4147cb strtok_s 91721 4147d7 91718->91721 91719 414896 91719->90359 91720 414811 StrCmpCA 91720->91721 91721->91719 91721->91720 91722 414875 strtok_s 91721->91722 91723 411715 lstrlenA lstrcpyA 91721->91723 91722->91721 91723->91721 91725 411668 lstrcpyA 91724->91725 91726 4151fa 91725->91726 91727 41185b 4 API calls 91726->91727 91728 41520b 91727->91728 91729 41177a lstrcpyA 91728->91729 91730 415214 91729->91730 91731 41185b 4 API calls 91730->91731 91732 41522e 91731->91732 91733 41177a lstrcpyA 91732->91733 91734 415237 91733->91734 91735 41185b 4 API calls 91734->91735 91736 415250 91735->91736 91737 41177a lstrcpyA 91736->91737 91738 415259 91737->91738 91739 41185b 4 API calls 91738->91739 91740 415272 91739->91740 91741 41177a lstrcpyA 91740->91741 91742 41527b 91741->91742 91743 41185b 4 API calls 91742->91743 91744 415294 91743->91744 91745 41177a lstrcpyA 91744->91745 91746 41529d 91745->91746 92480 411c63 GetProcessHeap HeapAlloc GetLocalTime wsprintfA 91746->92480 91748 4152aa 91749 41185b 4 API calls 91748->91749 91750 4152b7 91749->91750 91751 41177a lstrcpyA 91750->91751 91752 4152c0 91751->91752 91753 41185b 4 API calls 91752->91753 91754 4152d9 91753->91754 91755 41177a lstrcpyA 91754->91755 91756 4152e2 91755->91756 91757 41185b 4 API calls 91756->91757 91758 4152fb 91757->91758 91759 41177a lstrcpyA 91758->91759 91760 415304 91759->91760 92481 4125ca memset RegOpenKeyExA 91760->92481 91762 415311 91763 41185b 4 API calls 91762->91763 91764 41531e 91763->91764 91765 41177a lstrcpyA 91764->91765 91766 415327 91765->91766 91767 41185b 4 API calls 91766->91767 91768 415343 91767->91768 91769 41177a lstrcpyA 91768->91769 91770 41534c 91769->91770 91771 41185b 4 API calls 91770->91771 91772 41536b 91771->91772 91773 41177a lstrcpyA 91772->91773 91774 415374 91773->91774 91775 412667 2 API calls 91774->91775 91776 41538b 91775->91776 91777 4117e0 3 API calls 91776->91777 91778 41539c 91777->91778 91779 41177a lstrcpyA 91778->91779 91780 4153a5 91779->91780 91781 41185b 4 API calls 91780->91781 91782 4153cf 91781->91782 91783 41177a lstrcpyA 91782->91783 91784 4153d8 91783->91784 91785 41185b 4 API calls 91784->91785 91786 4153f7 91785->91786 91787 41177a lstrcpyA 91786->91787 91788 415400 91787->91788 91789 411948 12 API calls 91788->91789 91790 415417 91789->91790 91791 4117e0 3 API calls 91790->91791 91792 415428 91791->91792 91793 41177a lstrcpyA 91792->91793 91794 415431 91793->91794 91795 41185b 4 API calls 91794->91795 91796 41545b 91795->91796 91797 41177a lstrcpyA 91796->91797 91798 415464 91797->91798 91799 41185b 4 API calls 91798->91799 91800 415483 91799->91800 91801 41177a lstrcpyA 91800->91801 91802 41548c 91801->91802 91803 415497 GetCurrentProcessId 91802->91803 92485 413563 OpenProcess 91803->92485 91806 4117e0 3 API calls 91807 4154bc 91806->91807 91808 41177a lstrcpyA 91807->91808 91809 4154c5 91808->91809 91810 41185b 4 API calls 91809->91810 91811 4154ef 91810->91811 91812 41177a lstrcpyA 91811->91812 91813 4154f8 91812->91813 91814 41185b 4 API calls 91813->91814 91815 415517 91814->91815 91816 41177a lstrcpyA 91815->91816 91817 415520 91816->91817 91818 41185b 4 API calls 91817->91818 91819 41553f 91818->91819 91820 41177a lstrcpyA 91819->91820 91821 415548 91820->91821 91822 41185b 4 API calls 91821->91822 91823 415567 91822->91823 91824 41177a lstrcpyA 91823->91824 91825 415570 91824->91825 92490 411add GetProcessHeap HeapAlloc 91825->92490 91828 41185b 4 API calls 91829 415590 91828->91829 91830 41177a lstrcpyA 91829->91830 91831 415599 91830->91831 91832 41185b 4 API calls 91831->91832 91833 4155b8 91832->91833 91834 41177a lstrcpyA 91833->91834 91835 4155c1 91834->91835 91836 41185b 4 API calls 91835->91836 91837 4155e0 91836->91837 91838 41177a lstrcpyA 91837->91838 91839 4155e9 91838->91839 92496 4127af CoInitializeEx CoInitializeSecurity CoCreateInstance 91839->92496 91842 4117e0 3 API calls 91843 415611 91842->91843 91844 41177a lstrcpyA 91843->91844 91845 41561a 91844->91845 91846 41185b 4 API calls 91845->91846 91847 415644 91846->91847 91848 41177a lstrcpyA 91847->91848 91849 41564d 91848->91849 91850 41185b 4 API calls 91849->91850 91851 41566c 91850->91851 91852 41177a lstrcpyA 91851->91852 91853 415675 91852->91853 92514 4129bf CoInitializeEx CoInitializeSecurity CoCreateInstance 91853->92514 91856 4117e0 3 API calls 91857 41569d 91856->91857 91858 41177a lstrcpyA 91857->91858 91859 4156a6 91858->91859 91860 41185b 4 API calls 91859->91860 91861 4156d0 91860->91861 91862 41177a lstrcpyA 91861->91862 91863 4156d9 91862->91863 91864 41185b 4 API calls 91863->91864 91865 4156f8 91864->91865 91866 41177a lstrcpyA 91865->91866 91867 415701 91866->91867 92532 411c21 GetProcessHeap HeapAlloc GetComputerNameA 91867->92532 91870 41185b 4 API calls 91871 415721 91870->91871 91872 41177a lstrcpyA 91871->91872 91873 41572a 91872->91873 91874 41185b 4 API calls 91873->91874 91875 415749 91874->91875 91876 41177a lstrcpyA 91875->91876 91877 415752 91876->91877 91878 41185b 4 API calls 91877->91878 91879 415771 91878->91879 91880 41177a lstrcpyA 91879->91880 91881 41577a 91880->91881 92534 411bec GetProcessHeap HeapAlloc GetUserNameA 91881->92534 91883 41578a 91884 41185b 4 API calls 91883->91884 91885 41579a 91884->91885 91886 41177a lstrcpyA 91885->91886 91887 4157a3 91886->91887 91888 41185b 4 API calls 91887->91888 91889 4157c2 91888->91889 91890 41177a lstrcpyA 91889->91890 91891 4157cb 91890->91891 91892 41185b 4 API calls 91891->91892 91893 4157ea 91892->91893 91894 41177a lstrcpyA 91893->91894 91895 4157f3 91894->91895 92535 41254a 7 API calls 91895->92535 91898 4117e0 3 API calls 91899 41581b 91898->91899 91900 41177a lstrcpyA 91899->91900 91901 415824 91900->91901 91902 41185b 4 API calls 91901->91902 91903 41584e 91902->91903 91904 41177a lstrcpyA 91903->91904 91905 415857 91904->91905 91906 41185b 4 API calls 91905->91906 91907 415876 91906->91907 91908 41177a lstrcpyA 91907->91908 91909 41587f 91908->91909 92538 411d31 91909->92538 91911 415896 91912 4117e0 3 API calls 91911->91912 91913 4158a7 91912->91913 91914 41177a lstrcpyA 91913->91914 91915 4158b0 91914->91915 91916 41185b 4 API calls 91915->91916 91917 4158da 91916->91917 91918 41177a lstrcpyA 91917->91918 91919 4158e3 91918->91919 91920 41185b 4 API calls 91919->91920 91921 415902 91920->91921 91922 41177a lstrcpyA 91921->91922 91923 41590b 91922->91923 92550 411c63 GetProcessHeap HeapAlloc GetLocalTime wsprintfA 91923->92550 91925 41591b 91926 41185b 4 API calls 91925->91926 91927 41592b 91926->91927 91928 41177a lstrcpyA 91927->91928 91929 415934 91928->91929 91930 41185b 4 API calls 91929->91930 91931 415953 91930->91931 91932 41177a lstrcpyA 91931->91932 91933 41595c 91932->91933 91934 41185b 4 API calls 91933->91934 91935 41597b 91934->91935 91936 41177a lstrcpyA 91935->91936 91937 415984 91936->91937 92551 411cbf GetProcessHeap HeapAlloc GetTimeZoneInformation 91937->92551 91940 41185b 4 API calls 91941 4159a4 91940->91941 91942 41177a lstrcpyA 91941->91942 91943 4159ad 91942->91943 91944 41185b 4 API calls 91943->91944 91945 4159cc 91944->91945 91946 41177a lstrcpyA 91945->91946 91947 4159d5 91946->91947 91948 41185b 4 API calls 91947->91948 91949 4159f4 91948->91949 91950 41177a lstrcpyA 91949->91950 91951 4159fd 91950->91951 91952 41185b 4 API calls 91951->91952 91953 415a1c 91952->91953 91954 41177a lstrcpyA 91953->91954 91955 415a25 91954->91955 92554 411eb5 GetProcessHeap HeapAlloc RegOpenKeyExA 91955->92554 91958 41185b 4 API calls 91959 415a45 91958->91959 91960 41177a lstrcpyA 91959->91960 91961 415a4e 91960->91961 91962 41185b 4 API calls 91961->91962 91963 415a6d 91962->91963 91964 41177a lstrcpyA 91963->91964 91965 415a76 91964->91965 91966 41185b 4 API calls 91965->91966 91967 415a95 91966->91967 91968 41177a lstrcpyA 91967->91968 91969 415a9e 91968->91969 92557 411f54 91969->92557 91972 41185b 4 API calls 91973 415abe 91972->91973 91974 41177a lstrcpyA 91973->91974 91975 415ac7 91974->91975 91976 41185b 4 API calls 91975->91976 91977 415ae6 91976->91977 91978 41177a lstrcpyA 91977->91978 91979 415aef 91978->91979 91980 41185b 4 API calls 91979->91980 91981 415b0e 91980->91981 91982 41177a lstrcpyA 91981->91982 91983 415b17 91982->91983 92572 411f21 GetSystemInfo wsprintfA 91983->92572 91985 415b27 91986 41185b 4 API calls 91985->91986 91987 415b37 91986->91987 91988 41177a lstrcpyA 91987->91988 91989 415b40 91988->91989 91990 41185b 4 API calls 91989->91990 91991 415b5f 91990->91991 91992 41177a lstrcpyA 91991->91992 91993 415b68 91992->91993 91994 41185b 4 API calls 91993->91994 91995 415b87 91994->91995 91996 41177a lstrcpyA 91995->91996 91997 415b90 91996->91997 92573 412081 GetProcessHeap HeapAlloc 91997->92573 91999 415ba0 92000 41185b 4 API calls 91999->92000 92001 415bb0 92000->92001 92002 41177a lstrcpyA 92001->92002 92003 415bb9 92002->92003 92004 41185b 4 API calls 92003->92004 92005 415bd8 92004->92005 92006 41177a lstrcpyA 92005->92006 92007 415be1 92006->92007 92008 41185b 4 API calls 92007->92008 92009 415c00 92008->92009 92010 41177a lstrcpyA 92009->92010 92011 415c09 92010->92011 92578 41210d 92011->92578 92013 415c20 92014 4117e0 3 API calls 92013->92014 92015 415c31 92014->92015 92016 41177a lstrcpyA 92015->92016 92017 415c3a 92016->92017 92018 41185b 4 API calls 92017->92018 92019 415c64 92018->92019 92020 41177a lstrcpyA 92019->92020 92021 415c6d 92020->92021 92022 41185b 4 API calls 92021->92022 92023 415c8c 92022->92023 92024 41177a lstrcpyA 92023->92024 92025 415c95 92024->92025 92586 41246a 92025->92586 92027 415cac 92028 4117e0 3 API calls 92027->92028 92029 415cbd 92028->92029 92030 41177a lstrcpyA 92029->92030 92031 415cc6 92030->92031 92032 41185b 4 API calls 92031->92032 92033 415cf0 92032->92033 92034 41177a lstrcpyA 92033->92034 92035 415cf9 92034->92035 92036 41185b 4 API calls 92035->92036 92037 415d18 92036->92037 92038 41177a lstrcpyA 92037->92038 92039 415d21 92038->92039 92596 41218b 92039->92596 92041 415d3d 92042 4117e0 3 API calls 92041->92042 92043 415d4f 92042->92043 92044 41177a lstrcpyA 92043->92044 92045 415d58 92044->92045 92046 41218b 13 API calls 92045->92046 92047 415d7f 92046->92047 92048 4117e0 3 API calls 92047->92048 92049 415d91 92048->92049 92050 41177a lstrcpyA 92049->92050 92051 415d9a 92050->92051 92052 41185b 4 API calls 92051->92052 92053 415dc4 92052->92053 92054 41177a lstrcpyA 92053->92054 92055 415dcd 92054->92055 92056 415de0 lstrlenA 92055->92056 92057 415df0 92056->92057 92058 411668 lstrcpyA 92057->92058 92059 415e00 92058->92059 92060 40134c lstrcpyA 92059->92060 92061 415e0e 92060->92061 92629 418db9 92061->92629 92063 415e1a 92063->90364 92065 4116b4 lstrcpyA 92064->92065 92066 404aee 92065->92066 92067 40430f 5 API calls 92066->92067 92068 404afa GetProcessHeap RtlAllocateHeap 92067->92068 92770 41193a 92068->92770 92070 404b53 InternetOpenA StrCmpCA 92071 404b77 92070->92071 92072 404b88 InternetConnectA 92071->92072 92073 404dad InternetCloseHandle 92071->92073 92074 404da1 InternetCloseHandle 92072->92074 92075 404bba HttpOpenRequestA 92072->92075 92081 404c7e 92073->92081 92074->92073 92077 404c13 92075->92077 92078 404d98 InternetCloseHandle 92075->92078 92079 404c19 InternetSetOptionA 92077->92079 92080 404c3e HttpSendRequestA HttpQueryInfoA 92077->92080 92078->92074 92079->92080 92080->92081 92084 404cbe 92080->92084 92081->90377 92084->92081 92415 412b6b malloc 92406->92415 92408 42150a 92409 42151f 92408->92409 92427 4215b0 malloc lstrlenA lstrcpyA _MSFOpenExW 92408->92427 92416 41fd2c 92409->92416 92414 42154d moneypunct 92414->91203 92415->92408 92417 41fd3e 92416->92417 92423 41fd6d 92416->92423 92418 41fde0 92417->92418 92419 41fd7d SetFilePointer 92417->92419 92417->92423 92420 41fde6 CreateFileA 92418->92420 92421 41fe48 92418->92421 92422 41fdc2 92419->92422 92420->92422 92421->92423 92424 41fe79 CreateFileMappingA 92421->92424 92422->92423 92423->92414 92428 412b6b malloc 92423->92428 92424->92423 92425 41fea2 MapViewOfFile 92424->92425 92425->92423 92426 41fec9 CloseHandle 92425->92426 92426->92423 92427->92409 92428->92414 92430 411668 lstrcpyA 92429->92430 92431 4022d1 92430->92431 92431->91256 92432->91265 92433->91329 92434->91278 92435->91329 92436->91282 92437->91294 92438->91329 92439->91296 92440->91311 92441->91329 92442->91312 92443->91320 92444->91329 92446 412691 92445->92446 92447 41267e 92445->92447 92449 411668 lstrcpyA 92446->92449 92448 411668 lstrcpyA 92447->92448 92450 41268a 92448->92450 92449->92450 92450->91348 92451->91352 92453 40432d ??_U@YAPAXI ??_U@YAPAXI ??_U@YAPAXI 92452->92453 92463 41193a 92453->92463 92456 4043b8 lstrlenA 92464 41193a 92456->92464 92458 4043c8 InternetCrackUrlA 92459 4043e5 92458->92459 92459->91361 92460->91489 92462 411712 92461->92462 92462->91414 92463->92456 92464->92458 92465->91499 92466->91679 92467->91681 92468->91683 92469->91685 92470->91689 92471->91691 92473 407df0 LocalAlloc 92472->92473 92474 406095 92472->92474 92473->92474 92475 407e0a CryptStringToBinaryA 92473->92475 92474->91543 92474->91545 92475->92474 92476 407e2c LocalFree 92475->92476 92476->92474 92477->91700 92478->91707 92479->91718 92480->91748 92482 41261c RegQueryValueExA 92481->92482 92483 41263f CharToOemA 92481->92483 92482->92483 92483->91762 92486 4135a5 92485->92486 92487 413585 K32GetModuleFileNameExA CloseHandle 92485->92487 92488 411668 lstrcpyA 92486->92488 92487->92486 92489 4135b4 92488->92489 92489->91806 92648 411bd2 92490->92648 92493 411b13 RegOpenKeyExA 92494 411b33 RegQueryValueExA 92493->92494 92495 411b0a 92493->92495 92494->92495 92495->91828 92497 41283c 92496->92497 92498 412844 CoSetProxyBlanket 92497->92498 92499 41297e 92497->92499 92502 412881 92498->92502 92500 411668 lstrcpyA 92499->92500 92501 412977 92500->92501 92501->91842 92503 41296a 92502->92503 92505 412889 92502->92505 92504 411668 lstrcpyA 92503->92504 92504->92501 92506 4128bd VariantInit 92505->92506 92507 4128b8 92505->92507 92509 4128e1 92506->92509 92508 411668 lstrcpyA 92507->92508 92508->92501 92654 4126a3 92509->92654 92511 4128ef FileTimeToSystemTime GetProcessHeap HeapAlloc wsprintfA 92512 411668 lstrcpyA 92511->92512 92513 412951 VariantClear 92512->92513 92513->92501 92515 412a4c 92514->92515 92516 412b22 92515->92516 92517 412a54 CoSetProxyBlanket 92515->92517 92518 411668 lstrcpyA 92516->92518 92519 412a91 92517->92519 92527 412b1b 92518->92527 92520 412b0e 92519->92520 92522 412a95 92519->92522 92521 411668 lstrcpyA 92520->92521 92521->92527 92523 412ac2 VariantInit 92522->92523 92524 412ac0 92522->92524 92526 412ae6 92523->92526 92525 411668 lstrcpyA 92524->92525 92525->92527 92663 412ef6 LocalAlloc CharToOemW 92526->92663 92527->91856 92529 412aee 92530 411668 lstrcpyA 92529->92530 92531 412af8 VariantClear 92530->92531 92531->92527 92533 411c55 92532->92533 92533->91870 92534->91883 92536 411668 lstrcpyA 92535->92536 92537 4125c5 92536->92537 92537->91898 92539 411668 lstrcpyA 92538->92539 92540 411d4a GetKeyboardLayoutList LocalAlloc GetKeyboardLayoutList 92539->92540 92549 411d98 92540->92549 92541 411e87 92543 411e96 92541->92543 92544 411e8d LocalFree 92541->92544 92542 411db7 GetLocaleInfoA 92542->92549 92546 4116b4 lstrcpyA 92543->92546 92544->92543 92545 41185b lstrcpyA lstrlenA lstrcpyA lstrcatA 92545->92549 92547 411ea5 92546->92547 92547->91911 92548 41177a lstrcpyA 92548->92549 92549->92541 92549->92542 92549->92545 92549->92548 92550->91925 92552 411d06 wsprintfA 92551->92552 92553 411cfe 92551->92553 92552->92553 92553->91940 92555 411f13 92554->92555 92556 411ef9 RegQueryValueExA 92554->92556 92555->91958 92556->92555 92558 411f78 GetLogicalProcessorInformationEx 92557->92558 92559 411f96 GetLastError 92558->92559 92561 411fe6 92558->92561 92560 411fa1 92559->92560 92571 411fda 92559->92571 92567 411faa 92560->92567 92666 412c28 GetProcessHeap HeapFree 92561->92666 92565 412079 92565->91972 92567->92558 92568 411fce 92567->92568 92664 412c28 GetProcessHeap HeapFree 92567->92664 92665 412c45 GetProcessHeap HeapAlloc 92567->92665 92568->92565 92569 412035 92570 41203c wsprintfA 92569->92570 92569->92571 92570->92565 92571->92565 92667 412c28 GetProcessHeap HeapFree 92571->92667 92572->91985 92668 412bde 92573->92668 92576 4120f1 wsprintfA 92576->91999 92577 4120c1 __aulldiv 92577->92576 92579 411668 lstrcpyA 92578->92579 92583 412123 92579->92583 92580 412130 EnumDisplayDevicesA 92581 412157 92580->92581 92580->92583 92584 4116b4 lstrcpyA 92581->92584 92582 411715 2 API calls 92582->92583 92583->92580 92583->92581 92583->92582 92585 41217e 92584->92585 92585->92013 92587 411668 lstrcpyA 92586->92587 92588 412483 CreateToolhelp32Snapshot Process32First 92587->92588 92589 412522 CloseHandle 92588->92589 92590 4124ae Process32Next 92588->92590 92591 4116b4 lstrcpyA 92589->92591 92590->92589 92592 4124c2 92590->92592 92593 41253a 92591->92593 92592->92590 92594 41177a lstrcpyA 92592->92594 92595 41185b lstrcpyA lstrlenA lstrcpyA lstrcatA 92592->92595 92593->92027 92594->92592 92595->92592 92597 411668 lstrcpyA 92596->92597 92598 4121a4 RegOpenKeyExA 92597->92598 92599 4121e8 92598->92599 92600 41220a 92598->92600 92601 4116b4 lstrcpyA 92599->92601 92602 41222d RegEnumKeyExA 92600->92602 92603 412423 92600->92603 92614 4121f7 92601->92614 92602->92603 92604 412272 wsprintfA RegOpenKeyExA 92602->92604 92608 4116b4 lstrcpyA 92603->92608 92605 4122f0 RegQueryValueExA 92604->92605 92606 4122b6 92604->92606 92605->92603 92607 412328 lstrlenA 92605->92607 92613 4116b4 lstrcpyA 92606->92613 92607->92603 92609 41233e 92607->92609 92608->92614 92610 41185b 4 API calls 92609->92610 92611 412355 92610->92611 92612 41177a lstrcpyA 92611->92612 92615 412361 92612->92615 92613->92614 92614->92041 92616 41185b 4 API calls 92615->92616 92617 412385 92616->92617 92618 41177a lstrcpyA 92617->92618 92619 412391 92618->92619 92620 41239c RegQueryValueExA 92619->92620 92620->92603 92621 4123d0 92620->92621 92622 41185b 4 API calls 92621->92622 92623 4123e7 92622->92623 92624 41177a lstrcpyA 92623->92624 92625 4123f3 92624->92625 92626 41185b 4 API calls 92625->92626 92627 412417 92626->92627 92628 41177a lstrcpyA 92627->92628 92628->92603 92630 418dc7 92629->92630 92631 41177a lstrcpyA 92630->92631 92632 418df1 92631->92632 92633 41177a lstrcpyA 92632->92633 92634 418e17 92633->92634 92635 41177a lstrcpyA 92634->92635 92636 418e23 92635->92636 92637 41177a lstrcpyA 92636->92637 92638 418e2f 92637->92638 92639 418ead 92638->92639 92641 418ea0 Sleep 92638->92641 92645 418e3d 92638->92645 92640 411668 lstrcpyA 92639->92640 92643 418eba 92640->92643 92642 418eab 92641->92642 92642->92638 92643->92063 92644 418e74 CreateThread WaitForSingleObject 92644->92639 92760 418c65 92644->92760 92645->92644 92670 421744 92645->92670 92651 411b5b GetProcessHeap HeapAlloc RegOpenKeyExA 92648->92651 92650 411b06 92650->92493 92650->92495 92652 411b9f RegQueryValueExA 92651->92652 92653 411bb8 92651->92653 92652->92653 92653->92650 92662 412b63 92654->92662 92656 4126da CoCreateInstance 92657 412780 92656->92657 92658 4126fd SysAllocString 92656->92658 92657->92511 92658->92657 92659 41270f 92658->92659 92660 412777 SysFreeString 92659->92660 92661 41274a _wtoi64 SysFreeString 92659->92661 92660->92657 92661->92660 92662->92656 92663->92529 92664->92567 92665->92567 92666->92569 92667->92565 92669 4120ab GlobalMemoryStatusEx 92668->92669 92669->92577 92673 4216e0 92670->92673 92674 418e71 92673->92674 92675 4216fc 92673->92675 92674->92644 92675->92674 92677 42095b 92675->92677 92678 420977 92677->92678 92680 420981 92677->92680 92678->92674 92679 4209bb lstrcpyA 92679->92678 92681 4209e0 92679->92681 92680->92678 92680->92679 92682 420a33 strlen 92681->92682 92683 420a4d 92681->92683 92682->92683 92684 420a84 92683->92684 92743 41f930 9 API calls 92683->92743 92686 420a96 92684->92686 92687 420aa9 92684->92687 92744 4201a9 15 API calls _MSFOpenExW 92686->92744 92689 420ac5 92687->92689 92690 420aaf 92687->92690 92691 420ae1 92689->92691 92692 420acb 92689->92692 92745 420255 13 API calls _MSFOpenExW 92690->92745 92691->92678 92696 420ae7 92691->92696 92746 4203dd FileTimeToSystemTime GetLocalTime SystemTimeToFileTime _MSFOpenExW 92692->92746 92693 420aa4 92697 420b01 92693->92697 92747 4204e9 FileTimeToSystemTime GetLocalTime SystemTimeToFileTime _MSFOpenExW 92696->92747 92697->92678 92699 420b0f lstrcpyA lstrcpyA lstrlenA 92697->92699 92700 420b76 lstrcpyA 92699->92700 92701 420b57 lstrcatA 92699->92701 92702 420c0d _MSFOpenExW 92700->92702 92701->92700 92703 420e07 memcpy 92702->92703 92704 420e44 _MSFOpenExW 92703->92704 92705 420e56 92704->92705 92706 420e6b 92704->92706 92748 42070a CloseHandle 92705->92748 92708 420e99 92706->92708 92710 420eb2 _MSFOpenExW 92706->92710 92749 42070a CloseHandle 92708->92749 92743->92684 92744->92693 92745->92693 92746->92693 92747->92693 92769 41193a 92760->92769 92762 418c98 lstrlenA 92763 418ca4 92762->92763 92768 418cb6 92762->92768 92764 4116b4 lstrcpyA 92764->92768 92765 404e03 43 API calls 92765->92768 92766 41177a lstrcpyA 92766->92768 92767 418d4a StrCmpCA 92767->92763 92767->92768 92768->92763 92768->92764 92768->92765 92768->92766 92768->92767 92769->92762 92770->92070

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 592 41b050-41b05a 593 41b060-41b4d2 GetProcAddress * 50 592->593 594 41b4d7-41b576 LoadLibraryA * 9 592->594 593->594 595 41b578-41b5e6 GetProcAddress * 5 594->595 596 41b5eb-41b5f2 594->596 595->596 597 41b6b0-41b6b7 596->597 598 41b5f8-41b6ab GetProcAddress * 8 596->598 599 41b6b9-41b727 GetProcAddress * 5 597->599 600 41b72c-41b733 597->600 598->597 599->600 601 41b7c3-41b7ca 600->601 602 41b739-41b7be GetProcAddress * 6 600->602 603 41b7d0-41b89a GetProcAddress * 9 601->603 604 41b89f-41b8a6 601->604 602->601 603->604 605 41b8a8-41b916 GetProcAddress * 5 604->605 606 41b91b-41b922 604->606 605->606 607 41b952-41b959 606->607 608 41b924-41b94d GetProcAddress * 2 606->608 609 41b989-41b990 607->609 610 41b95b-41b984 GetProcAddress * 2 607->610 608->607 611 41b996-41ba75 GetProcAddress * 10 609->611 612 41ba7a-41ba81 609->612 610->609 611->612 613 41ba83-41bada GetProcAddress * 4 612->613 614 41badf-41bae6 612->614 613->614 615 41bae8-41bafa GetProcAddress 614->615 616 41baff-41bb06 614->616 615->616 617 41bb64-41bb6b 616->617 618 41bb08-41bb5f GetProcAddress * 4 616->618 619 41bb83-41bb84 617->619 620 41bb6d-41bb7e GetProcAddress 617->620 618->617 620->619
                                                      APIs
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B06C
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B083
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B09A
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B0B1
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B0C8
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B0DF
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B0F6
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B10D
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B124
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B13B
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B152
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B169
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B180
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B197
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B1AE
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B1C5
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B1DC
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B1F3
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B20A
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B221
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B238
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B24F
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B266
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B27D
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B294
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B2AB
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B2C2
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B2D9
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B2F0
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B307
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B31E
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B335
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B34C
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B363
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B37A
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B391
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B3A8
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B3BF
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B3D6
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B3ED
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B404
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B41B
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B432
                                                      • GetProcAddress.KERNEL32(CreateProcessA), ref: 0041B448
                                                      • GetProcAddress.KERNEL32(GetThreadContext), ref: 0041B45E
                                                      • GetProcAddress.KERNEL32(ReadProcessMemory), ref: 0041B474
                                                      • GetProcAddress.KERNEL32(VirtualAllocEx), ref: 0041B48A
                                                      • GetProcAddress.KERNEL32(ResumeThread), ref: 0041B4A0
                                                      • GetProcAddress.KERNEL32(WriteProcessMemory), ref: 0041B4B6
                                                      • GetProcAddress.KERNEL32(SetThreadContext), ref: 0041B4CC
                                                      • LoadLibraryA.KERNEL32(?,0041922C), ref: 0041B4DD
                                                      • LoadLibraryA.KERNEL32(?,0041922C), ref: 0041B4EE
                                                      • LoadLibraryA.KERNEL32(?,0041922C), ref: 0041B4FF
                                                      • LoadLibraryA.KERNEL32(?,0041922C), ref: 0041B510
                                                      • LoadLibraryA.KERNEL32(?,0041922C), ref: 0041B521
                                                      • LoadLibraryA.KERNEL32(?,0041922C), ref: 0041B532
                                                      • LoadLibraryA.KERNEL32(?,0041922C), ref: 0041B543
                                                      • LoadLibraryA.KERNEL32(?,0041922C), ref: 0041B554
                                                      • LoadLibraryA.KERNEL32(dbghelp.dll,?,0041922C), ref: 0041B564
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B584
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B59B
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B5B2
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B5C9
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B5E0
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B604
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B61B
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B632
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B649
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B660
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B677
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B68E
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B6A5
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B6C5
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B6DC
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B6F3
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B70A
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B721
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B745
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B75C
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B773
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B78A
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B7A1
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B7B8
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B7DC
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B7F3
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B80A
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B821
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B838
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B84F
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B866
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B87D
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B894
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B8B4
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B8CB
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B8E2
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B8F9
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B910
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B930
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B947
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B967
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B97E
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B9A2
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B9B9
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B9D0
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B9E7
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041B9FE
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041BA15
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041BA2C
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041BA43
                                                      • GetProcAddress.KERNEL32(HttpQueryInfoA), ref: 0041BA59
                                                      • GetProcAddress.KERNEL32(InternetSetOptionA), ref: 0041BA6F
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041BA8F
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041BAA6
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041BABD
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041BAD4
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041BAF4
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041BB14
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041BB2B
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041BB42
                                                      • GetProcAddress.KERNEL32(?,0041922C), ref: 0041BB59
                                                      • GetProcAddress.KERNEL32(SymMatchString), ref: 0041BB78
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad
                                                      • String ID: CreateProcessA$GetThreadContext$HttpQueryInfoA$InternetSetOptionA$ReadProcessMemory$ResumeThread$SetThreadContext$SymMatchString$VirtualAllocEx$WriteProcessMemory$dbghelp.dll
                                                      • API String ID: 2238633743-2740034357
                                                      • Opcode ID: a4580aef7196ab40cac15de4e3c6625ffa806c5fa5d16c7cc0568451c0f19aac
                                                      • Instruction ID: 64df46d759b3a8e539eb425d674754a75b55508f076e1d27ec912ac7423ac894
                                                      • Opcode Fuzzy Hash: a4580aef7196ab40cac15de4e3c6625ffa806c5fa5d16c7cc0568451c0f19aac
                                                      • Instruction Fuzzy Hash: 9552C57D481214EFEB025F61FE19AA43FB3F70B3417197129E91289671E77648A8EF80

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1535 4058c4-40597d call 4116b4 call 40430f call 411668 * 5 call 41193a InternetOpenA StrCmpCA 1552 405986-40598a 1535->1552 1553 40597f 1535->1553 1554 405990-405b02 call 412d64 call 4117e0 call 41177a call 411701 * 2 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 4117e0 call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 4117e0 call 41177a call 411701 * 2 InternetConnectA 1552->1554 1555 406073-40609a InternetCloseHandle call 41193a call 407dc2 1552->1555 1553->1552 1554->1555 1639 405b08-405b13 1554->1639 1565 4060d8-40613e call 412bcb * 2 call 4116b4 call 411701 * 5 call 40131a call 411701 1555->1565 1566 40609c-4060d3 call 411715 call 41185b call 41177a call 411701 1555->1566 1566->1565 1640 405b21 1639->1640 1641 405b15-405b1f 1639->1641 1642 405b2b-405b59 HttpOpenRequestA 1640->1642 1641->1642 1643 406067-40606d InternetCloseHandle 1642->1643 1644 405b5f-405b63 1642->1644 1643->1555 1645 405b65-405b84 InternetSetOptionA 1644->1645 1646 405b8a-405fe2 call 41185b call 41177a call 411701 call 4117e0 call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 4117e0 call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 4117e0 call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 402278 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 4117e0 call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 4117e0 call 41177a call 411701 call 41193a lstrlenA call 41193a lstrlenA GetProcessHeap HeapAlloc call 41193a lstrlenA call 41193a memcpy call 41193a lstrlenA call 41193a * 2 lstrlenA memcpy call 41193a lstrlenA call 41193a HttpSendRequestA 1644->1646 1645->1646 1805 405fe8-406011 InternetReadFile 1646->1805 1806 406013-40601a 1805->1806 1807 40601c-406061 InternetCloseHandle 1805->1807 1806->1807 1809 40601e-40605c call 41185b call 41177a call 411701 1806->1809 1807->1643 1809->1805
                                                      APIs
                                                        • Part of subcall function 004116B4: lstrcpyA.KERNEL32(?,?,?,?,004118C6,00000000), ref: 004116F4
                                                        • Part of subcall function 0040430F: ??_U@YAPAXI@Z.MSVCRT ref: 00404373
                                                        • Part of subcall function 0040430F: ??_U@YAPAXI@Z.MSVCRT ref: 00404387
                                                        • Part of subcall function 0040430F: ??_U@YAPAXI@Z.MSVCRT ref: 0040439B
                                                        • Part of subcall function 0040430F: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 004043B9
                                                        • Part of subcall function 0040430F: InternetCrackUrlA.WININET(00000000,00000000), ref: 004043C9
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040595F
                                                      • StrCmpCA.SHLWAPI(?), ref: 00405975
                                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405AEF
                                                      • HttpOpenRequestA.WININET(00000000,?,00000000,00000000,00400100,00000000), ref: 00405B4C
                                                      • lstrlenA.KERNEL32(00000000,00000000,?,?,00000000,?,",00000000,?,mode,00000000,?,00000000,?,00428D7C,00000000), ref: 00405F2B
                                                      • lstrlenA.KERNEL32(00000000), ref: 00405F3C
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00405F4C
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00405F53
                                                      • lstrlenA.KERNEL32(00000000), ref: 00405F68
                                                      • memcpy.MSVCRT ref: 00405F7E
                                                      • lstrlenA.KERNEL32(00000000), ref: 00405F8F
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405FA8
                                                      • memcpy.MSVCRT ref: 00405FB5
                                                      • lstrlenA.KERNEL32(00000000,?,?), ref: 00405FCF
                                                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405FE2
                                                      • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405FFE
                                                      • InternetCloseHandle.WININET(00000000), ref: 00406061
                                                      • InternetCloseHandle.WININET(00000000), ref: 0040606D
                                                      • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 00405B84
                                                        • Part of subcall function 0041185B: lstrlenA.KERNEL32(00428E5C,?,00428E5C,?,00000000), ref: 0041186F
                                                        • Part of subcall function 0041185B: lstrcpyA.KERNEL32(00000000,?), ref: 004118A8
                                                        • Part of subcall function 0041185B: lstrcatA.KERNEL32(00000000,00000000), ref: 004118B4
                                                        • Part of subcall function 0041177A: lstrcpyA.KERNEL32(00000000,?,?,?,0041A98C,00000000,?,?,00428E5C,?,00000000), ref: 004117D3
                                                        • Part of subcall function 004117E0: lstrcpyA.KERNEL32(00000000,00000000), ref: 0041182C
                                                        • Part of subcall function 004117E0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041183A
                                                      • InternetCloseHandle.WININET(00000000), ref: 00406076
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internetlstrlen$lstrcpy$CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileOptionProcessReadSend
                                                      • String ID: "$------$build_id$mode
                                                      • API String ID: 487080699-3829489455
                                                      • Opcode ID: 99e7d839f9470243f8a500febddaa2585a4ce8104e375d9646ee5b01df51d87c
                                                      • Instruction ID: c3a436f612394fb5ea9af5c3dff246c6ebafd40c3fbf54516d0a2530dbd512cc
                                                      • Opcode Fuzzy Hash: 99e7d839f9470243f8a500febddaa2585a4ce8104e375d9646ee5b01df51d87c
                                                      • Instruction Fuzzy Hash: 0632EB71920118AADB15FBA1DC96FDEB379BF14305F5001AAF216B21B1DF386B88CE54

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1816 409fc0-40a052 call 411668 call 4117e0 call 41185b call 41177a call 411701 * 2 call 411668 * 2 call 41193a FindFirstFileA 1835 40a094-40a0a8 StrCmpCA 1816->1835 1836 40a054-40a08f call 411701 * 3 call 40131a call 411701 * 3 1816->1836 1838 40a0c0 1835->1838 1839 40a0aa-40a0be StrCmpCA 1835->1839 1880 40ab7e-40ab7f 1836->1880 1842 40ab22-40ab34 FindNextFileA 1838->1842 1839->1838 1840 40a0c5-40a13e call 411715 call 4117e0 call 41185b * 2 call 41177a call 411701 * 3 1839->1840 1886 40a144-40a15d call 41193a StrCmpCA 1840->1886 1887 40a275-40a2f4 call 41185b * 4 call 41177a call 411701 * 4 1840->1887 1842->1835 1845 40ab3a-40ab79 FindClose call 411701 * 3 call 40131a call 411701 * 3 1842->1845 1845->1880 1893 40a163-40a1e7 call 41185b * 4 call 41177a call 411701 * 4 1886->1893 1894 40a1ec-40a26b call 41185b * 4 call 41177a call 411701 * 4 1886->1894 1938 40a2f9-40a312 call 41193a StrCmpCA 1887->1938 1947 40a270 1893->1947 1894->1947 1948 40a318-40a32c StrCmpCA 1938->1948 1949 40a50c-40a521 StrCmpCA 1938->1949 1947->1938 1948->1949 1950 40a332-40a484 call 411668 call 412d64 call 41185b call 4117e0 call 41185b call 4117e0 call 41177a call 411701 * 5 call 41193a * 2 call 411668 call 41185b * 2 call 41177a call 411701 * 2 call 4116b4 call 407cdf 1948->1950 1951 40a523-40a56a call 40134c call 4116b4 * 3 call 4083a6 1949->1951 1952 40a57a-40a58f StrCmpCA 1949->1952 2164 40a486-40a4c9 call 4116b4 call 40134c call 418db9 call 411701 1950->2164 2165 40a4ce-40a507 call 41193a call 4118d5 call 41193a call 411701 * 2 1950->2165 2013 40a56f-40a575 1951->2013 1954 40a591-40a5a8 call 41193a StrCmpCA 1952->1954 1955 40a60d-40a625 call 4116b4 call 412f4c 1952->1955 1966 40a608 1954->1966 1967 40a5aa-40a5ae 1954->1967 1978 40a627-40a62b 1955->1978 1979 40a68d-40a6a2 StrCmpCA 1955->1979 1971 40aaa6-40aaaf 1966->1971 1967->1966 1973 40a5b0-40a602 call 40134c call 4116b4 * 3 call 408741 1967->1973 1980 40aab1-40ab07 call 4116b4 * 2 call 411668 call 40134c call 409fc0 1971->1980 1981 40ab12-40ab1d call 4118d5 * 2 1971->1981 1973->1966 1984 40a688 1978->1984 1985 40a62d-40a67d call 40134c call 4116b4 call 411668 call 4116b4 call 408741 1978->1985 1988 40a8d7-40a8ec StrCmpCA 1979->1988 1989 40a6a8-40a778 call 411668 call 412d64 call 41185b call 4117e0 call 41185b call 4117e0 call 41177a call 411701 * 5 call 41193a * 2 CopyFileA 1979->1989 2046 40ab0c 1980->2046 1981->1842 1984->1971 2051 40a682 1985->2051 1988->1971 1995 40a8f2-40a9c2 call 411668 call 412d64 call 41185b call 4117e0 call 41185b call 4117e0 call 41177a call 411701 * 5 call 41193a * 2 CopyFileA 1988->1995 2107 40a834-40a84d call 41193a StrCmpCA 1989->2107 2108 40a77e-40a82e call 40134c call 4116b4 * 3 call 408dda call 40134c call 4116b4 * 3 call 4096ce 1989->2108 2111 40a9c8-40aa78 call 40134c call 4116b4 * 3 call 4090fb call 40134c call 4116b4 * 3 call 4093a2 1995->2111 2112 40aa7e-40aa96 call 41193a DeleteFileA call 4118d5 1995->2112 2013->1971 2046->1981 2051->1984 2121 40a8aa-40a8c2 call 41193a DeleteFileA call 4118d5 2107->2121 2122 40a84f-40a8a4 call 40134c call 4116b4 * 3 call 409c1a 2107->2122 2108->2107 2111->2112 2135 40aa9b-40aaa1 call 411701 2112->2135 2144 40a8c7-40a8d2 call 411701 2121->2144 2122->2121 2135->1971 2144->1971 2164->2165 2165->1949
                                                      APIs
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                        • Part of subcall function 004117E0: lstrcpyA.KERNEL32(00000000,00000000), ref: 0041182C
                                                        • Part of subcall function 004117E0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041183A
                                                        • Part of subcall function 0041185B: lstrlenA.KERNEL32(00428E5C,?,00428E5C,?,00000000), ref: 0041186F
                                                        • Part of subcall function 0041185B: lstrcpyA.KERNEL32(00000000,?), ref: 004118A8
                                                        • Part of subcall function 0041185B: lstrcatA.KERNEL32(00000000,00000000), ref: 004118B4
                                                        • Part of subcall function 0041177A: lstrcpyA.KERNEL32(00000000,?,?,?,0041A98C,00000000,?,?,00428E5C,?,00000000), ref: 004117D3
                                                      • FindFirstFileA.KERNEL32(00000000,?,00425200,00425200,00000000,?,?,?,00428F3C,00425200), ref: 0040A045
                                                      • StrCmpCA.SHLWAPI(?,00425240), ref: 0040A0A0
                                                      • StrCmpCA.SHLWAPI(?,0042523C), ref: 0040A0B6
                                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040AB2C
                                                      • FindClose.KERNEL32(000000FF), ref: 0040AB3D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                                      • String ID: Brave$Google Chrome$Opera GX$Preferences$\BraveWallet\Preferences
                                                      • API String ID: 3334442632-1189830961
                                                      • Opcode ID: b6171a64cfc6ab4f13282320838a7735dbd279b900ab7de6f694e87253319736
                                                      • Instruction ID: 263e58a2a74b46f478eabfba2e73a67f6604dac1ca14d90e5786d28d1d592fab
                                                      • Opcode Fuzzy Hash: b6171a64cfc6ab4f13282320838a7735dbd279b900ab7de6f694e87253319736
                                                      • Instruction Fuzzy Hash: 225241719002089BDF24FBB1DC56EED737DAF15304F40416AF61AA21A1EE399B88CF59
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,-00000003,04000102,00000000), ref: 1FC64EE1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID: delayed %dms for lock/sharing conflict at line %d$exclusive$psow$winOpen
                                                      • API String ID: 823142352-3829269058
                                                      • Opcode ID: 519a7ed0f3584e3789f176b6548f5854ea26f70b6ab1ce16b7ba6fbdf4a1afa1
                                                      • Instruction ID: aff8db933b69acb78cdb755998635e3489435436830e8c86cf7f449c69a58ea2
                                                      • Opcode Fuzzy Hash: 519a7ed0f3584e3789f176b6548f5854ea26f70b6ab1ce16b7ba6fbdf4a1afa1
                                                      • Instruction Fuzzy Hash: BFF1F272A083108FDB18DF24C8C875BB7E5FB95324F50092AF945C6391EB36E954DBA2
                                                      APIs
                                                      • CoInitializeEx.OLE32(00000000,00000000,?,?,?,Windows: ,00000000,?,00428FE4,00000000,?,Work Dir: In memory,00000000,?,00428E48,00000000), ref: 004129E9
                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,Windows: ,00000000,?,00428FE4), ref: 00412A01
                                                      • CoCreateInstance.OLE32(0042AE78,00000000,00000001,0042ADA8,00000000,?,?,?,Windows: ,00000000,?,00428FE4,00000000,?), ref: 00412A1D
                                                      • CoSetProxyBlanket.OLE32(00000000,0000000A,00000000,00000000,00000003,00000003,00000000,00000000,?,?,?,Windows: ,00000000,?,00428FE4,00000000), ref: 00412A65
                                                      • VariantInit.OLEAUT32(?), ref: 00412AC6
                                                      • VariantClear.OLEAUT32(?), ref: 00412AFC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeVariant$BlanketClearCreateInitInstanceProxySecurity
                                                      • String ID: Select * From AntiVirusProduct$Unknown$WQL$displayName$root\SecurityCenter2
                                                      • API String ID: 3243281124-2561087649
                                                      • Opcode ID: 01e7d32d45ff0252796b17b99a1afcd933ba27ea36f00a65b271f1c55a8e973d
                                                      • Instruction ID: cc2f9b12050fb50489b4dacd928ba9f1606622a753a49b6d6fc2a760caa5f7a5
                                                      • Opcode Fuzzy Hash: 01e7d32d45ff0252796b17b99a1afcd933ba27ea36f00a65b271f1c55a8e973d
                                                      • Instruction Fuzzy Hash: 01512971A44208AFEB10CF94DD46FEDBBB8EB08711F604116F611FA1E0C7B8A951CB69
                                                      APIs
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                      • GetKeyboardLayoutList.USER32(00000000,00000000,00425200), ref: 00411D59
                                                      • LocalAlloc.KERNEL32(00000040,?), ref: 00411D71
                                                      • GetKeyboardLayoutList.USER32(?,00000000), ref: 00411D83
                                                      • GetLocaleInfoA.KERNEL32(00000000,00000002,?,00000200), ref: 00411DD3
                                                      • LocalFree.KERNEL32(00000000), ref: 00411E90
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                                      • String ID: /
                                                      • API String ID: 3090951853-4001269591
                                                      • Opcode ID: 15a7ab0f5f0475079f1a4d254d2fab6afe80d822c98d4419e6fd3bbb7ed8be85
                                                      • Instruction ID: c70b1ae06e32fba280522d5ae6b93e050f7c05b062ce08c862d254046d427c6b
                                                      • Opcode Fuzzy Hash: 15a7ab0f5f0475079f1a4d254d2fab6afe80d822c98d4419e6fd3bbb7ed8be85
                                                      • Instruction Fuzzy Hash: 8C410E7594021CEBDB20EB90DC89BEDB3B8EB14305F2041DAE61AA61A1DB785FC5CF54
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 004138F5
                                                      • Process32First.KERNEL32(00429888,00000128), ref: 00413908
                                                      • Process32Next.KERNEL32(00429888,00000128), ref: 0041391C
                                                      • StrCmpCA.SHLWAPI(?,0042988C), ref: 00413930
                                                      • FindCloseChangeNotification.KERNEL32(00429888), ref: 00413943
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process32$ChangeCloseCreateFindFirstNextNotificationSnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 3243318325-0
                                                      • Opcode ID: 2a4b200a08ed556fe0b76f61f99fc73be8100933646605b45de0898bc31b2ca7
                                                      • Instruction ID: c76ae2ebba4cdfdbec52cc22ef4db84e697ee2aab148ee9ae3442f35c02f241c
                                                      • Opcode Fuzzy Hash: 2a4b200a08ed556fe0b76f61f99fc73be8100933646605b45de0898bc31b2ca7
                                                      • Instruction Fuzzy Hash: 2B11C2B5900249EFDF118F91CD09BEFBBBDFB06791F00016AE505A62A0D7B88B40CB65
                                                      APIs
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00412491
                                                      • Process32First.KERNEL32(00000000,00000128), ref: 004124A4
                                                      • Process32Next.KERNEL32(00000000,00000128), ref: 004124B8
                                                        • Part of subcall function 0041185B: lstrlenA.KERNEL32(00428E5C,?,00428E5C,?,00000000), ref: 0041186F
                                                        • Part of subcall function 0041185B: lstrcpyA.KERNEL32(00000000,?), ref: 004118A8
                                                        • Part of subcall function 0041185B: lstrcatA.KERNEL32(00000000,00000000), ref: 004118B4
                                                        • Part of subcall function 0041177A: lstrcpyA.KERNEL32(00000000,?,?,?,0041A98C,00000000,?,?,00428E5C,?,00000000), ref: 004117D3
                                                      • CloseHandle.KERNEL32(00000000), ref: 00412525
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                                      • String ID:
                                                      • API String ID: 1066202413-0
                                                      • Opcode ID: 977ae0b600e9dfa5c8bb5876995a90588de119cf502625faec0d1e404a198b9a
                                                      • Instruction ID: 2c0229d212547161a0eb93f3d0d5d82303ca8f07f9ab92fbeb1aaa96aca691bd
                                                      • Opcode Fuzzy Hash: 977ae0b600e9dfa5c8bb5876995a90588de119cf502625faec0d1e404a198b9a
                                                      • Instruction Fuzzy Hash: CC212935900118EBCB11EB60DD56AEDB379AF15309F5041EAA60AB61A0EF349FC8CF94
                                                      APIs
                                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00407E65
                                                      • LocalAlloc.KERNEL32(00000040,00000000), ref: 00407E83
                                                      • LocalFree.KERNEL32(?), ref: 00407EAB
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Local$AllocCryptDataFreeUnprotect
                                                      • String ID:
                                                      • API String ID: 2068576380-0
                                                      • Opcode ID: ec7d2c3964d9433e1bd8db3b7e97589d228e91b9e021ed9bd7c00834a8d4e7c8
                                                      • Instruction ID: c73416beba9d1fde4238afde8a7e84a4d4aa4311c1f55aef6ad3ec00fa4115b4
                                                      • Opcode Fuzzy Hash: ec7d2c3964d9433e1bd8db3b7e97589d228e91b9e021ed9bd7c00834a8d4e7c8
                                                      • Instruction Fuzzy Hash: 72019279900209EFCB01DF98D945A9E7BF5FB09300F0000A5F901AB2A0D774AE50DF61
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,0041A955), ref: 00411BF8
                                                      • HeapAlloc.KERNEL32(00000000,?,?,?,0041A955), ref: 00411BFF
                                                      • GetUserNameA.ADVAPI32(?,00000104), ref: 00411C16
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocNameProcessUser
                                                      • String ID:
                                                      • API String ID: 1206570057-0
                                                      • Opcode ID: cdb89f3b8d2170a32c4f5d9c7d109af83218dd3f9df08350fd3753d412c9dc7b
                                                      • Instruction ID: 6ad48150bf72aad5a6046b0908b1c33b434ec51fc494a64bf18a9d81697ab1ea
                                                      • Opcode Fuzzy Hash: cdb89f3b8d2170a32c4f5d9c7d109af83218dd3f9df08350fd3753d412c9dc7b
                                                      • Instruction Fuzzy Hash: B3E04CB4A00608FFDB10DBD4DC49FADBBB8FB04749F904065F601E2160D7B45A459B64
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoSystemwsprintf
                                                      • String ID:
                                                      • API String ID: 2452939696-0
                                                      • Opcode ID: 2f2772df9e2289074dc65a3b003ee837af4eb9d8d63b789a1da4cf5f031d46f7
                                                      • Instruction ID: 9caa33327a18f9dae679d202d2ba32c4f74d5e180e33a6cc9dfb65b88a9d38f3
                                                      • Opcode Fuzzy Hash: 2f2772df9e2289074dc65a3b003ee837af4eb9d8d63b789a1da4cf5f031d46f7
                                                      • Instruction Fuzzy Hash: F6D05EB180011CABCB00DBE0FC499D977BCBB09208F4408B1E614E2040E3B8EAD88BA8

                                                      Control-flow Graph

                                                      APIs
                                                      • lstrlenW.KERNEL32(Taxonomic sequence (also known as systematic, phyletic or taxonomic order) is a sequence followed in listing of taxa which aids ea), ref: 0041A776
                                                      • lstrlenW.KERNEL32(The 1999 Rushmoor Council election took place on 6 May 1999 to elect members of Rushmoor Borough Council in Hampshire, England. On), ref: 0041A781
                                                      • lstrlenW.KERNEL32(Oregon Ballot Measure 56 or House Joint Resolution 15 (HJR 15) is a legislatively referred constitutional amendment that enacted l), ref: 0041A78C
                                                      • lstrlenW.KERNEL32(The 1967 October Revolution Parade is the parade on Moscow's Red Square devoted to the 50th anniversary of the Great October Socia), ref: 0041A797
                                                      • lstrlenW.KERNEL32(I-11 was an Imperial Japanese Navy Type A1 submarine that served during World War II. Designed as a submarine aircraft carrier and), ref: 0041A7A2
                                                      • LoadLibraryA.KERNEL32(kernel32.dll), ref: 0041A7AD
                                                      • GetProcAddress.KERNEL32(00000000,Sleep), ref: 0041A7C4
                                                      • GetProcAddress.KERNEL32(00000000,GetSystemTime), ref: 0041A7D7
                                                        • Part of subcall function 0041185B: lstrlenA.KERNEL32(00428E5C,?,00428E5C,?,00000000), ref: 0041186F
                                                        • Part of subcall function 0041185B: lstrcpyA.KERNEL32(00000000,?), ref: 004118A8
                                                        • Part of subcall function 0041185B: lstrcatA.KERNEL32(00000000,00000000), ref: 004118B4
                                                        • Part of subcall function 0041177A: lstrcpyA.KERNEL32(00000000,?,?,?,0041A98C,00000000,?,?,00428E5C,?,00000000), ref: 004117D3
                                                      • Sleep.KERNEL32(00000014), ref: 0041A7E4
                                                      • Sleep.KERNEL32(00000014), ref: 0041A7EC
                                                      • Sleep.KERNEL32(00000014), ref: 0041A7F4
                                                      • Sleep.KERNEL32(00000014), ref: 0041A7FC
                                                      • Sleep.KERNEL32(00000014), ref: 0041A804
                                                      • Sleep.KERNEL32(00000014), ref: 0041A80C
                                                      • lstrlenW.KERNEL32(Taxonomic sequence (also known as systematic, phyletic or taxonomic order) is a sequence followed in listing of taxa which aids ea), ref: 0041A817
                                                      • lstrlenW.KERNEL32(The 1999 Rushmoor Council election took place on 6 May 1999 to elect members of Rushmoor Borough Council in Hampshire, England. On), ref: 0041A822
                                                      • lstrlenW.KERNEL32(Oregon Ballot Measure 56 or House Joint Resolution 15 (HJR 15) is a legislatively referred constitutional amendment that enacted l), ref: 0041A82D
                                                      • lstrlenW.KERNEL32(The 1967 October Revolution Parade is the parade on Moscow's Red Square devoted to the 50th anniversary of the Great October Socia), ref: 0041A838
                                                      • lstrlenW.KERNEL32(I-11 was an Imperial Japanese Navy Type A1 submarine that served during World War II. Designed as a submarine aircraft carrier and), ref: 0041A843
                                                      • Sleep.KERNEL32(00000014), ref: 0041A84B
                                                      • Sleep.KERNEL32(00000014), ref: 0041A853
                                                      • Sleep.KERNEL32(00000014), ref: 0041A85B
                                                      • Sleep.KERNEL32(00000014), ref: 0041A863
                                                      • Sleep.KERNEL32(00000014), ref: 0041A86B
                                                      • Sleep.KERNEL32(00000014), ref: 0041A873
                                                      • Sleep.KERNEL32(00000014), ref: 0041A880
                                                      • Sleep.KERNEL32(00000014), ref: 0041A888
                                                      • Sleep.KERNEL32(00000014), ref: 0041A890
                                                      • Sleep.KERNEL32(00000014), ref: 0041A898
                                                      • Sleep.KERNEL32(00000014), ref: 0041A8A0
                                                      • Sleep.KERNEL32(00000014), ref: 0041A8A8
                                                      • Sleep.KERNEL32(00000014), ref: 0041A8B5
                                                      • Sleep.KERNEL32(00000014), ref: 0041A8BD
                                                      • Sleep.KERNEL32(00000014), ref: 0041A8C5
                                                      • Sleep.KERNEL32(00000014), ref: 0041A8CD
                                                      • Sleep.KERNEL32(00000014), ref: 0041A8D5
                                                      • Sleep.KERNEL32(00000014), ref: 0041A8DD
                                                      • Sleep.KERNEL32(00000014), ref: 0041A8E5
                                                      • Sleep.KERNEL32(00000014), ref: 0041A8ED
                                                      • Sleep.KERNEL32(00000014), ref: 0041A8F5
                                                      • Sleep.KERNEL32(00000014), ref: 0041A8FD
                                                      • Sleep.KERNEL32(00000014), ref: 0041A905
                                                      • Sleep.KERNEL32(00000014), ref: 0041A90D
                                                      • Sleep.KERNEL32(00000014,00425200), ref: 0041A922
                                                      • Sleep.KERNEL32(00000014), ref: 0041A92A
                                                      • Sleep.KERNEL32(00000014), ref: 0041A932
                                                      • Sleep.KERNEL32(00000014), ref: 0041A93A
                                                      • Sleep.KERNEL32(00000014), ref: 0041A942
                                                      • Sleep.KERNEL32(00000014), ref: 0041A94A
                                                      • Sleep.KERNEL32(00000014,00000000,?,?,00428E5C,?,00000000), ref: 0041A9A6
                                                      • Sleep.KERNEL32(00000014), ref: 0041A9AE
                                                      • Sleep.KERNEL32(00000014), ref: 0041A9B6
                                                      • Sleep.KERNEL32(00000014), ref: 0041A9BE
                                                      • Sleep.KERNEL32(00000014), ref: 0041A9C6
                                                      • Sleep.KERNEL32(00000014), ref: 0041A9CE
                                                      • Sleep.KERNEL32(00000014), ref: 0041A9D6
                                                      • Sleep.KERNEL32(00000014), ref: 0041A9DE
                                                      • Sleep.KERNEL32(00000014), ref: 0041A9E6
                                                      • Sleep.KERNEL32(00000014), ref: 0041A9EE
                                                      • Sleep.KERNEL32(00000014), ref: 0041A9F6
                                                      • Sleep.KERNEL32(00000014), ref: 0041A9FE
                                                      • Sleep.KERNEL32(00000014), ref: 0041AA0F
                                                      • Sleep.KERNEL32(00000014), ref: 0041AA17
                                                      • Sleep.KERNEL32(00000014), ref: 0041AA1F
                                                      • Sleep.KERNEL32(00000014), ref: 0041AA27
                                                      • Sleep.KERNEL32(00000014), ref: 0041AA2F
                                                      • Sleep.KERNEL32(00000014), ref: 0041AA37
                                                      • OpenEventA.KERNEL32(001F0003,00000000,00000000), ref: 0041AA4D
                                                      • Sleep.KERNEL32(00000014), ref: 0041AA5E
                                                      • Sleep.KERNEL32(00000014), ref: 0041AA66
                                                      • Sleep.KERNEL32(00000014), ref: 0041AA6E
                                                      • Sleep.KERNEL32(00000014), ref: 0041AA76
                                                      • Sleep.KERNEL32(00000014), ref: 0041AA7E
                                                      • Sleep.KERNEL32(00000014), ref: 0041AA86
                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0041AA9B
                                                      • Sleep.KERNEL32(00000014), ref: 0041AAA6
                                                      • Sleep.KERNEL32(00000014), ref: 0041AAAE
                                                      • Sleep.KERNEL32(00000014), ref: 0041AAB6
                                                      • Sleep.KERNEL32(00000014), ref: 0041AABE
                                                      • Sleep.KERNEL32(00000014), ref: 0041AAC6
                                                      • Sleep.KERNEL32(00000014), ref: 0041AACE
                                                      • Sleep.KERNEL32(00000014), ref: 0041AADA
                                                      • Sleep.KERNEL32(00000014), ref: 0041AAE2
                                                      • Sleep.KERNEL32(00000014), ref: 0041AAEA
                                                      • Sleep.KERNEL32(00000014), ref: 0041AAF2
                                                      • Sleep.KERNEL32(00000014), ref: 0041AAFA
                                                      • Sleep.KERNEL32(00000014), ref: 0041AB02
                                                      • CloseHandle.KERNEL32(00000000), ref: 0041AB0B
                                                      • Sleep.KERNEL32(00001B58), ref: 0041AB16
                                                      • Sleep.KERNEL32(00000014), ref: 0041AB1E
                                                      • Sleep.KERNEL32(00000014), ref: 0041AB26
                                                      • Sleep.KERNEL32(00000014), ref: 0041AB2E
                                                      • Sleep.KERNEL32(00000014), ref: 0041AB36
                                                      • Sleep.KERNEL32(00000014), ref: 0041AB3E
                                                      • Sleep.KERNEL32(00000014), ref: 0041AB46
                                                      • Sleep.KERNEL32(00000014), ref: 0041AB53
                                                      • Sleep.KERNEL32(00000014), ref: 0041AB5B
                                                      • Sleep.KERNEL32(00000014), ref: 0041AB63
                                                      • Sleep.KERNEL32(00000014), ref: 0041AB6B
                                                      • Sleep.KERNEL32(00000014), ref: 0041AB73
                                                      • Sleep.KERNEL32(00000014), ref: 0041AB7B
                                                      • Sleep.KERNEL32(00000014), ref: 0041AB83
                                                      • Sleep.KERNEL32(00000014), ref: 0041AB8B
                                                      • Sleep.KERNEL32(00000014), ref: 0041AB93
                                                      • Sleep.KERNEL32(00000014), ref: 0041AB9B
                                                      • Sleep.KERNEL32(00000014), ref: 0041ABA3
                                                      • Sleep.KERNEL32(00000014), ref: 0041ABAB
                                                      • Sleep.KERNEL32(00000014), ref: 0041ABB8
                                                      • Sleep.KERNEL32(00000014), ref: 0041ABC0
                                                      • Sleep.KERNEL32(00000014), ref: 0041ABC8
                                                      • Sleep.KERNEL32(00000014), ref: 0041ABD0
                                                      • Sleep.KERNEL32(00000014), ref: 0041ABD8
                                                      • Sleep.KERNEL32(00000014), ref: 0041ABE0
                                                      • Sleep.KERNEL32(00000014), ref: 0041ABE8
                                                      • Sleep.KERNEL32(00000014), ref: 0041ABF0
                                                      • Sleep.KERNEL32(00000014), ref: 0041ABF8
                                                      • Sleep.KERNEL32(00000014), ref: 0041AC00
                                                      • Sleep.KERNEL32(00000014), ref: 0041AC08
                                                      • Sleep.KERNEL32(00000014), ref: 0041AC10
                                                      • CloseHandle.KERNEL32(?), ref: 0041AC19
                                                      • Sleep.KERNEL32(00000014), ref: 0041AC21
                                                      • Sleep.KERNEL32(00000014), ref: 0041AC29
                                                      • Sleep.KERNEL32(00000014), ref: 0041AC31
                                                      • Sleep.KERNEL32(00000014), ref: 0041AC39
                                                      • Sleep.KERNEL32(00000014), ref: 0041AC41
                                                      • Sleep.KERNEL32(00000014), ref: 0041AC49
                                                      • Sleep.KERNEL32(00000014), ref: 0041AC51
                                                      • Sleep.KERNEL32(00000014), ref: 0041AC59
                                                      • Sleep.KERNEL32(00000014), ref: 0041AC61
                                                      • Sleep.KERNEL32(00000014), ref: 0041AC69
                                                      • Sleep.KERNEL32(00000014), ref: 0041AC71
                                                      • Sleep.KERNEL32(00000014), ref: 0041AC79
                                                      • Sleep.KERNEL32(00000014), ref: 0041AC81
                                                      • Sleep.KERNEL32(00000014), ref: 0041AC89
                                                      • Sleep.KERNEL32(00000014), ref: 0041AC91
                                                      • Sleep.KERNEL32(00000014), ref: 0041AC99
                                                      • Sleep.KERNEL32(00000014), ref: 0041ACA1
                                                      • Sleep.KERNEL32(00000014), ref: 0041ACA9
                                                      • ExitProcess.KERNEL32 ref: 0041ACB1
                                                      Strings
                                                      • The 1967 October Revolution Parade is the parade on Moscow's Red Square devoted to the 50th anniversary of the Great October Socia, xrefs: 0041A792, 0041A833
                                                      • I-11 was an Imperial Japanese Navy Type A1 submarine that served during World War II. Designed as a submarine aircraft carrier and, xrefs: 0041A79D, 0041A83E
                                                      • kernel32.dll, xrefs: 0041A7A8
                                                      • Oregon Ballot Measure 56 or House Joint Resolution 15 (HJR 15) is a legislatively referred constitutional amendment that enacted l, xrefs: 0041A787, 0041A828
                                                      • Taxonomic sequence (also known as systematic, phyletic or taxonomic order) is a sequence followed in listing of taxa which aids ea, xrefs: 0041A771, 0041A812
                                                      • GetSystemTime, xrefs: 0041A7CF
                                                      • Sleep, xrefs: 0041A7BC
                                                      • The 1999 Rushmoor Council election took place on 6 May 1999 to elect members of Rushmoor Borough Council in Hampshire, England. On, xrefs: 0041A77C, 0041A81D
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Sleep$lstrlen$AddressCloseEventHandleProclstrcpy$CreateExitLibraryLoadOpenProcesslstrcat
                                                      • String ID: GetSystemTime$I-11 was an Imperial Japanese Navy Type A1 submarine that served during World War II. Designed as a submarine aircraft carrier and$Oregon Ballot Measure 56 or House Joint Resolution 15 (HJR 15) is a legislatively referred constitutional amendment that enacted l$Sleep$Taxonomic sequence (also known as systematic, phyletic or taxonomic order) is a sequence followed in listing of taxa which aids ea$The 1967 October Revolution Parade is the parade on Moscow's Red Square devoted to the 50th anniversary of the Great October Socia$The 1999 Rushmoor Council election took place on 6 May 1999 to elect members of Rushmoor Borough Council in Hampshire, England. On$kernel32.dll
                                                      • API String ID: 1968030747-1157189060
                                                      • Opcode ID: 54532dd25730401e9619ccf941eb7a63a5c16019b915d8d70357fc5f908c5c95
                                                      • Instruction ID: d0fc9c7f70cd4d74f070b5276f1611ca398b8472acf39be3ffb0404d49fc07f7
                                                      • Opcode Fuzzy Hash: 54532dd25730401e9619ccf941eb7a63a5c16019b915d8d70357fc5f908c5c95
                                                      • Instruction Fuzzy Hash: 40D1AB356E121DEFDB006BE0AC2EBE87A6AAB17702F551125B30E9D0F0DAB444C19F75

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Sleep$CloseEventHandle$CreateExitOpenProcess
                                                      • String ID:
                                                      • API String ID: 3990214622-0
                                                      • Opcode ID: 939382f14eacfc35bc189caa75c6057b8e340a7325aef0680f6e940db5972843
                                                      • Instruction ID: 010346d2f35c5d2b6dfb22c7d70376198b9011b0162d7776d674804ad5e558a3
                                                      • Opcode Fuzzy Hash: 939382f14eacfc35bc189caa75c6057b8e340a7325aef0680f6e940db5972843
                                                      • Instruction Fuzzy Hash: AC5157395E620DEFEB006BE09D1EBE83666AB17706F151015B30E9C0F0CA7444C59F36

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 634 404e03-404ef7 call 411668 call 4116b4 call 40430f call 41302d call 41193a lstrlenA call 41193a call 41302d call 411668 * 4 StrCmpCA 657 404f00-404f04 634->657 658 404ef9 634->658 659 404f20-404f24 657->659 660 404f06-404f1d call 41193a InternetOpenA 657->660 658->657 661 40582a-4058ba call 412bcb * 2 call 4118d5 * 4 call 4116b4 call 411701 * 9 659->661 662 404f2a-405038 call 412d64 call 4117e0 call 41177a call 411701 * 2 call 41185b call 4117e0 call 41185b call 41177a call 411701 * 3 call 41185b call 4117e0 call 41177a call 411701 * 2 InternetConnectA 659->662 660->659 730 4058bd-4058c0 661->730 662->661 732 40503e-405049 662->732 733 405057 732->733 734 40504b-405055 732->734 735 405061-40508f HttpOpenRequestA 733->735 734->735 736 405095-405099 735->736 737 40581e-405824 InternetCloseHandle 735->737 738 4050c0-405695 call 41185b call 41177a call 411701 call 4117e0 call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 4117e0 call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 4117e0 call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 402278 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 4117e0 call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 4117e0 call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41193a lstrlenA call 41193a lstrlenA GetProcessHeap HeapAlloc call 41193a lstrlenA call 41193a memcpy call 41193a lstrlenA memcpy call 41193a lstrlenA call 41193a * 2 lstrlenA memcpy call 41193a lstrlenA call 41193a HttpSendRequestA call 412bcb HttpQueryInfoA 736->738 739 40509b-4050ba InternetSetOptionA 736->739 737->661 944 4056f7-405714 call 412b90 738->944 945 405697-4056f2 call 411668 call 411701 * 9 738->945 739->738 950 4057b5-405810 call 411668 call 411701 * 9 944->950 951 40571a-405743 InternetReadFile 944->951 945->730 950->730 954 405745-40574c 951->954 955 40574e-4057a9 call 41193a StrCmpCA 951->955 954->955 958 405750-40578e call 41185b call 41177a call 411701 954->958 972 4057b3-405818 InternetCloseHandle 955->972 973 4057ab-4057ad ExitProcess 955->973 958->951 972->737
                                                      APIs
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                        • Part of subcall function 004116B4: lstrcpyA.KERNEL32(?,?,?,?,004118C6,00000000), ref: 004116F4
                                                        • Part of subcall function 0040430F: ??_U@YAPAXI@Z.MSVCRT ref: 00404373
                                                        • Part of subcall function 0040430F: ??_U@YAPAXI@Z.MSVCRT ref: 00404387
                                                        • Part of subcall function 0040430F: ??_U@YAPAXI@Z.MSVCRT ref: 0040439B
                                                        • Part of subcall function 0040430F: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 004043B9
                                                        • Part of subcall function 0040430F: InternetCrackUrlA.WININET(00000000,00000000), ref: 004043C9
                                                      • lstrlenA.KERNEL32(00000000), ref: 00404E8B
                                                        • Part of subcall function 0041302D: CryptBinaryToStringA.CRYPT32(00000000,00404E7F,40000001,00000000,00000000), ref: 0041304A
                                                      • StrCmpCA.SHLWAPI(?,00425200,00425200,00425200,00425200), ref: 00404EEF
                                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404F17
                                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405025
                                                      • HttpOpenRequestA.WININET(00000000,?,00000000,00000000,00400100,00000000), ref: 00405082
                                                      • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004050BA
                                                        • Part of subcall function 0041177A: lstrcpyA.KERNEL32(00000000,?,?,?,0041A98C,00000000,?,?,00428E5C,?,00000000), ref: 004117D3
                                                        • Part of subcall function 0041185B: lstrlenA.KERNEL32(00428E5C,?,00428E5C,?,00000000), ref: 0041186F
                                                        • Part of subcall function 0041185B: lstrcpyA.KERNEL32(00000000,?), ref: 004118A8
                                                        • Part of subcall function 0041185B: lstrcatA.KERNEL32(00000000,00000000), ref: 004118B4
                                                        • Part of subcall function 004117E0: lstrcpyA.KERNEL32(00000000,00000000), ref: 0041182C
                                                        • Part of subcall function 004117E0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041183A
                                                      • lstrlenA.KERNEL32(00000000,00000000,?,",00000000,?,file_data,00000000,?,00000000,?,00428D7C,00000000,?,00000000,00000000), ref: 00405579
                                                      • lstrlenA.KERNEL32(00000000), ref: 0040558D
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 0040559D
                                                      • HeapAlloc.KERNEL32(00000000), ref: 004055A4
                                                      • lstrlenA.KERNEL32(00000000), ref: 004055B9
                                                      • memcpy.MSVCRT ref: 004055CF
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 004055E6
                                                      • memcpy.MSVCRT ref: 004055F3
                                                      • lstrlenA.KERNEL32(00000000), ref: 00405604
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 0040561D
                                                      • memcpy.MSVCRT ref: 0040562D
                                                      • lstrlenA.KERNEL32(00000000,?,?), ref: 00405647
                                                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 0040565A
                                                      • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 0040568D
                                                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00405730
                                                      • StrCmpCA.SHLWAPI(00000000,block), ref: 004057A1
                                                      • ExitProcess.KERNEL32 ref: 004057AD
                                                      • InternetCloseHandle.WININET(00000000), ref: 00405824
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen$Internet$lstrcpy$Httpmemcpy$HeapOpenProcessRequestlstrcat$AllocBinaryCloseConnectCrackCryptExitFileHandleInfoOptionQueryReadSendString
                                                      • String ID: ------$"$--$------$ERROR$block$build_id$file_data
                                                      • API String ID: 291296625-1063948816
                                                      • Opcode ID: 941268b52b4c2f1080921e961083cd3901daec87e8b66a8e899ed6db65051c96
                                                      • Instruction ID: 347b2e4d89f66f0c0c6539a9aa54472735362a414d5b47530b2be4bc622c77f0
                                                      • Opcode Fuzzy Hash: 941268b52b4c2f1080921e961083cd3901daec87e8b66a8e899ed6db65051c96
                                                      • Instruction Fuzzy Hash: 76520E729101189ADB14FBA1EC96FDE7379AF15305F5080AAF216B21F1DF386A88CF54

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1005 41ad16-41ad2a call 41acf3 1008 41ad30-41af26 call 407aba GetProcAddress * 21 1005->1008 1009 41af2b-41af87 LoadLibraryA * 5 1005->1009 1008->1009 1011 41afa0-41afa7 1009->1011 1012 41af89-41af9b GetProcAddress 1009->1012 1014 41afd7-41afde 1011->1014 1015 41afa9-41afd2 GetProcAddress * 2 1011->1015 1012->1011 1016 41afe0-41aff2 GetProcAddress 1014->1016 1017 41aff7-41affe 1014->1017 1015->1014 1016->1017 1018 41b000-41b012 GetProcAddress 1017->1018 1019 41b017-41b01e 1017->1019 1018->1019 1020 41b020-41b049 GetProcAddress * 2 1019->1020 1021 41b04e-41b04f 1019->1021 1020->1021
                                                      APIs
                                                      • GetProcAddress.KERNEL32 ref: 0041AD54
                                                      • GetProcAddress.KERNEL32 ref: 0041AD6B
                                                      • GetProcAddress.KERNEL32 ref: 0041AD82
                                                      • GetProcAddress.KERNEL32 ref: 0041AD99
                                                      • GetProcAddress.KERNEL32 ref: 0041ADB0
                                                      • GetProcAddress.KERNEL32 ref: 0041ADC7
                                                      • GetProcAddress.KERNEL32 ref: 0041ADDE
                                                      • GetProcAddress.KERNEL32 ref: 0041ADF5
                                                      • GetProcAddress.KERNEL32 ref: 0041AE0C
                                                      • GetProcAddress.KERNEL32 ref: 0041AE23
                                                      • GetProcAddress.KERNEL32 ref: 0041AE3A
                                                      • GetProcAddress.KERNEL32 ref: 0041AE51
                                                      • GetProcAddress.KERNEL32 ref: 0041AE68
                                                      • GetProcAddress.KERNEL32 ref: 0041AE7F
                                                      • GetProcAddress.KERNEL32 ref: 0041AE96
                                                      • GetProcAddress.KERNEL32 ref: 0041AEAD
                                                      • GetProcAddress.KERNEL32 ref: 0041AEC4
                                                      • GetProcAddress.KERNEL32 ref: 0041AEDB
                                                      • GetProcAddress.KERNEL32 ref: 0041AEF2
                                                      • GetProcAddress.KERNEL32 ref: 0041AF09
                                                      • GetProcAddress.KERNEL32 ref: 0041AF20
                                                      • LoadLibraryA.KERNEL32(?,0041A8B3), ref: 0041AF31
                                                      • LoadLibraryA.KERNEL32(?,0041A8B3), ref: 0041AF42
                                                      • LoadLibraryA.KERNEL32(?,0041A8B3), ref: 0041AF53
                                                      • LoadLibraryA.KERNEL32(?,0041A8B3), ref: 0041AF64
                                                      • LoadLibraryA.KERNEL32(?,0041A8B3), ref: 0041AF75
                                                      • GetProcAddress.KERNEL32(?,0041A8B3), ref: 0041AF95
                                                      • GetProcAddress.KERNEL32(?,0041A8B3), ref: 0041AFB5
                                                      • GetProcAddress.KERNEL32(?,0041A8B3), ref: 0041AFCC
                                                      • GetProcAddress.KERNEL32(?,0041A8B3), ref: 0041AFEC
                                                      • GetProcAddress.KERNEL32(?,0041A8B3), ref: 0041B00C
                                                      • GetProcAddress.KERNEL32(?,0041A8B3), ref: 0041B02C
                                                      • GetProcAddress.KERNEL32(?,0041A8B3), ref: 0041B043
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad
                                                      • String ID:
                                                      • API String ID: 2238633743-0
                                                      • Opcode ID: 8ed0b4f8c3e954e1fc1dc6971364bbe040f0f26000e4905d9b82ffd922f5bdfa
                                                      • Instruction ID: e6d1e2ba0aaa9db7fee79aa5ca47b6abfb0ed3e486351d87d65decbaef8ebfc5
                                                      • Opcode Fuzzy Hash: 8ed0b4f8c3e954e1fc1dc6971364bbe040f0f26000e4905d9b82ffd922f5bdfa
                                                      • Instruction Fuzzy Hash: DD81C679481214EFEB026F60FE19AA43FA3F70B345715712AE90689670E77648A8EF40

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1022 4151e4-415e3c call 411668 call 41185b call 41177a call 411701 call 40226e call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 411c63 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 4125ca call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 412667 call 4117e0 call 41177a call 411701 * 2 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 411948 call 4117e0 call 41177a call 411701 * 2 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 GetCurrentProcessId call 413563 call 4117e0 call 41177a call 411701 * 2 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 411add call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 4127af call 4117e0 call 41177a call 411701 * 2 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 4129bf call 4117e0 call 41177a call 411701 * 2 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 411c21 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 411bec call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41254a call 4117e0 call 41177a call 411701 * 2 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 411d31 call 4117e0 call 41177a call 411701 * 2 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 411c63 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 411cbf call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 411eb5 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 411f54 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 411f21 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 412081 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41210d call 4117e0 call 41177a call 411701 * 2 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41246a call 4117e0 call 41177a call 411701 * 2 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41218b call 4117e0 call 41177a call 411701 * 2 call 41218b call 4117e0 call 41177a call 411701 * 2 call 41185b call 41177a call 411701 call 41193a lstrlenA call 41193a call 411668 call 40134c call 418db9 call 411701 * 2 call 40131a
                                                      APIs
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                        • Part of subcall function 0041185B: lstrlenA.KERNEL32(00428E5C,?,00428E5C,?,00000000), ref: 0041186F
                                                        • Part of subcall function 0041185B: lstrcpyA.KERNEL32(00000000,?), ref: 004118A8
                                                        • Part of subcall function 0041185B: lstrcatA.KERNEL32(00000000,00000000), ref: 004118B4
                                                        • Part of subcall function 0041177A: lstrcpyA.KERNEL32(00000000,?,?,?,0041A98C,00000000,?,?,00428E5C,?,00000000), ref: 004117D3
                                                        • Part of subcall function 00411C63: GetProcessHeap.KERNEL32(00000000,00000104,00000000,00000000,?,Version: ,00425200), ref: 00411C70
                                                        • Part of subcall function 00411C63: HeapAlloc.KERNEL32(00000000), ref: 00411C77
                                                        • Part of subcall function 00411C63: GetLocalTime.KERNEL32(?), ref: 00411C84
                                                        • Part of subcall function 00411C63: wsprintfA.USER32 ref: 00411CB1
                                                        • Part of subcall function 004125CA: memset.MSVCRT ref: 004125F2
                                                        • Part of subcall function 004125CA: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00020119,?), ref: 00412612
                                                        • Part of subcall function 004125CA: RegQueryValueExA.KERNEL32(?,MachineGuid,00000000,00000000,00000000,000000FF), ref: 00412639
                                                        • Part of subcall function 004125CA: CharToOemA.USER32(00000000,?), ref: 00412659
                                                        • Part of subcall function 00412667: GetCurrentHwProfileA.ADVAPI32(?), ref: 00412674
                                                        • Part of subcall function 004117E0: lstrcpyA.KERNEL32(00000000,00000000), ref: 0041182C
                                                        • Part of subcall function 004117E0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041183A
                                                        • Part of subcall function 00411948: GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00411964
                                                        • Part of subcall function 00411948: GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004119A1
                                                        • Part of subcall function 00411948: GetProcessHeap.KERNEL32(00000000,00000104), ref: 00411A18
                                                        • Part of subcall function 00411948: HeapAlloc.KERNEL32(00000000), ref: 00411A1F
                                                      • GetCurrentProcessId.KERNEL32(00000000,?,Path: ,00000000,?,00428FE4,00000000,?,00000000,00000000,?,HWID: ,00000000,?,00428E48,00000000), ref: 00415497
                                                        • Part of subcall function 00413563: OpenProcess.KERNEL32(00000410,00000000,004154AA), ref: 00413576
                                                        • Part of subcall function 00413563: K32GetModuleFileNameExA.KERNEL32(00000000,00000000,?,00000104), ref: 00413596
                                                        • Part of subcall function 00413563: CloseHandle.KERNEL32(00000000), ref: 0041359F
                                                        • Part of subcall function 00411ADD: GetProcessHeap.KERNEL32(00000000,00000104), ref: 00411AF1
                                                        • Part of subcall function 00411ADD: HeapAlloc.KERNEL32(00000000), ref: 00411AF8
                                                        • Part of subcall function 004127AF: CoInitializeEx.OLE32(00000000,00000000,?,?,?,?,00428E48,00000000,?,00000000,00000000,?,Windows: ,00000000,?,00428FE4), ref: 004127D9
                                                        • Part of subcall function 004127AF: CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,00428E48,00000000,?), ref: 004127F1
                                                        • Part of subcall function 004127AF: CoCreateInstance.OLE32(0042AE78,00000000,00000001,0042ADA8,00000000,?,?,?,?,00428E48,00000000,?,00000000,00000000,?,Windows: ), ref: 0041280D
                                                        • Part of subcall function 004127AF: CoSetProxyBlanket.OLE32(00000000,0000000A,00000000,00000000,00000003,00000003,00000000,00000000,?,?,?,?,00428E48,00000000,?,00000000), ref: 00412855
                                                        • Part of subcall function 004129BF: CoInitializeEx.OLE32(00000000,00000000,?,?,?,Windows: ,00000000,?,00428FE4,00000000,?,Work Dir: In memory,00000000,?,00428E48,00000000), ref: 004129E9
                                                        • Part of subcall function 004129BF: CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,Windows: ,00000000,?,00428FE4), ref: 00412A01
                                                        • Part of subcall function 004129BF: CoCreateInstance.OLE32(0042AE78,00000000,00000001,0042ADA8,00000000,?,?,?,Windows: ,00000000,?,00428FE4,00000000,?), ref: 00412A1D
                                                        • Part of subcall function 004129BF: CoSetProxyBlanket.OLE32(00000000,0000000A,00000000,00000000,00000003,00000003,00000000,00000000,?,?,?,Windows: ,00000000,?,00428FE4,00000000), ref: 00412A65
                                                        • Part of subcall function 00411C21: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00415711,00000000,?,Computer Name: ,00000000,?,00428E48,00000000,?,00000000,00000000), ref: 00411C2D
                                                        • Part of subcall function 00411C21: HeapAlloc.KERNEL32(00000000,?,?,?,00415711,00000000,?,Computer Name: ,00000000,?,00428E48,00000000,?,00000000,00000000,?), ref: 00411C34
                                                        • Part of subcall function 00411C21: GetComputerNameA.KERNEL32(00000000,00000104), ref: 00411C4B
                                                        • Part of subcall function 00411BEC: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,0041A955), ref: 00411BF8
                                                        • Part of subcall function 00411BEC: HeapAlloc.KERNEL32(00000000,?,?,?,0041A955), ref: 00411BFF
                                                        • Part of subcall function 00411BEC: GetUserNameA.ADVAPI32(?,00000104), ref: 00411C16
                                                        • Part of subcall function 0041254A: CreateDCA.GDI32(00000000,00000000,00000000,?), ref: 0041255C
                                                        • Part of subcall function 0041254A: GetDeviceCaps.GDI32(?,00000008), ref: 0041256A
                                                        • Part of subcall function 0041254A: GetDeviceCaps.GDI32(?,0000000A), ref: 00412578
                                                        • Part of subcall function 0041254A: ReleaseDC.USER32(00000000,?), ref: 00412586
                                                        • Part of subcall function 0041254A: GetProcessHeap.KERNEL32(00000000,00000104), ref: 00412593
                                                        • Part of subcall function 0041254A: HeapAlloc.KERNEL32(00000000), ref: 0041259A
                                                        • Part of subcall function 0041254A: wsprintfA.USER32 ref: 004125B1
                                                        • Part of subcall function 00411D31: GetKeyboardLayoutList.USER32(00000000,00000000,00425200), ref: 00411D59
                                                        • Part of subcall function 00411D31: LocalAlloc.KERNEL32(00000040,?), ref: 00411D71
                                                        • Part of subcall function 00411D31: GetKeyboardLayoutList.USER32(?,00000000), ref: 00411D83
                                                        • Part of subcall function 00411D31: GetLocaleInfoA.KERNEL32(00000000,00000002,?,00000200), ref: 00411DD3
                                                        • Part of subcall function 00411D31: LocalFree.KERNEL32(00000000), ref: 00411E90
                                                        • Part of subcall function 00411CBF: GetProcessHeap.KERNEL32(00000000,00000104,00428E48,00000000,?,00000000,00000000,?,Computer Name: ,00000000,?,00428E48,00000000,?,00000000,00000000), ref: 00411CCF
                                                        • Part of subcall function 00411CBF: HeapAlloc.KERNEL32(00000000), ref: 00411CD6
                                                        • Part of subcall function 00411CBF: GetTimeZoneInformation.KERNEL32(?), ref: 00411CE9
                                                        • Part of subcall function 00411EB5: GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 00411EC9
                                                        • Part of subcall function 00411EB5: HeapAlloc.KERNEL32(00000000), ref: 00411ED0
                                                        • Part of subcall function 00411EB5: RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,00000000), ref: 00411EEF
                                                        • Part of subcall function 00411EB5: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,000000FF,000000FF), ref: 00411F0D
                                                        • Part of subcall function 00411F54: GetLogicalProcessorInformationEx.KERNELBASE(0000FFFF,00000000,00000000), ref: 00411F87
                                                        • Part of subcall function 00411F54: GetLastError.KERNEL32 ref: 00411F96
                                                        • Part of subcall function 00411F21: GetSystemInfo.KERNEL32(00000000), ref: 00411F2E
                                                        • Part of subcall function 00411F21: wsprintfA.USER32 ref: 00411F43
                                                        • Part of subcall function 00412081: GetProcessHeap.KERNEL32(00000000,00000104,?,00428E48,00000000,?,00000000,00000000,?,Windows: ,00000000,?,00428FE4,00000000,?,Work Dir: In memory), ref: 0041208E
                                                        • Part of subcall function 00412081: HeapAlloc.KERNEL32(00000000), ref: 00412095
                                                        • Part of subcall function 00412081: GlobalMemoryStatusEx.KERNEL32(00000040), ref: 004120B6
                                                        • Part of subcall function 00412081: __aulldiv.LIBCMT ref: 004120CE
                                                        • Part of subcall function 00412081: __aulldiv.LIBCMT ref: 004120DC
                                                        • Part of subcall function 00412081: wsprintfA.USER32 ref: 004120FF
                                                        • Part of subcall function 0041210D: EnumDisplayDevicesA.USER32(00000000,00000000,000001A8,00000001), ref: 00412148
                                                        • Part of subcall function 0041246A: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00412491
                                                        • Part of subcall function 0041246A: Process32First.KERNEL32(00000000,00000128), ref: 004124A4
                                                        • Part of subcall function 0041246A: Process32Next.KERNEL32(00000000,00000128), ref: 004124B8
                                                        • Part of subcall function 0041246A: CloseHandle.KERNEL32(00000000), ref: 00412525
                                                        • Part of subcall function 0041218B: RegOpenKeyExA.KERNEL32(00000000,00000000,00020019,00000000,00425200), ref: 004121DE
                                                        • Part of subcall function 0041218B: RegEnumKeyExA.KERNEL32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00412259
                                                        • Part of subcall function 0041218B: wsprintfA.USER32 ref: 0041228B
                                                        • Part of subcall function 0041218B: RegOpenKeyExA.KERNEL32(00000000,?,00000000,00020019,00000000), ref: 004122AC
                                                      • lstrlenA.KERNEL32(00000000,00000000,?,00428FE4,00000000,?,00000000,00000000,?,00000000,00000000,?,[Software],00000000,?,00428FE4), ref: 00415DE1
                                                        • Part of subcall function 00418DB9: _MSFOpenExW.MSPDB140-MSVCRT ref: 00418E6C
                                                        • Part of subcall function 00418DB9: CreateThread.KERNEL32(00000000,00000000,00418C65,?,00000000,00000000), ref: 00418E85
                                                        • Part of subcall function 00418DB9: WaitForSingleObject.KERNEL32(?,000003E8), ref: 00418E96
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$Process$Alloc$Open$Createwsprintf$Initializelstrcpy$InformationLocalName$BlanketCapsCloseCurrentDeviceEnumHandleInfoInstanceKeyboardLayoutListProcess32ProxyQuerySecurityTimeValue__aulldivlstrcatlstrlen$CharComputerDevicesDirectoryDisplayErrorFileFirstFreeGlobalLastLocaleLogicalMemoryModuleNextObjectProcessorProfileReleaseSingleSnapshotStatusSystemThreadToolhelp32UserVolumeWaitWindowsZonememset
                                                      • String ID: AV: $Computer Name: $Cores: $Date: $Display Resolution: $GUID: $HWID: $Install Date: $Keyboard Languages: $Local Time: $MachineID: $Path: $Processor: $RAM: $Threads: $TimeZone: $User Name: $Version: $VideoCard: $Windows: $Work Dir: In memory$[Hardware]$[Processes]$[Software]$information.txt
                                                      • API String ID: 4242084749-1014693891
                                                      • Opcode ID: ec29a3163d9d18987f0e179795c7a0416d16bd3ffa26116ace8d5c82db2c5aaf
                                                      • Instruction ID: 98b063b3ea0cf676e7d3c9db5d6b4e855844e07ef84fbbd767ca72325addcb2a
                                                      • Opcode Fuzzy Hash: ec29a3163d9d18987f0e179795c7a0416d16bd3ffa26116ace8d5c82db2c5aaf
                                                      • Instruction Fuzzy Hash: BC629172900118AACB15F7A1DD96DDE7379AF14305F5042AFF226B21B1EF346B88CE58

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                        • Part of subcall function 00412D64: GetSystemTime.KERNEL32(00000000,00425200), ref: 00412D8A
                                                        • Part of subcall function 0041185B: lstrlenA.KERNEL32(00428E5C,?,00428E5C,?,00000000), ref: 0041186F
                                                        • Part of subcall function 0041185B: lstrcpyA.KERNEL32(00000000,?), ref: 004118A8
                                                        • Part of subcall function 0041185B: lstrcatA.KERNEL32(00000000,00000000), ref: 004118B4
                                                        • Part of subcall function 004117E0: lstrcpyA.KERNEL32(00000000,00000000), ref: 0041182C
                                                        • Part of subcall function 004117E0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041183A
                                                        • Part of subcall function 0041177A: lstrcpyA.KERNEL32(00000000,?,?,?,0041A98C,00000000,?,?,00428E5C,?,00000000), ref: 004117D3
                                                      • CopyFileA.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,?,004251E8,?,00000000,00425200), ref: 00408450
                                                      • GetProcessHeap.KERNEL32(00000000,000F423F), ref: 004084C9
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 004084D0
                                                      • lstrlenA.KERNEL32(00000000,00000000), ref: 0040856A
                                                      • lstrcatA.KERNEL32(?), ref: 0040858F
                                                      • lstrcatA.KERNEL32(?,00000000), ref: 004085A1
                                                      • lstrcatA.KERNEL32(?,00428E50), ref: 004085AF
                                                      • lstrcatA.KERNEL32(?,00000000), ref: 004085C1
                                                      • lstrcatA.KERNEL32(?,00428E4C), ref: 004085CF
                                                      • lstrcatA.KERNEL32(?), ref: 004085DE
                                                      • lstrcatA.KERNEL32(?,00000000), ref: 004085F0
                                                      • lstrcatA.KERNEL32(?,00428E48), ref: 004085FE
                                                      • lstrcatA.KERNEL32(?), ref: 0040860D
                                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040861F
                                                      • lstrcatA.KERNEL32(?,00428E48), ref: 0040862D
                                                      • lstrcatA.KERNEL32(?), ref: 0040863C
                                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040864E
                                                      • lstrcatA.KERNEL32(?,00428E48), ref: 0040865C
                                                      • lstrcatA.KERNEL32(?,00428E48), ref: 0040866A
                                                      • lstrlenA.KERNEL32(?), ref: 00408688
                                                      • memset.MSVCRT ref: 004086D4
                                                      • DeleteFileA.KERNEL32(00000000), ref: 00408701
                                                        • Part of subcall function 004116B4: lstrcpyA.KERNEL32(?,?,?,?,004118C6,00000000), ref: 004116F4
                                                        • Part of subcall function 004135B9: memset.MSVCRT ref: 004135D4
                                                        • Part of subcall function 004135B9: OpenProcess.KERNEL32(00001001,00000000,?), ref: 0041368A
                                                        • Part of subcall function 004135B9: TerminateProcess.KERNEL32(00000000,00000000), ref: 004136A7
                                                        • Part of subcall function 004135B9: CloseHandle.KERNEL32(00000000), ref: 004136B3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$lstrcpy$Processlstrlen$FileHeapmemset$AllocateCloseCopyDeleteHandleOpenSystemTerminateTime
                                                      • String ID: passwords.txt
                                                      • API String ID: 1737540870-347816968
                                                      • Opcode ID: e7516f4a65ce10130fd093f07ba65f7fdb76d7e0e32bba32449652ac384407af
                                                      • Instruction ID: 4868cb4a0c5d8df9b0255056c1bbdf5f8baa826a61240bfbc382e0845978a72e
                                                      • Opcode Fuzzy Hash: e7516f4a65ce10130fd093f07ba65f7fdb76d7e0e32bba32449652ac384407af
                                                      • Instruction Fuzzy Hash: 00A11972900108AFDF05EBA1ED5AAED7B79FF15305F60502AF112B10B1EF3A5A44CB69

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2320 418fd9-419078 call 4218f0 call 411668 call 41a3b1 call 41a3e6 call 411715 * 2 2333 41907e-41908b 2320->2333 2334 4190b7-4190c7 2333->2334 2335 41908d-4190b5 call 411648 * 2 2333->2335 2337 4190cd-4190da 2334->2337 2335->2333 2339 419106-419116 2337->2339 2340 4190dc-419104 call 411648 * 2 2337->2340 2341 41911c-419129 2339->2341 2340->2337 2344 419147-419157 2341->2344 2345 41912b-419145 call 41a3e6 2341->2345 2349 41915d-41916a 2344->2349 2345->2341 2353 419188-419198 2349->2353 2354 41916c-419186 call 41a410 2349->2354 2356 41919e-4191ab 2353->2356 2354->2349 2358 4191c9-4191d9 2356->2358 2359 4191ad-4191c7 call 41a461 2356->2359 2360 4191df-4191ec 2358->2360 2359->2356 2362 41920a-419233 call 402727 call 41b050 call 40101e 2360->2362 2363 4191ee-419208 call 41a496 2360->2363 2373 4195c9-4197a4 call 412d64 call 41177a call 411701 call 411668 call 41185b call 4117e0 call 41177a call 411701 * 2 call 41193a CreateDirectoryA call 40134c call 418167 call 41a4cb call 418c01 call 41177a * 2 call 4116b4 call 41185b call 41177a call 411701 call 4117e0 call 41177a call 411701 call 41193a InternetOpenA call 41193a InternetOpenA call 4116b4 call 402278 call 411668 call 411948 call 4116b4 call 4043fa call 414f8c 2362->2373 2374 419239-41959c call 411668 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41193a call 4138ba 2362->2374 2363->2360 2503 4197a6 2373->2503 2504 4197ad-419909 call 411668 call 40134c call 4058c4 call 4148a0 call 411668 call 40134c call 4058c4 call 4145d9 call 411668 call 40134c call 4058c4 call 4147a4 call 40134c call 4151e4 call 4116b4 call 41193a call 411668 call 404ad5 call 40134c call 40f99f 2373->2504 2624 4195be-4195c4 call 411701 2374->2624 2625 41959e-4195a7 call 4216c8 2374->2625 2503->2504 2585 41990e-419918 2504->2585 2587 419985-419989 2585->2587 2588 41991a-41997f call 411668 call 40134c call 4058c4 call 41497b call 40134c call 401f1f 2585->2588 2591 4199f6-419a65 call 411668 call 40134c call 4058c4 call 414ab5 call 40134c call 416c95 2587->2591 2592 41998b-4199f0 call 411668 call 40134c call 4058c4 call 4144c3 call 40134c call 414411 2587->2592 2588->2587 2640 419a93-419a97 2591->2640 2641 419a67-419a90 call 40134c call 416f6b call 40134c call 418f44 2591->2641 2592->2591 2624->2373 2631 4195ac-4195b4 2625->2631 2631->2624 2642 419a99-419aac call 40134c call 417659 2640->2642 2643 419aaf-419ab3 2640->2643 2641->2640 2642->2643 2646 419ab5-419ac8 call 40134c call 417b07 2643->2646 2647 419acb-419acf 2643->2647 2646->2647 2652 419ad1-419ae4 call 40134c call 417c93 2647->2652 2653 419ae7-419aea 2647->2653 2652->2653 2654 419b06-419b0a 2653->2654 2655 419aec-419af3 2653->2655 2663 419b24-419b28 2654->2663 2664 419b0c-419b21 call 40134c call 413160 2654->2664 2660 419b02 2655->2660 2661 419af5-419b04 Sleep 2655->2661 2660->2654 2661->2653 2673 419b95-419bd3 call 411668 call 40134c call 4058c4 call 411701 call 40101e 2663->2673 2674 419b2a-419b8f call 411668 call 40134c call 4058c4 call 4144c3 call 40134c call 414411 2663->2674 2664->2663 2701 419bd9-419f3c call 411668 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41193a call 4138ba 2673->2701 2702 41a12b-41a18f call 41193a call 413878 call 40134c call 41a508 call 411701 * 2 2673->2702 2674->2673 2871 41a120-41a126 call 411701 2701->2871 2872 419f42-41a11b call 42175f call 411668 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 411668 call 4116b4 * 3 call 404e03 call 411701 * 2 2701->2872 2730 41a195-41a1a2 2702->2730 2732 41a1c0-41a1e6 2730->2732 2733 41a1a4-41a1be call 4143df 2730->2733 2736 41a1ec-41a1f9 2732->2736 2733->2730 2739 41a217-41a23d 2736->2739 2740 41a1fb-41a215 call 416c63 2736->2740 2743 41a243-41a250 2739->2743 2740->2736 2746 41a252-41a26c call 41a43a 2743->2746 2747 41a26e-41a294 2743->2747 2746->2743 2749 41a29a-41a2a7 2747->2749 2752 41a2c5-41a2eb 2749->2752 2753 41a2a9-41a2c3 call 418c01 2749->2753 2756 41a2f1-41a2fe 2752->2756 2753->2749 2759 41a300-41a328 call 411701 * 2 2756->2759 2760 41a32a-41a350 2756->2760 2759->2756 2764 41a356-41a363 2760->2764 2765 41a365-41a38d call 411701 * 2 2764->2765 2766 41a38f-41a3b0 call 418c01 call 40131a call 411701 2764->2766 2765->2764 2871->2702 2872->2871
                                                      APIs
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                        • Part of subcall function 00411715: lstrlenA.KERNEL32(?,?,?,00419018,00425200,00425200,?,?,?,0041ABB6), ref: 0041171F
                                                        • Part of subcall function 00411715: lstrcpyA.KERNEL32(0041ABB6,00000000,?,00419018,00425200,00425200), ref: 0041176D
                                                        • Part of subcall function 0041185B: lstrlenA.KERNEL32(00428E5C,?,00428E5C,?,00000000), ref: 0041186F
                                                        • Part of subcall function 0041185B: lstrcpyA.KERNEL32(00000000,?), ref: 004118A8
                                                        • Part of subcall function 0041185B: lstrcatA.KERNEL32(00000000,00000000), ref: 004118B4
                                                        • Part of subcall function 0041177A: lstrcpyA.KERNEL32(00000000,?,?,?,0041A98C,00000000,?,?,00428E5C,?,00000000), ref: 004117D3
                                                        • Part of subcall function 004138BA: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 004138F5
                                                        • Part of subcall function 004138BA: Process32First.KERNEL32(00429888,00000128), ref: 00413908
                                                        • Part of subcall function 004138BA: Process32Next.KERNEL32(00429888,00000128), ref: 0041391C
                                                        • Part of subcall function 004138BA: StrCmpCA.SHLWAPI(?,0042988C), ref: 00413930
                                                        • Part of subcall function 004138BA: FindCloseChangeNotification.KERNEL32(00429888), ref: 00413943
                                                      • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,?,?,?,00425200,00000000), ref: 00419657
                                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041972D
                                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00419747
                                                        • Part of subcall function 004116B4: lstrcpyA.KERNEL32(?,?,?,?,004118C6,00000000), ref: 004116F4
                                                        • Part of subcall function 00411948: GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00411964
                                                        • Part of subcall function 00411948: GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004119A1
                                                        • Part of subcall function 00411948: GetProcessHeap.KERNEL32(00000000,00000104), ref: 00411A18
                                                        • Part of subcall function 00411948: HeapAlloc.KERNEL32(00000000), ref: 00411A1F
                                                        • Part of subcall function 004043FA: InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404492
                                                        • Part of subcall function 004043FA: StrCmpCA.SHLWAPI(?), ref: 004044B2
                                                        • Part of subcall function 00414F8C: StrCmpCA.SHLWAPI(00000000,block), ref: 00414FB1
                                                        • Part of subcall function 00414F8C: ExitProcess.KERNEL32 ref: 00414FBD
                                                        • Part of subcall function 0040F99F: StrCmpCA.SHLWAPI(00000000,?,?), ref: 0040F9EF
                                                        • Part of subcall function 0040F99F: StrCmpCA.SHLWAPI(00000000,?,?), ref: 0040FA75
                                                        • Part of subcall function 004058C4: InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040595F
                                                        • Part of subcall function 004058C4: StrCmpCA.SHLWAPI(?), ref: 00405975
                                                        • Part of subcall function 0041497B: strtok_s.MSVCRT ref: 004149A3
                                                        • Part of subcall function 0041497B: strtok_s.MSVCRT ref: 00414A94
                                                        • Part of subcall function 00417B07: lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00417B40
                                                        • Part of subcall function 00417B07: lstrcatA.KERNEL32(?), ref: 00417B5E
                                                      • Sleep.KERNEL32(000003E8), ref: 00419AFA
                                                        • Part of subcall function 00417C93: memset.MSVCRT ref: 00417CAA
                                                        • Part of subcall function 00417C93: lstrcatA.KERNEL32(?,00000000), ref: 00417CD1
                                                        • Part of subcall function 00417C93: lstrcatA.KERNEL32(?,\.azure\), ref: 00417CEE
                                                        • Part of subcall function 00417C93: memset.MSVCRT ref: 00417D2E
                                                        • Part of subcall function 00417C93: lstrcatA.KERNEL32(?,00000000), ref: 00417D55
                                                        • Part of subcall function 00417C93: lstrcatA.KERNEL32(?,\.aws\), ref: 00417D72
                                                        • Part of subcall function 00417C93: memset.MSVCRT ref: 00417DB2
                                                        • Part of subcall function 00417C93: lstrcatA.KERNEL32(?,00000000), ref: 00417DD9
                                                        • Part of subcall function 00417C93: lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00417DF6
                                                        • Part of subcall function 00404E03: lstrlenA.KERNEL32(00000000), ref: 00404E8B
                                                        • Part of subcall function 00404E03: StrCmpCA.SHLWAPI(?,00425200,00425200,00425200,00425200), ref: 00404EEF
                                                        • Part of subcall function 00404E03: InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404F17
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$InternetOpenlstrcpy$lstrlenmemset$CreateDirectoryHeapProcessProcess32strtok_s$AllocChangeCloseExitFindFirstInformationNextNotificationSleepSnapshotToolhelp32VolumeWindows
                                                      • String ID: .exe$2$2$_DEBUG.zip$arp$d$d$d$d$d$d$dabl$http://$org$tea
                                                      • API String ID: 4021577771-4025179836
                                                      • Opcode ID: d8ddd20c65dbe4accbe59cdc2a04e807221df0d548ce8610666dd4a4d36cae5e
                                                      • Instruction ID: 114828df09490f9f1d13115ca2c7a84a7d1e175cc6150afb538a57f6698be508
                                                      • Opcode Fuzzy Hash: d8ddd20c65dbe4accbe59cdc2a04e807221df0d548ce8610666dd4a4d36cae5e
                                                      • Instruction Fuzzy Hash: 93B22F71D041289ADB14FB61DC96ADDB778AB11304F5440EAE50EA21A1DF3C6FC8CF69

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 2933 408741-40875d call 4118f6 2936 40876e-408781 call 4118f6 2933->2936 2937 40875f-40876c call 411715 2933->2937 2943 408792-4087a5 call 4118f6 2936->2943 2944 408783-408790 call 411715 2936->2944 2942 4087cc-408867 call 411668 call 412d64 call 41185b call 4117e0 call 41185b call 4117e0 call 41177a call 411701 * 5 2937->2942 2982 40886c-40886f 2942->2982 2943->2942 2952 4087a7-4087c7 call 411701 * 3 call 40131a 2943->2952 2944->2942 2970 408dd8-408dd9 2952->2970 2983 408871-40888d call 41193a * 2 CopyFileA 2982->2983 2984 4088ab-4088bf call 411668 2982->2984 2996 4088a7 2983->2996 2997 40888f-4088a9 call 4116b4 call 4135b9 2983->2997 2989 4088c5-408966 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 4117e0 call 41177a call 411701 call 41185b call 41177a call 411701 2984->2989 2990 40896b-408a4c call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 4117e0 call 41177a call 411701 call 41185b call 41177a call 411701 call 4117e0 call 41185b call 41177a call 411701 * 2 2984->2990 3049 408a51-408a68 call 41193a 2989->3049 2990->3049 2996->2984 2997->2982 3057 408d89-408d9b call 41193a DeleteFileA call 4118d5 3049->3057 3058 408a6e-408a8a 3049->3058 3070 408da0-408dd3 call 4118d5 call 411701 * 5 call 40131a 3057->3070 3065 408a90-408aa4 GetProcessHeap RtlAllocateHeap 3058->3065 3066 408d75-408d88 3058->3066 3069 408aa7-408ab4 3065->3069 3066->3057 3076 408d11-408d1d lstrlenA 3069->3076 3077 408aba-408b50 call 411668 * 6 call 4118f6 3069->3077 3070->2970 3079 408d65-408d72 memset 3076->3079 3080 408d1f-408d4f lstrlenA call 4116b4 call 40134c call 418db9 3076->3080 3118 408b62-408b6b call 411715 3077->3118 3119 408b52-408b60 call 411715 3077->3119 3079->3066 3097 408d54-408d60 call 411701 3080->3097 3097->3079 3123 408b70-408b82 call 4118f6 3118->3123 3119->3123 3126 408b94-408b9d call 411715 3123->3126 3127 408b84-408b92 call 411715 3123->3127 3131 408ba2-408bb2 call 411927 3126->3131 3127->3131 3134 408bc1-408d0c call 41193a lstrcatA * 2 call 41193a lstrcatA * 2 call 41193a lstrcatA * 2 call 41193a lstrcatA * 2 call 41193a lstrcatA * 2 call 41193a lstrcatA * 2 call 408093 call 41193a lstrcatA call 411701 lstrcatA call 411701 * 6 3131->3134 3135 408bb4-408bbc call 411715 3131->3135 3134->3069 3135->3134
                                                      APIs
                                                        • Part of subcall function 004118F6: StrCmpCA.SHLWAPI(?,?), ref: 00411913
                                                      • GetProcessHeap.KERNEL32(00000000,000F423F), ref: 00408A97
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00408A9E
                                                      • CopyFileA.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,?,004251E8,?,00000000,00425200), ref: 00408885
                                                        • Part of subcall function 00411715: lstrlenA.KERNEL32(?,?,?,00419018,00425200,00425200,?,?,?,0041ABB6), ref: 0041171F
                                                        • Part of subcall function 00411715: lstrcpyA.KERNEL32(0041ABB6,00000000,?,00419018,00425200,00425200), ref: 0041176D
                                                        • Part of subcall function 004117E0: lstrcpyA.KERNEL32(00000000,00000000), ref: 0041182C
                                                        • Part of subcall function 004117E0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041183A
                                                        • Part of subcall function 0041177A: lstrcpyA.KERNEL32(00000000,?,?,?,0041A98C,00000000,?,?,00428E5C,?,00000000), ref: 004117D3
                                                        • Part of subcall function 0041185B: lstrlenA.KERNEL32(00428E5C,?,00428E5C,?,00000000), ref: 0041186F
                                                        • Part of subcall function 0041185B: lstrcpyA.KERNEL32(00000000,?), ref: 004118A8
                                                        • Part of subcall function 0041185B: lstrcatA.KERNEL32(00000000,00000000), ref: 004118B4
                                                      • lstrcatA.KERNEL32(?,00000000,00000000,00428E58,00428E58,00000000), ref: 00408BCD
                                                      • lstrcatA.KERNEL32(?,00428E54), ref: 00408BDB
                                                      • lstrcatA.KERNEL32(?,00000000), ref: 00408BED
                                                      • lstrcatA.KERNEL32(?,00428E54), ref: 00408BFB
                                                      • lstrcatA.KERNEL32(?,00000000), ref: 00408C0D
                                                      • lstrcatA.KERNEL32(?,00428E54), ref: 00408C1B
                                                      • lstrcatA.KERNEL32(?,00000000), ref: 00408C2D
                                                      • lstrcatA.KERNEL32(?,00428E54), ref: 00408C3B
                                                      • lstrcatA.KERNEL32(?,00000000), ref: 00408C4D
                                                      • lstrcatA.KERNEL32(?,00428E54), ref: 00408C5B
                                                      • lstrcatA.KERNEL32(?,00000000), ref: 00408C6D
                                                      • lstrcatA.KERNEL32(?,00428E54), ref: 00408C7B
                                                      • lstrcatA.KERNEL32(?,00000000), ref: 00408CBD
                                                      • lstrcatA.KERNEL32(?,00428E48), ref: 00408CD6
                                                      • lstrlenA.KERNEL32(?), ref: 00408D14
                                                      • lstrlenA.KERNEL32(?), ref: 00408D22
                                                      • memset.MSVCRT ref: 00408D6D
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                      • DeleteFileA.KERNEL32(00000000), ref: 00408D92
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessmemset
                                                      • String ID:
                                                      • API String ID: 1498849721-0
                                                      • Opcode ID: 9e96b593e49dfbaf82baf5f3f7b14edd2bd44551348f714d62c2555fbf218532
                                                      • Instruction ID: 75b67620860664da6d1f04eed94d7d10b36c4f27a8908ca0f5e9c5d632b00ffa
                                                      • Opcode Fuzzy Hash: 9e96b593e49dfbaf82baf5f3f7b14edd2bd44551348f714d62c2555fbf218532
                                                      • Instruction Fuzzy Hash: 02021D71900109AADB05FBA1ED56EEE7779EF11309F50406AF216B10F1EF395A88CB68

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 3169 42095b-420975 3170 420981-42098d 3169->3170 3171 420977-42097c 3169->3171 3173 420999-4209a9 3170->3173 3174 42098f-420994 3170->3174 3172 4213c9-4213cb 3171->3172 3175 4209bb-4209d4 lstrcpyA 3173->3175 3176 4209ab-4209af 3173->3176 3174->3172 3178 4209e0-4209e6 3175->3178 3179 4209d6-4209db 3175->3179 3176->3175 3177 4209b1 3176->3177 3177->3175 3180 4209ec-4209f7 3178->3180 3179->3172 3181 4209f9-420a05 3180->3181 3182 420a1f-420a31 3180->3182 3183 420a10-420a1d 3181->3183 3184 420a07-420a0d 3181->3184 3185 420a33-420a4b strlen 3182->3185 3186 420a59 3182->3186 3183->3180 3184->3183 3185->3186 3187 420a4d-420a57 3185->3187 3188 420a60-420a76 3186->3188 3187->3188 3189 420a78-420a8a call 41f930 3188->3189 3190 420a8c 3188->3190 3189->3190 3192 420a90-420a94 3189->3192 3190->3192 3194 420a96-420aa7 call 4201a9 3192->3194 3195 420aa9-420aad 3192->3195 3206 420b01-420b05 3194->3206 3197 420ac5-420ac9 3195->3197 3198 420aaf-420ac3 call 420255 3195->3198 3199 420ae1-420ae5 3197->3199 3200 420acb-420adf call 4203dd 3197->3200 3198->3206 3204 420af7-420afc 3199->3204 3205 420ae7-420af5 call 4204e9 3199->3205 3200->3206 3204->3172 3205->3206 3210 420b07-420b0a 3206->3210 3211 420b0f-420b55 lstrcpyA * 2 lstrlenA 3206->3211 3210->3172 3213 420b76-420c0b lstrcpyA 3211->3213 3214 420b57-420b70 lstrcatA 3211->3214 3215 420c1f-420c3c 3213->3215 3216 420c0d-420c13 3213->3216 3214->3213 3217 420c61 3215->3217 3218 420c3e-420c48 3215->3218 3216->3215 3219 420c15-420c18 3216->3219 3221 420c68-420e54 call 421b40 * 9 memcpy call 41e919 3217->3221 3218->3217 3220 420c4a-420c5f 3218->3220 3219->3215 3220->3221 3242 420e56-420e66 call 42070a 3221->3242 3243 420e6b-420e97 3221->3243 3242->3172 3245 420eb2-420ee7 3243->3245 3246 420e99-420ead call 42070a 3243->3246 3247 420ef6-420efd 3245->3247 3246->3172 3250 420f29-420f32 3247->3250 3251 420eff-420f0a 3247->3251 3254 420f34-420f4a GetTickCount GetDesktopWindow srand 3250->3254 3255 420f4b-420f52 3250->3255 3251->3250 3253 420f0c-420f27 call 41f864 3251->3253 3253->3247 3254->3255 3257 420f61-420f68 3255->3257 3259 420f83-420f9b 3257->3259 3260 420f6a-420f81 rand 3257->3260 3263 420faa-420fb1 3259->3263 3260->3257 3264 420fb3-420fda call 41f907 3263->3264 3265 420fdc-420fe5 3263->3265 3264->3263 3267 420fe7-420fed 3265->3267 3268 421018-421025 3265->3268 3267->3268 3270 420fef-421015 call 41ff44 3267->3270 3271 421027-42102d 3268->3271 3272 42103b 3268->3272 3270->3268 3271->3272 3275 42102f-421039 3271->3275 3276 421042-421057 3272->3276 3275->3276 3278 421076-42107c 3276->3278 3279 421059-42105d 3276->3279 3280 421094-42109a 3278->3280 3281 42107e-421082 3278->3281 3279->3278 3282 42105f-42106c call 420788 3279->3282 3284 4210a9-4210e6 call 42070a 3280->3284 3285 42109c-4210a2 3280->3285 3281->3280 3283 421084-421092 call 4208e6 3281->3283 3289 421071-421074 3282->3289 3283->3284 3292 4210f6-4210fa 3284->3292 3293 4210e8-4210f1 3284->3293 3285->3284 3289->3284 3294 421106-42116b 3292->3294 3295 4210fc-421101 3292->3295 3293->3172 3296 421171-42117a 3294->3296 3297 421247-421254 3294->3297 3295->3172 3300 421188-42119d 3296->3300 3301 42117c-421182 3296->3301 3298 421260-421264 3297->3298 3299 421256-42125b 3297->3299 3304 421266-42126f 3298->3304 3305 42127b-4212a2 call 41ecec 3298->3305 3299->3172 3302 4211b0-4211de call 4200c8 3300->3302 3303 42119f-4211a9 3300->3303 3301->3297 3301->3300 3311 4211e0-4211e5 3302->3311 3312 4211ea-421211 call 41e919 3302->3312 3303->3302 3304->3305 3307 421271-421276 3304->3307 3313 4212a4-4212a9 3305->3313 3314 4212ae-4212ca 3305->3314 3307->3172 3311->3172 3320 421213-421218 3312->3320 3321 42121d-421236 call 4200c8 3312->3321 3313->3172 3316 4212d1-4212db 3314->3316 3318 4212eb-421370 call 412b6b memcpy call 412b6b memcpy 3316->3318 3319 4212dd-4212e6 3316->3319 3330 421372-421381 3318->3330 3331 421383-42138c 3318->3331 3319->3172 3320->3172 3327 421242 3321->3327 3328 421238-42123d 3321->3328 3327->3316 3328->3172 3332 4213c7 3330->3332 3333 421392-42139f 3331->3333 3332->3172 3334 4213a1-4213b3 3333->3334 3335 4213b5-4213c1 3333->3335 3334->3333 3335->3332
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: T$U
                                                      • API String ID: 0-2115836835
                                                      • Opcode ID: 10f69da23589928bea78b6bdb87915afbf723c228a04615c940d6145975852ec
                                                      • Instruction ID: 4e7ab3bbaac243ee1ce136935939dafd3e3fd9ddb02e4ea4b8407d5d40478ec4
                                                      • Opcode Fuzzy Hash: 10f69da23589928bea78b6bdb87915afbf723c228a04615c940d6145975852ec
                                                      • Instruction Fuzzy Hash: 626218B4A042A9CFDB20CF54D884BE9B7B4AF14305F5440DBEA09A7252D7389E89CF59

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 3336 4043fa-4044ba call 4116b4 call 40430f call 411668 * 5 call 41193a InternetOpenA StrCmpCA 3353 4044c3-4044c7 3336->3353 3354 4044bc 3336->3354 3355 404a55-404ad4 InternetCloseHandle call 412bcb * 2 call 4116b4 call 411701 * 9 3353->3355 3356 4044cd-40463f call 412d64 call 4117e0 call 41177a call 411701 * 2 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 4117e0 call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 4117e0 call 41177a call 411701 * 2 InternetConnectA 3353->3356 3354->3353 3356->3355 3431 404645-404649 3356->3431 3432 404657 3431->3432 3433 40464b-404655 3431->3433 3434 404661-40468f HttpOpenRequestA 3432->3434 3433->3434 3435 404695-404699 3434->3435 3436 404a49-404a4f InternetCloseHandle 3434->3436 3437 4046c0-4049b8 call 41185b call 41177a call 411701 call 4117e0 call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 4117e0 call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 4117e0 call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 41185b call 41177a call 411701 call 4117e0 call 41177a call 411701 call 411668 call 4117e0 * 2 call 41177a call 411701 * 2 call 41193a lstrlenA call 41193a * 2 lstrlenA call 41193a HttpSendRequestA 3435->3437 3438 40469b-4046ba InternetSetOptionA 3435->3438 3436->3355 3549 4049bf-4049e8 InternetReadFile 3437->3549 3438->3437 3550 4049f3-404a44 InternetCloseHandle call 411701 3549->3550 3551 4049ea-4049f1 3549->3551 3550->3436 3551->3550 3552 4049f5-404a33 call 41185b call 41177a call 411701 3551->3552 3552->3549
                                                      APIs
                                                        • Part of subcall function 004116B4: lstrcpyA.KERNEL32(?,?,?,?,004118C6,00000000), ref: 004116F4
                                                        • Part of subcall function 0040430F: ??_U@YAPAXI@Z.MSVCRT ref: 00404373
                                                        • Part of subcall function 0040430F: ??_U@YAPAXI@Z.MSVCRT ref: 00404387
                                                        • Part of subcall function 0040430F: ??_U@YAPAXI@Z.MSVCRT ref: 0040439B
                                                        • Part of subcall function 0040430F: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 004043B9
                                                        • Part of subcall function 0040430F: InternetCrackUrlA.WININET(00000000,00000000), ref: 004043C9
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404492
                                                      • StrCmpCA.SHLWAPI(?), ref: 004044B2
                                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 0040462C
                                                      • HttpOpenRequestA.WININET(00000000,?,00000000,00000000,00400100,00000000), ref: 00404682
                                                      • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004046BA
                                                        • Part of subcall function 0041185B: lstrlenA.KERNEL32(00428E5C,?,00428E5C,?,00000000), ref: 0041186F
                                                        • Part of subcall function 0041185B: lstrcpyA.KERNEL32(00000000,?), ref: 004118A8
                                                        • Part of subcall function 0041185B: lstrcatA.KERNEL32(00000000,00000000), ref: 004118B4
                                                        • Part of subcall function 0041177A: lstrcpyA.KERNEL32(00000000,?,?,?,0041A98C,00000000,?,?,00428E5C,?,00000000), ref: 004117D3
                                                        • Part of subcall function 004117E0: lstrcpyA.KERNEL32(00000000,00000000), ref: 0041182C
                                                        • Part of subcall function 004117E0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041183A
                                                      • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00425200,00000000,?,?,00000000,?,",00000000,?,build_id), ref: 0040497C
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404998
                                                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 004049AB
                                                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 004049D5
                                                      • InternetCloseHandle.WININET(00000000), ref: 00404A38
                                                      • InternetCloseHandle.WININET(00000000), ref: 00404A4F
                                                      • InternetCloseHandle.WININET(00000000), ref: 00404A58
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$lstrcpy$lstrlen$CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileOptionReadSend
                                                      • String ID: "$------$build_id$hwid
                                                      • API String ID: 3006978581-50533134
                                                      • Opcode ID: cceb3a196459d883b403675918582489495ab2fed22875715751cb834377af79
                                                      • Instruction ID: 067cb1f7702ceabbac9578a1173a021fc80b9e748851ef74f8b32e742b117f95
                                                      • Opcode Fuzzy Hash: cceb3a196459d883b403675918582489495ab2fed22875715751cb834377af79
                                                      • Instruction Fuzzy Hash: 22124E71900218AADB15EBA1DD92FDEB379BF15305F5000AAF216B21E1DF386B88CF54

                                                      Control-flow Graph

                                                      APIs
                                                      • CoInitializeEx.OLE32(00000000,00000000,?,?,?,?,00428E48,00000000,?,00000000,00000000,?,Windows: ,00000000,?,00428FE4), ref: 004127D9
                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,00428E48,00000000,?), ref: 004127F1
                                                      • CoCreateInstance.OLE32(0042AE78,00000000,00000001,0042ADA8,00000000,?,?,?,?,00428E48,00000000,?,00000000,00000000,?,Windows: ), ref: 0041280D
                                                      • CoSetProxyBlanket.OLE32(00000000,0000000A,00000000,00000000,00000003,00000003,00000000,00000000,?,?,?,?,00428E48,00000000,?,00000000), ref: 00412855
                                                      • VariantInit.OLEAUT32(?), ref: 004128C1
                                                      • FileTimeToSystemTime.KERNEL32(?,00000000,?,?,?,?,00428E48,00000000,?,00000000,00000000,?,Windows: ,00000000), ref: 004128FA
                                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00428E48,00000000,?,00000000,00000000,?,Windows: ,00000000), ref: 00412907
                                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,00428E48,00000000,?,00000000,00000000,?,Windows: ,00000000), ref: 0041290E
                                                      • wsprintfA.USER32 ref: 0041293D
                                                      • VariantClear.OLEAUT32(?), ref: 00412955
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: HeapInitializeTimeVariant$AllocBlanketClearCreateFileInitInstanceProcessProxySecuritySystemwsprintf
                                                      • String ID: %d/%d/%d %d:%d:%d$InstallDate$ROOT\CIMV2$Select * From Win32_OperatingSystem$Unknown$WQL
                                                      • API String ID: 1977436990-271508173
                                                      • Opcode ID: ba33cfd2da918b761e9130eb7da6f96fb9872cbbfcfe80a5cabb4ca5af105773
                                                      • Instruction ID: b87b7ae96d8d1a7714e06012ec36ed585f0f60198b44980e8310200412a3d949
                                                      • Opcode Fuzzy Hash: ba33cfd2da918b761e9130eb7da6f96fb9872cbbfcfe80a5cabb4ca5af105773
                                                      • Instruction Fuzzy Hash: B561F671A40218BFDB10DB94DD46FEDBBB8BB08B11F604116F611FA1D0C7B8A991CB69
                                                      APIs
                                                      Strings
                                                      • Ici Radio-Canada Tl (stylized as ICI Radio-Canada Tl, and sometimes abbreviated as Ici Tl) is a Canadian French-language fre, xrefs: 0040428E, 004042FE
                                                      • Niedert is an Ortsgemeinde , xrefs: 00404283, 004042F3
                                                      • Chrysorabdia bivitta is a moth of the subfamily Arctiinae first described by Francis Walker in 1856., xrefs: 0040426D, 004042DD
                                                      • Organ perforation is a complete penetration of the wall of a hollow organ in the body, such as the gastrointestinal tract in the c, xrefs: 00404278, 004042E8
                                                      • GAS5 noncoding RNA, which accumulates in growth arrested cells, acts as a decoy hormone response element for the glucocorticoid re, xrefs: 004042D0
                                                      • The KLW SE10B is a low-emissions diesel switcher locomotive built by Knoxville Locomotive Works. It is powered by a single MTU Ser, xrefs: 004042C5
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: wcslen$AllocLocalstrlen
                                                      • String ID: Chrysorabdia bivitta is a moth of the subfamily Arctiinae first described by Francis Walker in 1856.$GAS5 noncoding RNA, which accumulates in growth arrested cells, acts as a decoy hormone response element for the glucocorticoid re$Ici Radio-Canada Tl (stylized as ICI Radio-Canada Tl, and sometimes abbreviated as Ici Tl) is a Canadian French-language fre$Niedert is an Ortsgemeinde $Organ perforation is a complete penetration of the wall of a hollow organ in the body, such as the gastrointestinal tract in the c$The KLW SE10B is a low-emissions diesel switcher locomotive built by Knoxville Locomotive Works. It is powered by a single MTU Ser
                                                      • API String ID: 224765317-2971033767
                                                      • Opcode ID: b2908c616810051979d5b7c1935cb1d71aeefb77bac9279ab48edbe17b9693c0
                                                      • Instruction ID: 15c8a1cfb45bc9c132fd9fd4faededd5fc4f4c62c30039555f1f88a1b54c1e58
                                                      • Opcode Fuzzy Hash: b2908c616810051979d5b7c1935cb1d71aeefb77bac9279ab48edbe17b9693c0
                                                      • Instruction Fuzzy Hash: 9A213071785268AFDB04EBE9F8C7B5CBBE4EFD4714FA0006FF40496191DEB869408619
                                                      APIs
                                                        • Part of subcall function 004116B4: lstrcpyA.KERNEL32(?,?,?,?,004118C6,00000000), ref: 004116F4
                                                        • Part of subcall function 0040430F: ??_U@YAPAXI@Z.MSVCRT ref: 00404373
                                                        • Part of subcall function 0040430F: ??_U@YAPAXI@Z.MSVCRT ref: 00404387
                                                        • Part of subcall function 0040430F: ??_U@YAPAXI@Z.MSVCRT ref: 0040439B
                                                        • Part of subcall function 0040430F: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 004043B9
                                                        • Part of subcall function 0040430F: InternetCrackUrlA.WININET(00000000,00000000), ref: 004043C9
                                                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00404B22
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00404B29
                                                      • InternetOpenA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00404B54
                                                      • StrCmpCA.SHLWAPI(?), ref: 00404B6D
                                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404BA1
                                                      • HttpOpenRequestA.WININET(00000000,GET,?,00000000,00000000,00400100,00000000), ref: 00404C00
                                                      • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 00404C38
                                                      • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00404C49
                                                      • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 00404C74
                                                      • InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 00404D05
                                                      • InternetCloseHandle.WININET(00000000), ref: 00404D9B
                                                      • InternetCloseHandle.WININET(00000000), ref: 00404DA7
                                                      • InternetCloseHandle.WININET(00000000), ref: 00404DC5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$CloseHandleHttp$HeapOpenRequest$AllocateConnectCrackFileInfoOptionProcessQueryReadSendlstrcpylstrlen
                                                      • String ID: GET
                                                      • API String ID: 442264750-1805413626
                                                      • Opcode ID: f16c31e6c77223db1b221cad6f523a7c8a9ce9fa98b564ab69779ee6bb960051
                                                      • Instruction ID: d037288fe89579f4ab5843d1a5928f681561e61fb867290b5a494df79b11f7d7
                                                      • Opcode Fuzzy Hash: f16c31e6c77223db1b221cad6f523a7c8a9ce9fa98b564ab69779ee6bb960051
                                                      • Instruction Fuzzy Hash: 769115B4900228AFDF20DF50DC45BEEB7B5BB45306F1040EAE609B6291DB796AC4DF49
                                                      APIs
                                                        • Part of subcall function 004116B4: lstrcpyA.KERNEL32(?,?,?,?,004118C6,00000000), ref: 004116F4
                                                        • Part of subcall function 0040430F: ??_U@YAPAXI@Z.MSVCRT ref: 00404373
                                                        • Part of subcall function 0040430F: ??_U@YAPAXI@Z.MSVCRT ref: 00404387
                                                        • Part of subcall function 0040430F: ??_U@YAPAXI@Z.MSVCRT ref: 0040439B
                                                        • Part of subcall function 0040430F: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 004043B9
                                                        • Part of subcall function 0040430F: InternetCrackUrlA.WININET(00000000,00000000), ref: 004043C9
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00406373
                                                      • StrCmpCA.SHLWAPI(?), ref: 00406390
                                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 004063BE
                                                      • HttpOpenRequestA.WININET(00000000,GET,?,00000000,00000000,00400100,00000000), ref: 0040640A
                                                      • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 00406442
                                                      • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00406453
                                                      • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 0040647E
                                                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 004064F3
                                                      • InternetCloseHandle.WININET(00000000), ref: 0040657C
                                                      • InternetCloseHandle.WININET(00000000), ref: 00406585
                                                      • InternetCloseHandle.WININET(00000000), ref: 0040658E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                                      • String ID: ERROR$GET
                                                      • API String ID: 3749127164-3591763792
                                                      • Opcode ID: 963ac1e056751af433d780a8216807e69140fad55e256c3b4c315ddae2ff65c2
                                                      • Instruction ID: 51cd531d8c454c4eabdc451ce72ca3cccbe2bef7883915b0542a7032e80e54d3
                                                      • Opcode Fuzzy Hash: 963ac1e056751af433d780a8216807e69140fad55e256c3b4c315ddae2ff65c2
                                                      • Instruction Fuzzy Hash: 9E710871900218EFDF21EFA0DC45BDD7B75AB05305F6040AAF606BA1E0DBB96A94CF49
                                                      APIs
                                                        • Part of subcall function 00411715: lstrlenA.KERNEL32(?,?,?,00419018,00425200,00425200,?,?,?,0041ABB6), ref: 0041171F
                                                        • Part of subcall function 00411715: lstrcpyA.KERNEL32(0041ABB6,00000000,?,00419018,00425200,00425200), ref: 0041176D
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 004182BD
                                                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00418321
                                                        • Part of subcall function 0041177A: lstrcpyA.KERNEL32(00000000,?,?,?,0041A98C,00000000,?,?,00428E5C,?,00000000), ref: 004117D3
                                                        • Part of subcall function 004116B4: lstrcpyA.KERNEL32(?,?,?,?,004118C6,00000000), ref: 004116F4
                                                        • Part of subcall function 00417E48: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00417E8B
                                                        • Part of subcall function 00417F35: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00417F96
                                                        • Part of subcall function 00417F35: lstrlenA.KERNEL32(00000000), ref: 00417FAD
                                                        • Part of subcall function 00417F35: StrStrA.SHLWAPI(00000000,00000000), ref: 00417FDD
                                                        • Part of subcall function 00417F35: lstrlenA.KERNEL32(00000000), ref: 00417FF9
                                                        • Part of subcall function 00417F35: lstrlenA.KERNEL32(00000000), ref: 0041801F
                                                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 0041840E
                                                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00418519
                                                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00418606
                                                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00418711
                                                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 004187FE
                                                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00418909
                                                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00418B01
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpylstrlen
                                                      • String ID: ERROR
                                                      • API String ID: 2001356338-2861137601
                                                      • Opcode ID: 601a58bd0b0876066a53ea39e9bf7ef070bc13c226733b0f19d5a4e6bce83ed6
                                                      • Instruction ID: 2f695ca300a8a73312befe9c8800e9116e76318d555d5372ca32ba18f7f60556
                                                      • Opcode Fuzzy Hash: 601a58bd0b0876066a53ea39e9bf7ef070bc13c226733b0f19d5a4e6bce83ed6
                                                      • Instruction Fuzzy Hash: 2D4232719001085ACB14FBF1ED5B9EE7378AF10305F90416FF516A61E2EF7C9A88CA99
                                                      APIs
                                                      • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00411964
                                                      • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004119A1
                                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00411A18
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00411A1F
                                                      • wsprintfA.USER32 ref: 00411A54
                                                      • lstrcatA.KERNEL32(00000000,00429270), ref: 00411A65
                                                        • Part of subcall function 00412667: GetCurrentHwProfileA.ADVAPI32(?), ref: 00412674
                                                      • lstrlenA.KERNEL32(00000000), ref: 00411A7E
                                                        • Part of subcall function 004136CE: malloc.MSVCRT ref: 004136D5
                                                        • Part of subcall function 004136CE: strncpy.MSVCRT ref: 004136EB
                                                      • lstrcatA.KERNEL32(00000000,00000000), ref: 00411AAC
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heaplstrcat$AllocCurrentDirectoryInformationProcessProfileVolumeWindowslstrcpylstrlenmallocstrncpywsprintf
                                                      • String ID: :$C$\
                                                      • API String ID: 2389002695-3809124531
                                                      • Opcode ID: 23f1d57f010f06b3a3b0b73a3a18805c0e588e37821cf8b5f81c9e51efc94560
                                                      • Instruction ID: b4310f208fa9535f9906633d23b413fd942b8933ce9b069d1c57af1ba558f1c2
                                                      • Opcode Fuzzy Hash: 23f1d57f010f06b3a3b0b73a3a18805c0e588e37821cf8b5f81c9e51efc94560
                                                      • Instruction Fuzzy Hash: EC417E71D0024CAFDF10EBA0DD59BED7BB8AF05305F10009AF219A61A1DB799BC4CB68
                                                      APIs
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                      • RegOpenKeyExA.KERNEL32(00000000,00000000,00020019,00000000,00425200), ref: 004121DE
                                                      • RegEnumKeyExA.KERNEL32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00412259
                                                      • wsprintfA.USER32 ref: 0041228B
                                                      • RegOpenKeyExA.KERNEL32(00000000,?,00000000,00020019,00000000), ref: 004122AC
                                                        • Part of subcall function 004116B4: lstrcpyA.KERNEL32(?,?,?,?,004118C6,00000000), ref: 004116F4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Openlstrcpy$Enumwsprintf
                                                      • String ID: - $%s\%s$?
                                                      • API String ID: 2731306069-3278919252
                                                      • Opcode ID: db84e063afdd8ab9a369cff0a91b897787bc4edace59e265c4489125e3bbefbc
                                                      • Instruction ID: 317e1264205bd673c815d3a78023c7176152d2c53d3ea0851a7731e254f809d5
                                                      • Opcode Fuzzy Hash: db84e063afdd8ab9a369cff0a91b897787bc4edace59e265c4489125e3bbefbc
                                                      • Instruction Fuzzy Hash: 1C71F47290012CABEB64EB50DD45FD973B9BF04305F5086EAE209A20A1DF746BC9CF94
                                                      APIs
                                                        • Part of subcall function 004116B4: lstrcpyA.KERNEL32(?,?,?,?,004118C6,00000000), ref: 004116F4
                                                        • Part of subcall function 0040430F: ??_U@YAPAXI@Z.MSVCRT ref: 00404373
                                                        • Part of subcall function 0040430F: ??_U@YAPAXI@Z.MSVCRT ref: 00404387
                                                        • Part of subcall function 0040430F: ??_U@YAPAXI@Z.MSVCRT ref: 0040439B
                                                        • Part of subcall function 0040430F: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 004043B9
                                                        • Part of subcall function 0040430F: InternetCrackUrlA.WININET(00000000,00000000), ref: 004043C9
                                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004061A8
                                                      • StrCmpCA.SHLWAPI(?,?,?,?,?,?,?,?), ref: 004061E6
                                                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 00406229
                                                      • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000,?,?,?,?,?,?,?), ref: 0040624D
                                                      • InternetReadFile.WININET(8cA,?,00000400,?), ref: 00406271
                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,?,?,?,?,?), ref: 0040629D
                                                      • CloseHandle.KERNEL32(?,?,00000400,?,?,?,?,?,?,?), ref: 004062DB
                                                      • InternetCloseHandle.WININET(8cA), ref: 004062E4
                                                      • InternetCloseHandle.WININET(?), ref: 004062F0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                                      • String ID: 8cA
                                                      • API String ID: 2507841554-2586977368
                                                      • Opcode ID: 23bbd80859a5ae626456c0e29d0c535548952ba2e1dd46435b22cc47d41a132e
                                                      • Instruction ID: 322e9e665ac9740ae3a6c79426317fb00e7d6d1b0345a24b3972b26df0cd3c85
                                                      • Opcode Fuzzy Hash: 23bbd80859a5ae626456c0e29d0c535548952ba2e1dd46435b22cc47d41a132e
                                                      • Instruction Fuzzy Hash: BC515CB190021CABDF20EF60DC45BED7779FB01305F1050AAE616BA1E1DB786A99CF58
                                                      APIs
                                                      • StrCmpCA.SHLWAPI(00000000,?,?), ref: 0040F9EF
                                                      • StrCmpCA.SHLWAPI(00000000,?,?), ref: 0040FA75
                                                      • StrCmpCA.SHLWAPI(00000000,?,?), ref: 0040FB84
                                                        • Part of subcall function 004116B4: lstrcpyA.KERNEL32(?,?,?,?,004118C6,00000000), ref: 004116F4
                                                      • StrCmpCA.SHLWAPI(00000000), ref: 0040FC57
                                                      • StrCmpCA.SHLWAPI(00000000), ref: 0040FCDD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy
                                                      • String ID: Stable\$firefox
                                                      • API String ID: 3722407311-3160656979
                                                      • Opcode ID: 4574c3fe41a2655a61f88f0eef0b3d3de2eb2ac0277edcd828de38c39bfa1635
                                                      • Instruction ID: 87d147e04e3a24980a39275aa9b0abb6dd5f2e96552c08bd51d602dc9e077d04
                                                      • Opcode Fuzzy Hash: 4574c3fe41a2655a61f88f0eef0b3d3de2eb2ac0277edcd828de38c39bfa1635
                                                      • Instruction Fuzzy Hash: 18D16772A001099BCF24FBB5DD96FDD77B9BB50304F10402AE906EB1A1EE35DA48C795
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,00428E48,00000000,?,00000000,00000000,?,Windows: ,00000000,?,00428FE4,00000000,?,Work Dir: In memory), ref: 0041208E
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00412095
                                                      • GlobalMemoryStatusEx.KERNEL32(00000040), ref: 004120B6
                                                      • __aulldiv.LIBCMT ref: 004120CE
                                                      • __aulldiv.LIBCMT ref: 004120DC
                                                      • wsprintfA.USER32 ref: 004120FF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                                                      • String ID: %d MB$@
                                                      • API String ID: 2886426298-3474575989
                                                      • Opcode ID: e44640eb945edcdb330fccb508c3ea3b329ff7572ab2c3ac08101b3669067511
                                                      • Instruction ID: da943534dc948d73dd967abc6d37c718adf03b454bdf056c0f5a7879574b1967
                                                      • Opcode Fuzzy Hash: e44640eb945edcdb330fccb508c3ea3b329ff7572ab2c3ac08101b3669067511
                                                      • Instruction Fuzzy Hash: 71015EB0E40218BFEF00AFE0DC0ABADBBB9FB05749F104409F314B9090C7B866519B58
                                                      APIs
                                                      • ??_U@YAPAXI@Z.MSVCRT ref: 00404373
                                                      • ??_U@YAPAXI@Z.MSVCRT ref: 00404387
                                                      • ??_U@YAPAXI@Z.MSVCRT ref: 0040439B
                                                      • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 004043B9
                                                      • InternetCrackUrlA.WININET(00000000,00000000), ref: 004043C9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CrackInternetlstrlen
                                                      • String ID: <$<
                                                      • API String ID: 1274457161-213342407
                                                      • Opcode ID: 94d81e5e955a971915de60a229a9877af64f0f003ab4a34939c35b93bd59b886
                                                      • Instruction ID: 01f5d62e614e23a6b162f059a70a9e0953d43a02f97c16b9683ed6508c4b1ff7
                                                      • Opcode Fuzzy Hash: 94d81e5e955a971915de60a229a9877af64f0f003ab4a34939c35b93bd59b886
                                                      • Instruction Fuzzy Hash: 48214771D00218AFDB10DFA9E881BCDBBB4BB04324F10815AE669F72A0DB345A85CF10
                                                      APIs
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                        • Part of subcall function 004116B4: lstrcpyA.KERNEL32(?,?,?,?,004118C6,00000000), ref: 004116F4
                                                        • Part of subcall function 00406312: InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00406373
                                                        • Part of subcall function 00406312: StrCmpCA.SHLWAPI(?), ref: 00406390
                                                        • Part of subcall function 00406312: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 004063BE
                                                        • Part of subcall function 00406312: HttpOpenRequestA.WININET(00000000,GET,?,00000000,00000000,00400100,00000000), ref: 0040640A
                                                        • Part of subcall function 00406312: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 00406442
                                                        • Part of subcall function 00406312: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00406453
                                                        • Part of subcall function 0041177A: lstrcpyA.KERNEL32(00000000,?,?,?,0041A98C,00000000,?,?,00428E5C,?,00000000), ref: 004117D3
                                                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00417F96
                                                      • lstrlenA.KERNEL32(00000000), ref: 00417FAD
                                                        • Part of subcall function 00412FD6: LocalAlloc.KERNEL32(00000040,00000001), ref: 00412FF2
                                                      • StrStrA.SHLWAPI(00000000,00000000), ref: 00417FDD
                                                      • lstrlenA.KERNEL32(00000000), ref: 00417FF9
                                                      • lstrlenA.KERNEL32(00000000), ref: 0041801F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSend
                                                      • String ID: ERROR
                                                      • API String ID: 3240024479-2861137601
                                                      • Opcode ID: e56dbd6892063ce075c71f30584f65b6369d35785078b77fb4a32cfd08f74c49
                                                      • Instruction ID: 82a00ccf74cc6928f093117e63f16261f372f6c033bbdc91f1bb176def9d3ff2
                                                      • Opcode Fuzzy Hash: e56dbd6892063ce075c71f30584f65b6369d35785078b77fb4a32cfd08f74c49
                                                      • Instruction Fuzzy Hash: 24511A71910108ABCB04FFA1D956AED7774BF11309F60402EF916A61F2DF39AA89CA48
                                                      APIs
                                                      • memset.MSVCRT ref: 004125F2
                                                      • RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00020119,?), ref: 00412612
                                                      • RegQueryValueExA.KERNEL32(?,MachineGuid,00000000,00000000,00000000,000000FF), ref: 00412639
                                                      • CharToOemA.USER32(00000000,?), ref: 00412659
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CharOpenQueryValuememset
                                                      • String ID: MachineGuid$SOFTWARE\Microsoft\Cryptography
                                                      • API String ID: 1728412123-1211650757
                                                      • Opcode ID: 195b74b0a96cc35dac2f772ac61cfb819d8275be74710b7e5bc2e41235a95a6e
                                                      • Instruction ID: 19f088c07c09de6674c761c0d1b751acc79a05fefe0ca058460f00b60f9401a7
                                                      • Opcode Fuzzy Hash: 195b74b0a96cc35dac2f772ac61cfb819d8275be74710b7e5bc2e41235a95a6e
                                                      • Instruction Fuzzy Hash: 1B016275A4022DBBDB209B50DD4AFDA777CEB14704F5001E1B688F6091DBF46AC48F54
                                                      APIs
                                                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00407D05
                                                      • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00407D29
                                                      • LocalAlloc.KERNEL32(00000040,?), ref: 00407D48
                                                      • ReadFile.KERNEL32(000000FF,00000000,?,0040F582,00000000), ref: 00407D6E
                                                      • LocalFree.KERNEL32(00000000), ref: 00407DA0
                                                      • CloseHandle.KERNEL32(000000FF), ref: 00407DA9
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                                      • String ID:
                                                      • API String ID: 2311089104-0
                                                      • Opcode ID: b0c26b6f574b650b3bbe433578a167a4ae74d057130e38fdececdba59a5ca05d
                                                      • Instruction ID: 20c10e672a0f3402bfbef9d3d1be989891e350540804f4a5b6ad44830b3c41ef
                                                      • Opcode Fuzzy Hash: b0c26b6f574b650b3bbe433578a167a4ae74d057130e38fdececdba59a5ca05d
                                                      • Instruction Fuzzy Hash: 6C31F174E00209EFDF11DFA4D849BEE7BB5BF0A301F104065E911AB2A0D778AA91CF55
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00411AF1
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00411AF8
                                                      • RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,00000000), ref: 00411B29
                                                      • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,?,000000FF), ref: 00411B47
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocOpenProcessQueryValue
                                                      • String ID: Windows 11
                                                      • API String ID: 3676486918-2517555085
                                                      • Opcode ID: 346f3f4664875a4ea084d75b8818ec132410f9d5b334d0546c756ba2ab9ffa29
                                                      • Instruction ID: 3f27d459ef3b4295677ace20887899c1ffae7c715c4ca525cf07eb428eb26eef
                                                      • Opcode Fuzzy Hash: 346f3f4664875a4ea084d75b8818ec132410f9d5b334d0546c756ba2ab9ffa29
                                                      • Instruction Fuzzy Hash: 84013C34A44208FBEB10ABE0EC0AB9D7B7AFB06744F1050A5F701AA1A1E7749A94DB14
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00411B6F
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00411B76
                                                      • RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,00411B06), ref: 00411B95
                                                      • RegQueryValueExA.KERNEL32(00411B06,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 00411BB2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocOpenProcessQueryValue
                                                      • String ID: CurrentBuildNumber
                                                      • API String ID: 3676486918-1022791448
                                                      • Opcode ID: 6763c454cfa2fbe29bba7aff6e2c919a48f957ef8388f20bd06a009583ecdfc3
                                                      • Instruction ID: 29d7a5e80dbd030fd5711505aedc04f660bf528dc6b38352957baa02463c1007
                                                      • Opcode Fuzzy Hash: 6763c454cfa2fbe29bba7aff6e2c919a48f957ef8388f20bd06a009583ecdfc3
                                                      • Instruction Fuzzy Hash: 42F04F75A40209FFEB00AFE0EC0AFEDBBB9FB05704F101095F200A90A1D7B05690DB54
                                                      APIs
                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001), ref: 0041FD9F
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FilePointer
                                                      • String ID:
                                                      • API String ID: 973152223-0
                                                      • Opcode ID: 28e4449246bdff4538dfa03a6f885fd424cd5e53fb953e1d424f3e4a8a48cfb0
                                                      • Instruction ID: 5f3c8af357893ed153ccb181933e0c92fd25f58187f5847643f7a6c701f82d74
                                                      • Opcode Fuzzy Hash: 28e4449246bdff4538dfa03a6f885fd424cd5e53fb953e1d424f3e4a8a48cfb0
                                                      • Instruction Fuzzy Hash: D561CE70A00209DFDB10CF54D948BAEB7F1BB04725F258166E515AB391C3B4DE86CB6A
                                                      APIs
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                        • Part of subcall function 00407CDF: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00407D05
                                                        • Part of subcall function 00407CDF: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00407D29
                                                        • Part of subcall function 00407CDF: LocalAlloc.KERNEL32(00000040,?), ref: 00407D48
                                                        • Part of subcall function 00407CDF: ReadFile.KERNEL32(000000FF,00000000,?,0040F582,00000000), ref: 00407D6E
                                                        • Part of subcall function 00407CDF: LocalFree.KERNEL32(00000000), ref: 00407DA0
                                                        • Part of subcall function 00407CDF: CloseHandle.KERNEL32(000000FF), ref: 00407DA9
                                                        • Part of subcall function 00412FD6: LocalAlloc.KERNEL32(00000040,00000001), ref: 00412FF2
                                                      • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00407FDF
                                                        • Part of subcall function 00407DC2: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00406095,00000000,00000000), ref: 00407DE6
                                                        • Part of subcall function 00407DC2: LocalAlloc.KERNEL32(00000040,00406095,?,?,00406095,00000000,?), ref: 00407DF7
                                                        • Part of subcall function 00407DC2: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00406095,00000000,00000000), ref: 00407E1D
                                                        • Part of subcall function 00407DC2: LocalFree.KERNEL32(00000000,?,?,00406095,00000000,?), ref: 00407E31
                                                      • memcmp.MSVCRT ref: 00408034
                                                        • Part of subcall function 00407E41: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00407E65
                                                        • Part of subcall function 00407E41: LocalAlloc.KERNEL32(00000040,00000000), ref: 00407E83
                                                        • Part of subcall function 00407E41: LocalFree.KERNEL32(?), ref: 00407EAB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmp
                                                      • String ID: $"encrypted_key":"$DPAPI
                                                      • API String ID: 1204593910-738592651
                                                      • Opcode ID: cb5a7b3697549c6f230e63b8f069386ffd445f3a9418a1f9903da71664ec03a3
                                                      • Instruction ID: 8d589a117900b415cc4759a7c5c28772ff61d9ce457947e60a2fc3858aeb04fe
                                                      • Opcode Fuzzy Hash: cb5a7b3697549c6f230e63b8f069386ffd445f3a9418a1f9903da71664ec03a3
                                                      • Instruction Fuzzy Hash: 74310E71D0010DABDF11DBA5DD45BEEBBB8AF04304F14012AE840B2291EB799A58DB99
                                                      APIs
                                                      • CoCreateInstance.OLE32(0042AC28,00000000,00000001,004292EC,00000000,?,?,?,?,004128EF), ref: 004126EA
                                                      • SysAllocString.OLEAUT32(?), ref: 00412700
                                                      • _wtoi64.MSVCRT ref: 0041274D
                                                      • SysFreeString.OLEAUT32(?), ref: 00412771
                                                      • SysFreeString.OLEAUT32(00000000), ref: 0041277A
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: String$Free$AllocCreateInstance_wtoi64
                                                      • String ID:
                                                      • API String ID: 1817501562-0
                                                      • Opcode ID: f48b06c7123509e446c0da83949f76becdf3deb21f21affda6d357694f029a8c
                                                      • Instruction ID: 58adf380e0662d1b76d21edb75c8d821cdd3313fccb4f2387b68fcf25dfbec8a
                                                      • Opcode Fuzzy Hash: f48b06c7123509e446c0da83949f76becdf3deb21f21affda6d357694f029a8c
                                                      • Instruction Fuzzy Hash: 2E310575E04219EFCB05DFA9D849BEEBBB4FB08315F00416AE911E32A0C7795951CFA4
                                                      APIs
                                                      • StrCmpCA.SHLWAPI(00000000,?,?), ref: 0040F9EF
                                                      • StrCmpCA.SHLWAPI(00000000,?,?), ref: 0040FA75
                                                      • StrCmpCA.SHLWAPI(00000000,?,?), ref: 0040FB84
                                                        • Part of subcall function 004116B4: lstrcpyA.KERNEL32(?,?,?,?,004118C6,00000000), ref: 004116F4
                                                      • StrCmpCA.SHLWAPI(00000000), ref: 0040FC57
                                                      • StrCmpCA.SHLWAPI(00000000), ref: 0040FCDD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy
                                                      • String ID: Stable\
                                                      • API String ID: 3722407311-272486606
                                                      • Opcode ID: b1a1266439bdf2a0e8ec9dc9193cdc2636f5054d60504534493cfb04d58e2737
                                                      • Instruction ID: 7cd2c182165b9fee31fd49b72ff1b8ad9c7a36b01791bf89c52de0b726780448
                                                      • Opcode Fuzzy Hash: b1a1266439bdf2a0e8ec9dc9193cdc2636f5054d60504534493cfb04d58e2737
                                                      • Instruction Fuzzy Hash: CD511271A00109ABCF14FBB5DD96BDD77B9BB60304F10402AE906EB1A1EE35DB49CB85
                                                      APIs
                                                      • ReadFile.KERNEL32(?,?,?,?,?), ref: 1FC5FE03
                                                      Strings
                                                      • winRead, xrefs: 1FC5FE3D
                                                      • delayed %dms for lock/sharing conflict at line %d, xrefs: 1FC5FE78
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID: FileRead
                                                      • String ID: delayed %dms for lock/sharing conflict at line %d$winRead
                                                      • API String ID: 2738559852-1843600136
                                                      • Opcode ID: ee82b5eccdcd1d03fc98e4ef6335a402bfda51c90b5ba10eab2b1662226fa1fe
                                                      • Instruction ID: 07fda47375d9a9d13fd0634b15fcd11b250b2f368ef844f3c432058dbd0a5619
                                                      • Opcode Fuzzy Hash: ee82b5eccdcd1d03fc98e4ef6335a402bfda51c90b5ba10eab2b1662226fa1fe
                                                      • Instruction Fuzzy Hash: A9410472B043066BC308DE64CD819ABB7A8FFC4210F84092DF944C7661E771F919DBA6
                                                      APIs
                                                      • GetEnvironmentVariableA.KERNEL32(C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;,0000FFFF), ref: 00408220
                                                      • LoadLibraryA.KERNEL32 ref: 004082A8
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                        • Part of subcall function 00411715: lstrlenA.KERNEL32(?,?,?,00419018,00425200,00425200,?,?,?,0041ABB6), ref: 0041171F
                                                        • Part of subcall function 00411715: lstrcpyA.KERNEL32(0041ABB6,00000000,?,00419018,00425200,00425200), ref: 0041176D
                                                        • Part of subcall function 0041185B: lstrlenA.KERNEL32(00428E5C,?,00428E5C,?,00000000), ref: 0041186F
                                                        • Part of subcall function 0041185B: lstrcpyA.KERNEL32(00000000,?), ref: 004118A8
                                                        • Part of subcall function 0041185B: lstrcatA.KERNEL32(00000000,00000000), ref: 004118B4
                                                        • Part of subcall function 004117E0: lstrcpyA.KERNEL32(00000000,00000000), ref: 0041182C
                                                        • Part of subcall function 004117E0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041183A
                                                        • Part of subcall function 0041177A: lstrcpyA.KERNEL32(00000000,?,?,?,0041A98C,00000000,?,?,00428E5C,?,00000000), ref: 004117D3
                                                      • SetEnvironmentVariableA.KERNEL32(00000000,00000000,?,00428E34,?,?,C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;,00425200), ref: 00408294
                                                      Strings
                                                      • C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;, xrefs: 00408215, 00408229, 0040823F
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$EnvironmentVariablelstrcatlstrlen$LibraryLoad
                                                      • String ID: C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;
                                                      • API String ID: 2929475105-4027016359
                                                      • Opcode ID: 33191907c34fe30b91932b9d02352948c94fa74ece7802ec8efd6249ff31ed7f
                                                      • Instruction ID: 84292c169819be5b53b0aa043c90a357ac7ef937680942749e622d56a9f64c6e
                                                      • Opcode Fuzzy Hash: 33191907c34fe30b91932b9d02352948c94fa74ece7802ec8efd6249ff31ed7f
                                                      • Instruction Fuzzy Hash: 91413931905245DFEB05EBA1FD66AE937B6FB04305F20612EE901A12F1DF395988CF98
                                                      APIs
                                                      • RegEnumKeyExA.KERNEL32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00412259
                                                      • wsprintfA.USER32 ref: 0041228B
                                                      • RegOpenKeyExA.KERNEL32(00000000,?,00000000,00020019,00000000), ref: 004122AC
                                                      • RegQueryValueExA.KERNEL32(00000000,00000000,000F003F,?,00000400), ref: 0041231A
                                                      • lstrlenA.KERNEL32(?), ref: 0041232F
                                                      • RegQueryValueExA.KERNEL32(00000000,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00428E48), ref: 004123C6
                                                        • Part of subcall function 004116B4: lstrcpyA.KERNEL32(?,?,?,?,004118C6,00000000), ref: 004116F4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: QueryValue$EnumOpenlstrcpylstrlenwsprintf
                                                      • String ID: %s\%s
                                                      • API String ID: 3471882850-4073750446
                                                      • Opcode ID: c05b9aeffa2524c3aa9bcda23acaed7832a6b4e564aa8b15d5e8c89861718145
                                                      • Instruction ID: d7cee1983acf12d4360d724bf4cc3a4c29cf8c0d886bd7a19f0679c37ebee969
                                                      • Opcode Fuzzy Hash: c05b9aeffa2524c3aa9bcda23acaed7832a6b4e564aa8b15d5e8c89861718145
                                                      • Instruction Fuzzy Hash: 1721F27590012CAFEB609B50DD45BD9B7B9FF08304F4094E5E649A60A0CF749AD98F94
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(;q@,;q@,00003000,00000040), ref: 00407474
                                                      • VirtualAlloc.KERNEL32(00000000,;q@,00003000,00000040), ref: 004074BF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID: ;q@$;q@
                                                      • API String ID: 4275171209-3893597124
                                                      • Opcode ID: ce50d067a10a9d200ba21eaef60b552f8d4fc485bf38c75f1e0756368e75d6fe
                                                      • Instruction ID: d3bad8f71399132065eca503ffa06903ce5ef1b7e5e995e1b9bcc650a41b767e
                                                      • Opcode Fuzzy Hash: ce50d067a10a9d200ba21eaef60b552f8d4fc485bf38c75f1e0756368e75d6fe
                                                      • Instruction Fuzzy Hash: D941B535A04209EFCB50CF98C485FADBBF0EB08364F1484A5E959EB391D734EA81CB45
                                                      APIs
                                                      • _MSFOpenExW.MSPDB140-MSVCRT ref: 00418E6C
                                                      • CreateThread.KERNEL32(00000000,00000000,00418C65,?,00000000,00000000), ref: 00418E85
                                                      • WaitForSingleObject.KERNEL32(?,000003E8), ref: 00418E96
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateObjectOpenSingleThreadWait
                                                      • String ID:
                                                      • API String ID: 4234577939-0
                                                      • Opcode ID: f43b621d675ccc337efc39be0cc282dc91ce5b12264d272aea3fd1cbd3d3afdf
                                                      • Instruction ID: 4c5e3d0133d6e9f2eae60e2625ec9d3b543f1cf41f80d31bea27500df29b833e
                                                      • Opcode Fuzzy Hash: f43b621d675ccc337efc39be0cc282dc91ce5b12264d272aea3fd1cbd3d3afdf
                                                      • Instruction Fuzzy Hash: 4F315C75900208AFDB10EF61DC45BED3BB5BF15305F54412AF9159A1A1EF349A86CF88
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 00411EC9
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00411ED0
                                                      • RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,00000000), ref: 00411EEF
                                                      • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,000000FF,000000FF), ref: 00411F0D
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocOpenProcessQueryValue
                                                      • String ID:
                                                      • API String ID: 3676486918-0
                                                      • Opcode ID: dd008c8d00355dc8994383d20b0c3b1a5372c3a3245a183f1dace59f39d50ce9
                                                      • Instruction ID: 2ba135963ef3e1c949db86b07d2e2a79437377d0b90cfecc595d9e25d7200812
                                                      • Opcode Fuzzy Hash: dd008c8d00355dc8994383d20b0c3b1a5372c3a3245a183f1dace59f39d50ce9
                                                      • Instruction Fuzzy Hash: C2F03A79A40208FFEB10AFE0EC0AF9DBBBAFB06745F105064F701A91A0D77156949F40
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,00000104,00428E48,00000000,?,00000000,00000000,?,Computer Name: ,00000000,?,00428E48,00000000,?,00000000,00000000), ref: 00411CCF
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00411CD6
                                                      • GetTimeZoneInformation.KERNEL32(?), ref: 00411CE9
                                                      • wsprintfA.USER32 ref: 00411D20
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                                                      • String ID:
                                                      • API String ID: 362916592-0
                                                      • Opcode ID: 203e413fed742de3b00b513deca226d0cff61aa8e2789412112a4631cc96891a
                                                      • Instruction ID: daf70193e9c0513ecb3072794c83a438d37f7fdfa3376bc861271b49892c1553
                                                      • Opcode Fuzzy Hash: 203e413fed742de3b00b513deca226d0cff61aa8e2789412112a4631cc96891a
                                                      • Instruction Fuzzy Hash: 2BF0BE70A003289FDB20AB24FC0AB9977BBBB02345F1001D5F209AA2E0D7749EC0CF02
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ez@
                                                      • API String ID: 0-307298357
                                                      • Opcode ID: 3bbf64017ccec70b43ef0a4a85a6baf18d8732ef2f27285e686f093308f930eb
                                                      • Instruction ID: a860d7bb49b00275ae4f9f6a4a51eaec01057512aeaaa0d5d6857e8719e4b74b
                                                      • Opcode Fuzzy Hash: 3bbf64017ccec70b43ef0a4a85a6baf18d8732ef2f27285e686f093308f930eb
                                                      • Instruction Fuzzy Hash: FA61D270C08209EFCF14DF94D948BEEB7B0AB04315F2044AAE405B7291D779AE94DF6A
                                                      APIs
                                                      • lstrlenA.KERNEL32(00000000), ref: 00418C99
                                                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00418D4B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrlen
                                                      • String ID: ERROR
                                                      • API String ID: 1659193697-2861137601
                                                      • Opcode ID: 63e6eed9abdabe16e44a68f7f9864da067214aca1ca454f7c695c55e2f80d023
                                                      • Instruction ID: 4cb9426ee5e73f282c12afd8d592c338adc4812851f741afb7acd22160182d69
                                                      • Opcode Fuzzy Hash: 63e6eed9abdabe16e44a68f7f9864da067214aca1ca454f7c695c55e2f80d023
                                                      • Instruction Fuzzy Hash: 6B3184B1E10204ABCF00EBA5DD46AEE7778FB15318F10051AF502E73A1DB389940CBA9
                                                      APIs
                                                      • _MSFOpenExW.MSPDB140-MSVCRT ref: 00418E6C
                                                      • CreateThread.KERNEL32(00000000,00000000,00418C65,?,00000000,00000000), ref: 00418E85
                                                      • WaitForSingleObject.KERNEL32(?,000003E8), ref: 00418E96
                                                      • Sleep.KERNEL32(000003E8,?,00000000,?,?), ref: 00418EA5
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateObjectOpenSingleSleepThreadWait
                                                      • String ID:
                                                      • API String ID: 1990444757-0
                                                      • Opcode ID: db982492dfe86fd64df0525366e688e2b4b5a29edeeaa01de3fa1648289cf0de
                                                      • Instruction ID: 5657c23587d86dbe871ff5d5566c82c5f00d4f8eb17df63da99cc315ca23b86c
                                                      • Opcode Fuzzy Hash: db982492dfe86fd64df0525366e688e2b4b5a29edeeaa01de3fa1648289cf0de
                                                      • Instruction Fuzzy Hash: 52011774640204EBDB21EF21DC46BEC3B65BB11709F54412AF9169A1B1DB399A82CF89
                                                      APIs
                                                      • OpenProcess.KERNEL32(00000410,00000000,004154AA), ref: 00413576
                                                      • K32GetModuleFileNameExA.KERNEL32(00000000,00000000,?,00000104), ref: 00413596
                                                      • CloseHandle.KERNEL32(00000000), ref: 0041359F
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseFileHandleModuleNameOpenProcess
                                                      • String ID:
                                                      • API String ID: 3183270410-0
                                                      • Opcode ID: 424327ca4c3cbaa72694fe0256f2ae6f23efaf6e2f470c7a486978a51854163c
                                                      • Instruction ID: 648301d2c24216510959a40647cebe15a857575c5a4660e0673f59272e1cdbeb
                                                      • Opcode Fuzzy Hash: 424327ca4c3cbaa72694fe0256f2ae6f23efaf6e2f470c7a486978a51854163c
                                                      • Instruction Fuzzy Hash: 68F0F27890120CFFDB11EFA0DC0AFDC7BB9AB09709F1444A5B615AA1A0D7B1ABD4DB44
                                                      APIs
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                      • StrCmpCA.SHLWAPI(00000000,Opera GX,00425200,00425200,?,?), ref: 0040D201
                                                        • Part of subcall function 00412F92: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00412FBC
                                                        • Part of subcall function 004117E0: lstrcpyA.KERNEL32(00000000,00000000), ref: 0041182C
                                                        • Part of subcall function 004117E0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041183A
                                                        • Part of subcall function 0041177A: lstrcpyA.KERNEL32(00000000,?,?,?,0041A98C,00000000,?,?,00428E5C,?,00000000), ref: 004117D3
                                                        • Part of subcall function 0041185B: lstrlenA.KERNEL32(00428E5C,?,00428E5C,?,00000000), ref: 0041186F
                                                        • Part of subcall function 0041185B: lstrcpyA.KERNEL32(00000000,?), ref: 004118A8
                                                        • Part of subcall function 0041185B: lstrcatA.KERNEL32(00000000,00000000), ref: 004118B4
                                                        • Part of subcall function 004116B4: lstrcpyA.KERNEL32(?,?,?,?,004118C6,00000000), ref: 004116F4
                                                        • Part of subcall function 00412F4C: GetFileAttributesA.KERNEL32(00000000,?,0040E526,?,00425200,?,?), ref: 00412F5B
                                                        • Part of subcall function 00407F8E: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00407FDF
                                                        • Part of subcall function 00407F8E: memcmp.MSVCRT ref: 00408034
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpy$lstrcat$AttributesFileFolderPathlstrlenmemcmp
                                                      • String ID: Opera GX
                                                      • API String ID: 1439182418-3280151751
                                                      • Opcode ID: 0fb77b7b81ea3809c0307192b11be850f65fcb2790e200c338288ed7b6fd4c59
                                                      • Instruction ID: fb3989cb2523bfc062273a9d11041c6471dda5227b0977fe00502919fff50608
                                                      • Opcode Fuzzy Hash: 0fb77b7b81ea3809c0307192b11be850f65fcb2790e200c338288ed7b6fd4c59
                                                      • Instruction Fuzzy Hash: 4BD113729001089ADF14FBF1DD56EEE737CAF14305F50412BF616A21E1EE39AB88CA59
                                                      APIs
                                                      • VirtualProtect.KERNEL32(00EBE9FC,458B0874,00000002,00000002), ref: 004079D0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ProtectVirtual
                                                      • String ID: @
                                                      • API String ID: 544645111-2766056989
                                                      • Opcode ID: 287ad8346a7fe6e5c9c93bd88e2f49757a3d10b5b68bd008e028ca123d1bf971
                                                      • Instruction ID: 108c03afaf6488205a77675aa431fcd5872e35c29fe2ccaab908e516a6f44892
                                                      • Opcode Fuzzy Hash: 287ad8346a7fe6e5c9c93bd88e2f49757a3d10b5b68bd008e028ca123d1bf971
                                                      • Instruction Fuzzy Hash: 2D31CBB5D08209EFEB10CF98C545BADBBF1FB04304F1485A6D455AB391D378AA81DF46
                                                      APIs
                                                        • Part of subcall function 004116B4: lstrcpyA.KERNEL32(?,?,?,?,004118C6,00000000), ref: 004116F4
                                                        • Part of subcall function 00406312: InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00406373
                                                        • Part of subcall function 00406312: StrCmpCA.SHLWAPI(?), ref: 00406390
                                                        • Part of subcall function 00406312: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 004063BE
                                                        • Part of subcall function 00406312: HttpOpenRequestA.WININET(00000000,GET,?,00000000,00000000,00400100,00000000), ref: 0040640A
                                                        • Part of subcall function 00406312: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 00406442
                                                        • Part of subcall function 00406312: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00406453
                                                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00417E8B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                                                      • String ID: ERROR
                                                      • API String ID: 3287882509-2861137601
                                                      • Opcode ID: bb33d87117d8667f9c5c7158566ed321b33361f7c494144e9eddfb2cb9a39704
                                                      • Instruction ID: b6725acd924a18acdeaf76a85a33531c260c99ef83c6fe063ac976ef0ea738d9
                                                      • Opcode Fuzzy Hash: bb33d87117d8667f9c5c7158566ed321b33361f7c494144e9eddfb2cb9a39704
                                                      • Instruction Fuzzy Hash: 4B11D0319101089BCB14FFA2E8569DD7378AF50309F50412EF916971F2EF39AB48C788
                                                      APIs
                                                      • GetFileAttributesA.KERNEL32(00000000,?,0040E526,?,00425200,?,?), ref: 00412F5B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID: &@
                                                      • API String ID: 3188754299-4010431647
                                                      • Opcode ID: c554d616c374e849fdf741f0e5d4d7b9930fb9937f03e0365571ee75c380a818
                                                      • Instruction ID: 5a9ed636e313f6a7dd176774e2c6308ea72efcd30315a16af32adb4bfda7ee87
                                                      • Opcode Fuzzy Hash: c554d616c374e849fdf741f0e5d4d7b9930fb9937f03e0365571ee75c380a818
                                                      • Instruction Fuzzy Hash: 4CF0C074C1020CEBCB00DFA5D5456DDB774AB11359F108156E522E72A0E7789B96DF44
                                                      APIs
                                                      • GetCurrentHwProfileA.ADVAPI32(?), ref: 00412674
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CurrentProfilelstrcpy
                                                      • String ID: Unknown
                                                      • API String ID: 2831436455-1654365787
                                                      • Opcode ID: 6f65f47d843f5c38b1e0a66190c485fb9fc1308ec2868120a4b7116f04a99c60
                                                      • Instruction ID: 79ae12f52d30196ee2c5170817a78a3de43ea3cd72a751e4cea9930dc4e20eb0
                                                      • Opcode Fuzzy Hash: 6f65f47d843f5c38b1e0a66190c485fb9fc1308ec2868120a4b7116f04a99c60
                                                      • Instruction Fuzzy Hash: 0CE04F30600108EFCF10EF65D881EDD37ACBB04788F50402AF905D7190DB74E995CB98
                                                      Strings
                                                      • failed to allocate %u bytes of memory, xrefs: 1FC804E7
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: failed to allocate %u bytes of memory
                                                      • API String ID: 0-1168259600
                                                      • Opcode ID: c9d068098f7ee5d9974a77dd0dafe5942655208f6e21150a814f6a09a35a7885
                                                      • Instruction ID: cc936eb8ec9fb9f9cd727eacc2cc5ed6481df1596f5f80b3aa39a1379eece508
                                                      • Opcode Fuzzy Hash: c9d068098f7ee5d9974a77dd0dafe5942655208f6e21150a814f6a09a35a7885
                                                      • Instruction Fuzzy Hash: A8C01226FC832263C6121590EC01ECA7A415BD05A1F054134FD5C5A230D955A85567C6
                                                      APIs
                                                      • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00412FBC
                                                        • Part of subcall function 00411668: lstrcpyA.KERNEL32(00425200,00000000,?), ref: 004116A7
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FolderPathlstrcpy
                                                      • String ID:
                                                      • API String ID: 1699248803-0
                                                      • Opcode ID: 47392e84d6d6294a81bee49d13ce944e3ea666f2a03f2c076f629e9461e68349
                                                      • Instruction ID: aa325d3f94b7a9653be548765aa3873853a6de89a1716966dfff1a03a5bef2b1
                                                      • Opcode Fuzzy Hash: 47392e84d6d6294a81bee49d13ce944e3ea666f2a03f2c076f629e9461e68349
                                                      • Instruction Fuzzy Hash: 7DE04F3094034DBBDB51EF50CC92FCD376C9B04B05F404191B60CAA0D0DA70EB858B54
                                                      APIs
                                                      • LocalAlloc.KERNEL32(00000040,00000001), ref: 00412FF2
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocLocal
                                                      • String ID:
                                                      • API String ID: 3494564517-0
                                                      • Opcode ID: 23ddd831960a07a4baf59c42516714ef093421010defdf0cacab57d0b5a2c2c6
                                                      • Instruction ID: d6433807a1b8db94d6cb6db165d9c0c75de4d80c94e6a7adbc32009b6d90f099
                                                      • Opcode Fuzzy Hash: 23ddd831960a07a4baf59c42516714ef093421010defdf0cacab57d0b5a2c2c6
                                                      • Instruction Fuzzy Hash: 2F019274900208FFDB05CF98C585BED7FF4EB0931AF248089E505AB294C279AF84DB15
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3366822659.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000001.00000002.3366822659.0000000000439000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000043F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000445000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A6000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004A9000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004B1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004D1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004DD000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000004E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000502000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000050E000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.000000000052D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000539000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.00000000005C8000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000641000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3366822659.0000000000643000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_400000_RegAsm.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: malloc
                                                      • String ID:
                                                      • API String ID: 2803490479-0
                                                      • Opcode ID: e9ef69333db613a216edd2c8bf2b23955e04f01125ce089b17a326d4bede4d29
                                                      • Instruction ID: 52e30e3b9de2c83f9cf9caa13978d237713c2858ae44fde087075dd4632ce1ce
                                                      • Opcode Fuzzy Hash: e9ef69333db613a216edd2c8bf2b23955e04f01125ce089b17a326d4bede4d29
                                                      • Instruction Fuzzy Hash: ABC04C70A1411DBB8B04EB59E94284DBBE89A04298B504069F40896151D671AE419658
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$API called with NULL prepared statement$API called with finalized prepared statement$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                                      • API String ID: 0-860711957
                                                      • Opcode ID: 3f9ef4f87d4446f43aca0d0ab9be1a4ea6fca40e9ae67156cf3ead7158a78f44
                                                      • Instruction ID: f81fbee6a0ae378ae06ca86f00f7bf0c934a48b0003bf73ba345a8d10eb2e967
                                                      • Opcode Fuzzy Hash: 3f9ef4f87d4446f43aca0d0ab9be1a4ea6fca40e9ae67156cf3ead7158a78f44
                                                      • Instruction Fuzzy Hash: 6512D4B69047419BE7608F34CC54B67B6E4BF4531CF04072CE9999F282EB76F4198BA2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ASC$DESC$SELECT %s ORDER BY rowid %s$SELECT %s WHERE rowid BETWEEN %lld AND %lld ORDER BY rowid %s
                                                      • API String ID: 0-3496276579
                                                      • Opcode ID: 44cbec97ce709bad11ce890eda43cf198d9fb32b91aaa4d63a4e8b63e5493384
                                                      • Instruction ID: fd6287dc3b5b35a999bd6cbbae142bcdc496d82cfcb3bc36a8a00bde740472a3
                                                      • Opcode Fuzzy Hash: 44cbec97ce709bad11ce890eda43cf198d9fb32b91aaa4d63a4e8b63e5493384
                                                      • Instruction Fuzzy Hash: 40C166769007458FC7118F25C8417A7B7E0FF84310F080A2EEA8A8A655EF36F549EBA1
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 078567f79af2949c7bce4a714284c2a89ea77bd887808b63c7c4672c0d9546ac
                                                      • Instruction ID: 6cc30918fcdb98093f4b1ebb4cee470e031f29d108ffe80778ea655c7782ea4a
                                                      • Opcode Fuzzy Hash: 078567f79af2949c7bce4a714284c2a89ea77bd887808b63c7c4672c0d9546ac
                                                      • Instruction Fuzzy Hash: 4E81E276A04301ABD714DF68CC90B6BB3E9EF84314F04082CF9959B251EB76F94697A2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %lld %lld
                                                      • API String ID: 0-3794783949
                                                      • Opcode ID: cf3b399df216ac808f918b5f6173bc623130c854d93d600334cdfab902d77f64
                                                      • Instruction ID: c96b491e89d5bcd3463c4775c5b8becb5ea85cc5f43b8c20bed9e3b5e57e78da
                                                      • Opcode Fuzzy Hash: cf3b399df216ac808f918b5f6173bc623130c854d93d600334cdfab902d77f64
                                                      • Instruction Fuzzy Hash: FC3106B67003007FE6115B688C45F6B77AADFC1710F11441CF681972A2EB72E811ABA6
                                                      Strings
                                                      • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1FD715A2
                                                      • %s at line %d of [%.10s], xrefs: 1FD715B1
                                                      • misuse, xrefs: 1FD715AC
                                                      • API called with NULL prepared statement, xrefs: 1FD71571
                                                      • API called with finalized prepared statement, xrefs: 1FD71586
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$API called with NULL prepared statement$API called with finalized prepared statement$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                                      • API String ID: 0-860711957
                                                      • Opcode ID: 384e2999b2f153858e2effce777961c6b31e7b32f2b9a601b60935dc09107a8c
                                                      • Instruction ID: 8de9bba9125e805100f675c05c561539016399ad6727a41726734eecf1a42a8c
                                                      • Opcode Fuzzy Hash: 384e2999b2f153858e2effce777961c6b31e7b32f2b9a601b60935dc09107a8c
                                                      • Instruction Fuzzy Hash: 2DC1C5B59007419BE7608F34C84576777E6BF4131CF04072DE89A9F282EB76F44987A2
                                                      Strings
                                                      • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1FD7D5DD
                                                      • %s at line %d of [%.10s], xrefs: 1FD7D5EC
                                                      • misuse, xrefs: 1FD7D5E7
                                                      • API called with NULL prepared statement, xrefs: 1FD7D5AC
                                                      • API called with finalized prepared statement, xrefs: 1FD7D5C1
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$API called with NULL prepared statement$API called with finalized prepared statement$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                                      • API String ID: 0-860711957
                                                      • Opcode ID: ce5534108e73824ab76613df33c4dbf52a8043bb5b2fe2441de66733fe856b9c
                                                      • Instruction ID: 832438a443f3c7b2f0af1e2c2b64b93f45541c6a0587372237260e980fc18b46
                                                      • Opcode Fuzzy Hash: ce5534108e73824ab76613df33c4dbf52a8043bb5b2fe2441de66733fe856b9c
                                                      • Instruction Fuzzy Hash: 82B19DB69007419FE7518F24D894B67B7E4BB45318F044A2CE89A8F241EB76F449CBA2
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 89e60aae8eb6154ba49a36719d725283ae84224f17f6467aa2df405f40ab5e49
                                                      • Instruction ID: 2aa72e2f0eb6f2983aa8443c94c3bf68893404204dab2d644994d212c2f171af
                                                      • Opcode Fuzzy Hash: 89e60aae8eb6154ba49a36719d725283ae84224f17f6467aa2df405f40ab5e49
                                                      • Instruction Fuzzy Hash: 96C13976E583419FE740AA28CC817FF7791EFD1310FD8066EE88587292F225B549C792
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ba4347e41fe6709e6e6ffc372ecb9b640dd104ba6108e72c78dde41931eb8732
                                                      • Instruction ID: d06bbc0a2ef6cf4fc5658371e8a85e16ad1c27b886a626800c037c3ed695a619
                                                      • Opcode Fuzzy Hash: ba4347e41fe6709e6e6ffc372ecb9b640dd104ba6108e72c78dde41931eb8732
                                                      • Instruction Fuzzy Hash: 90E116729047429FC701DF35C880A6BB7E4BF86358F044A5EF845AB251F735E864DBA2
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8fd5a444f62547b55e1c478906cffc6cc5e8d8fd97acf4dcf33dab7dbce9423b
                                                      • Instruction ID: 2a53d681cea5518bc81f3cfec3681e48a81af73a5980d29b2366bcccac84a817
                                                      • Opcode Fuzzy Hash: 8fd5a444f62547b55e1c478906cffc6cc5e8d8fd97acf4dcf33dab7dbce9423b
                                                      • Instruction Fuzzy Hash: F141E4B5600706AFD700AF24CC80A6BB7E5FF45315F40062CF8588A260EB72F919CBE5
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 43830c2c14d87b3ae716c7a1980d3d4f048575f12cac28b556fe9d979f0dcba0
                                                      • Instruction ID: b80a7ecc0bf1bfa20604cd56c56e3f375a267241b2f34baf7bfcf034f3c72610
                                                      • Opcode Fuzzy Hash: 43830c2c14d87b3ae716c7a1980d3d4f048575f12cac28b556fe9d979f0dcba0
                                                      • Instruction Fuzzy Hash: C541E4B63083019FDB14DF14C884EA6B7E5FF98320F204969E9418B791E772F854EB60
                                                      Strings
                                                      • REPLACE INTO '%q'.'%q_data'(id, block) VALUES(?,?), xrefs: 1FCD2001
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: REPLACE INTO '%q'.'%q_data'(id, block) VALUES(?,?)
                                                      • API String ID: 0-914542581
                                                      • Opcode ID: 5e62ef00a51a1957d84feade1c15eb3ce65ea1aad7045430f379a16199032ecb
                                                      • Instruction ID: 502b619609c558b225d2e360cb6f7f07fb3056c0d15a30049945f8e61fc374fa
                                                      • Opcode Fuzzy Hash: 5e62ef00a51a1957d84feade1c15eb3ce65ea1aad7045430f379a16199032ecb
                                                      • Instruction Fuzzy Hash: 4621CEB6500305AFDB10AF68DC84FAA77AAFF04324F044418F6449B162E762F864EBA5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: RtreeMatchArg
                                                      • API String ID: 0-1459067757
                                                      • Opcode ID: a85ab162abcf7360a2f04fbb8eb39c42d6c5bdbe758752552deb36fd3ea4c0c6
                                                      • Instruction ID: 780ac4a51eb5cc75cf47478c8cbc9dfa45740207ce705b69872d2cc555187b86
                                                      • Opcode Fuzzy Hash: a85ab162abcf7360a2f04fbb8eb39c42d6c5bdbe758752552deb36fd3ea4c0c6
                                                      • Instruction Fuzzy Hash: 1D02EFB5A047428FC710CF24C884A9BBBF2BF89318F14461DF9859B251E735F994DBA2
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 163b20eed04c21f543b465dbf508e26d1b36e382aec2e71a79acdea727c2a907
                                                      • Instruction ID: 2a3fab871b5e9f89abee02f96bfd6084269225f25ec4209301797b0630210e41
                                                      • Opcode Fuzzy Hash: 163b20eed04c21f543b465dbf508e26d1b36e382aec2e71a79acdea727c2a907
                                                      • Instruction Fuzzy Hash: 55E0B67A104780ABCB225F51DC49E8BBFA6AF88314F050C1CF58565471CBB3B8A9BB45
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f4ccdf9b743d75f8252b2851f4553c50142fb9d6052622b86404dbf4ff0d5e94
                                                      • Instruction ID: 863af34ae36626ed59478e3165f6677f5874db92d8cbf04c4f28921a6ec0ea25
                                                      • Opcode Fuzzy Hash: f4ccdf9b743d75f8252b2851f4553c50142fb9d6052622b86404dbf4ff0d5e94
                                                      • Instruction Fuzzy Hash: 7FE0B67A104700ABCA225F50DE4AE8BBFA6BF88710F050C1CF5C525671CB73B868BB45
                                                      Strings
                                                      • INSERT INTO '%q'.'%q_idx'(segid,term,pgno) VALUES(?,?,?), xrefs: 1FCF597E
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: INSERT INTO '%q'.'%q_idx'(segid,term,pgno) VALUES(?,?,?)
                                                      • API String ID: 0-143322027
                                                      • Opcode ID: f77438eab57716de0447c85dde8caab78c8feadf1447ccec586b7d53b29d3b55
                                                      • Instruction ID: 11c86e20d45588cd5a61e0ed9c2674c3aafcb49b1c6cdc07daa07b865110342c
                                                      • Opcode Fuzzy Hash: f77438eab57716de0447c85dde8caab78c8feadf1447ccec586b7d53b29d3b55
                                                      • Instruction Fuzzy Hash: 2A115CB6500206BFD7109F54CC84F96FBADFF45314F004554FA085B252CBB2B5A9CBA0
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5343cc64292bdf1c36b1a2a2739a32fd695f0973e406a150f03f26d0f6ed9dd2
                                                      • Instruction ID: 2555f3d48e7a19b258bfd6f929348493dc35f16704bb6a1914ae61f62a50e3ac
                                                      • Opcode Fuzzy Hash: 5343cc64292bdf1c36b1a2a2739a32fd695f0973e406a150f03f26d0f6ed9dd2
                                                      • Instruction Fuzzy Hash: 4F314CB4600301AFEB44EF69DC84A6AB3E9FF48214F048529F949C7251EB71F921CAA1
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 07db288ff6a0437546216470d8691138bdab0c61dd15d2fa4b20eca8cfba00e0
                                                      • Instruction ID: 12e65173034c363127f4f2ecfbbc915190efaed4fc1a6d47103b5417387fa1ad
                                                      • Opcode Fuzzy Hash: 07db288ff6a0437546216470d8691138bdab0c61dd15d2fa4b20eca8cfba00e0
                                                      • Instruction Fuzzy Hash: 60319EB6600301AFEB949F25DC84B6AB7E9EF94314F104828F9468B291E772F854DB61
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ,%.*s$Auxiliary rtree columns must be last$CREATE TABLE x(%.*s INT$_node
                                                      • API String ID: 0-209218429
                                                      • Opcode ID: 9801714492fcc67b5a6da6442e77fb54240f1ae39ef55bc3d254dc6b490cbdd3
                                                      • Instruction ID: d96c75170513f2ca9c702c1e4b43f6025bdfa827f114879618b9528e3b5c5988
                                                      • Opcode Fuzzy Hash: 9801714492fcc67b5a6da6442e77fb54240f1ae39ef55bc3d254dc6b490cbdd3
                                                      • Instruction Fuzzy Hash: 6FF1F6B4A003029FC7109F25CC84B6AB7E5BF85315F840529E98A87211EB37F959DBB6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: fts3$fts3_tokenizer$fts3tokenize$fts4$fts4aux$matchinfo$offsets$optimize$porter$simple$snippet$unicode61
                                                      • API String ID: 0-449611708
                                                      • Opcode ID: 1dfbe89080e95e922182b47afe470aeefa02a722f8529ca46519c24dd8c838f4
                                                      • Instruction ID: ac6560ca0cb9e7cc220d9158c0e627b2e84ce2ba8d0b13bbecc5208e1c41cf5c
                                                      • Opcode Fuzzy Hash: 1dfbe89080e95e922182b47afe470aeefa02a722f8529ca46519c24dd8c838f4
                                                      • Instruction Fuzzy Hash: 60514B75B0C31167D7106A656CD4F9B76A46F01738F040135FE08A5343EB6EF699A3E2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: etilqs_$winGetTempname1$winGetTempname2$winGetTempname4$winGetTempname5
                                                      • API String ID: 0-2933911573
                                                      • Opcode ID: ff3936276d283d7162f5b7604672d9778c297779de25635c0ce8d3c2440b1950
                                                      • Instruction ID: 0103156497ec72f3030acab42343321105f95fd37b0149e047c50d76bbea523e
                                                      • Opcode Fuzzy Hash: ff3936276d283d7162f5b7604672d9778c297779de25635c0ce8d3c2440b1950
                                                      • Instruction Fuzzy Hash: B9A18E75A403515BD700DB24AC86BFA779AAF42321F480166FC849B183EA2BF11FD7B1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: automerge$crisismerge$deletemerge$hashsize$pgsz$rank$secure-delete$usermerge
                                                      • API String ID: 0-3330941169
                                                      • Opcode ID: cb8d2eda2bc37051ed628aeedf7b002459ff1b2dd253e1d58b3f3e48b3a6dede
                                                      • Instruction ID: 9635bcb841c5d938c02d7d6be6961a906f7d559e5098e62f291544bed9c0094a
                                                      • Opcode Fuzzy Hash: cb8d2eda2bc37051ed628aeedf7b002459ff1b2dd253e1d58b3f3e48b3a6dede
                                                      • Instruction Fuzzy Hash: 4E7138BAB003514BC7419E19AC00AAE77D1AFC5216F04097EF942CB251FF26F94A97E3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$API called with finalized prepared statement$SELECT t.%Q FROM %Q.%Q AS t WHERE t.%Q MATCH '*id'$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse$no such fts5 table: %s.%s$recursive definition for %s.%s
                                                      • API String ID: 0-1070437968
                                                      • Opcode ID: 945afd677f056119c44a11bfbcba5d937e0001bc0cd7f7100d9c4fee655a52d1
                                                      • Instruction ID: 208c0c94bec2dbceda96a4c3b985ad4bbea4c5fe49a74b04c151feb5131c17d0
                                                      • Opcode Fuzzy Hash: 945afd677f056119c44a11bfbcba5d937e0001bc0cd7f7100d9c4fee655a52d1
                                                      • Instruction Fuzzy Hash: 3502E5B5A083419BD7109F25CC84B9B77E4BF84328F040529E9498F342EB76F558EBA2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$API called with NULL prepared statement$API called with finalized prepared statement$SELECT %s$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse$no such function: %s
                                                      • API String ID: 0-3900766660
                                                      • Opcode ID: da5d49b1d76355535a827596f71c890d7169366227718c00df1eeb823ee24c96
                                                      • Instruction ID: 80b7ce949275a3394c8c5ceea2cba53b850be1fddf7b3ea126224b60fa6ea492
                                                      • Opcode Fuzzy Hash: da5d49b1d76355535a827596f71c890d7169366227718c00df1eeb823ee24c96
                                                      • Instruction Fuzzy Hash: 8CE1E4BAA047419BD7148F25C884B9F77E6BF85314F04052CFA8A9B641EB35F809D7E2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$API called with finalized prepared statement$cannot open value of type %s$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$integer$misuse$no such rowid: %lld$null$real
                                                      • API String ID: 0-1477268580
                                                      • Opcode ID: e6ca15e35b0d57d575edb309a95c5487f7aea9fefb5a3d11500a004246f3d908
                                                      • Instruction ID: 76636cebe5a60174283bf54b16a2671bcf5209f3ac2cafce0452636f34601ad7
                                                      • Opcode Fuzzy Hash: e6ca15e35b0d57d575edb309a95c5487f7aea9fefb5a3d11500a004246f3d908
                                                      • Instruction Fuzzy Hash: FE5124B56003059FD7109F28CC40B66B7E8FF80315F04096DE9568B752EB72F408DBA5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$API called with NULL prepared statement$API called with finalized prepared statement$ATTACH x AS %Q$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                                      • API String ID: 0-2988319395
                                                      • Opcode ID: 405f3cdcf661ee382b150d07b667e683428016ff5ece9718cb4e95dc57a213b1
                                                      • Instruction ID: 421395cb96c7b21186b844a8c43f3142dd590d2fb1a69cee65bf71527687e93d
                                                      • Opcode Fuzzy Hash: 405f3cdcf661ee382b150d07b667e683428016ff5ece9718cb4e95dc57a213b1
                                                      • Instruction Fuzzy Hash: 8CD1F4B1A083419BEB009F25CCC9B9B77E4BF45325F04452DE8498B352EB36F558DBA2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s%c%s$winFullPathname1$winFullPathname2
                                                      • API String ID: 0-2846052723
                                                      • Opcode ID: f5586532957a2326d9ee5a8028241b17232f1518e323ac8c23488556a4642cab
                                                      • Instruction ID: a17d1466bf1583c394c0ea8219b64ca1654f88fafb672e0bd63421beda18b553
                                                      • Opcode Fuzzy Hash: f5586532957a2326d9ee5a8028241b17232f1518e323ac8c23488556a4642cab
                                                      • Instruction Fuzzy Hash: C8419E61B443552BE7D09B20BC45FBF379EAF81620F06062DF49A5A083EA57F446D362
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %!0.15g$%lld$JSON cannot hold BLOB values
                                                      • API String ID: 0-1047910854
                                                      • Opcode ID: 0a7463edbba2f3f66c7f11f492253bb23db275693c73f8c6e028a437765e68e8
                                                      • Instruction ID: 59acb9ec005d8a81fb22c3aa2c3ed7a41bbd3fe885b8b60a433ec43dc5250144
                                                      • Opcode Fuzzy Hash: 0a7463edbba2f3f66c7f11f492253bb23db275693c73f8c6e028a437765e68e8
                                                      • Instruction Fuzzy Hash: 1D51A87A6043006AE3217E28EC05FBB37A6DFC2325F54024DFD425B2D2EB6BB55542B2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %Q.$=%Q$PRAGMA
                                                      • API String ID: 0-2099833060
                                                      • Opcode ID: 85d2b796f2ab34b2fd3696977274263f76d185bb8c2653d0c3856b449663eb73
                                                      • Instruction ID: 9ee6842ea89fec6fcbf8c7e731538857dab8aa17c23bdba8bcf46ad947ebe2b7
                                                      • Opcode Fuzzy Hash: 85d2b796f2ab34b2fd3696977274263f76d185bb8c2653d0c3856b449663eb73
                                                      • Instruction Fuzzy Hash: 9071F576A043119BDB04DF24CC84B5BB7E4BF84318F04066AFC459B262E736F919DBA2
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 95232483e0b365ddbbe7a1d35cf600948122bc9461b4b58a00fe94640792ca13
                                                      • Instruction ID: 48ea5a3cbece5bf7e9c9d642531560133b6581f46dcada9cb19b35323542d64d
                                                      • Opcode Fuzzy Hash: 95232483e0b365ddbbe7a1d35cf600948122bc9461b4b58a00fe94640792ca13
                                                      • Instruction Fuzzy Hash: 5E81487690C3829BD7018F20C8D076ABBA0BFC5220F4C0668E8D51B356EB35F955E7D2
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a70c7127cf5330d89c7d45b3115e672d80e76ffd15e8db3879d2d7a1d690e5da
                                                      • Instruction ID: 8a4372541bba62c5251b653ead2b0a91a44efdfc5f6dfdeee69074b62eb7c5e1
                                                      • Opcode Fuzzy Hash: a70c7127cf5330d89c7d45b3115e672d80e76ffd15e8db3879d2d7a1d690e5da
                                                      • Instruction Fuzzy Hash: BC51C276A043036BD700CE14DC80BABB7E8EF84714F40056DF94496251EB36BA5EE796
                                                      Strings
                                                      • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1FCD1B17
                                                      • %s at line %d of [%.10s], xrefs: 1FCD1B26
                                                      • misuse, xrefs: 1FCD1B21
                                                      • block, xrefs: 1FCD1A90
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$block$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                                      • API String ID: 0-4016964285
                                                      • Opcode ID: 2458d0ee0926dd1bff1be2090e40e86beff9b9c9699d0fd4ea282a5fae5a1f6f
                                                      • Instruction ID: 8f08db451a8c90aa75bf79ed5d0b256807a813f85b5af27c528a28ba059242e3
                                                      • Opcode Fuzzy Hash: 2458d0ee0926dd1bff1be2090e40e86beff9b9c9699d0fd4ea282a5fae5a1f6f
                                                      • Instruction Fuzzy Hash: C6C101B29003509FEB14DF25CC84A9E77A4BF85324F04422AFE499B211E732E914DBE2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %llu$%llu$abort due to ROLLBACK$another row available$no more rows available$unknown error
                                                      • API String ID: 0-1539118790
                                                      • Opcode ID: 383eac1edb3679407803c042a8b74dcc9ae04b993ae511512efcdbc6731573a9
                                                      • Instruction ID: a39900f66a19171f5b5ad4d4f0f904746a4134235ee4e96a48b0096943a8e420
                                                      • Opcode Fuzzy Hash: 383eac1edb3679407803c042a8b74dcc9ae04b993ae511512efcdbc6731573a9
                                                      • Instruction Fuzzy Hash: 7C91E6326443009BDB04DE18CC847AA7BE1BF85328F44462DF95D9B351EB37E846DB92
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: bad page number$bad page value$cannot delete$cannot insert$no such schema$read-only
                                                      • API String ID: 0-1499782803
                                                      • Opcode ID: f9f2ac1bfb79fd1cfbfa17642ba90129be05ca32b45bcc8384e5421a50da9f68
                                                      • Instruction ID: 4c735a279f7ad0d5d648438a64c2ae51eece605c6aa9f866a7b2b771571023d9
                                                      • Opcode Fuzzy Hash: f9f2ac1bfb79fd1cfbfa17642ba90129be05ca32b45bcc8384e5421a50da9f68
                                                      • Instruction Fuzzy Hash: BA511672A00301DBDB04DF24CC87B5677A8AF80324F15466AEC898B251EF37F955E7A1
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d47789057f54d3d5d235375a09c406a209fee87bea1c44866fc0f5d3bf2f426b
                                                      • Instruction ID: 4d4f0d716f628082912631aedc12111ced9e87acd1b66cac53094c4049d21e02
                                                      • Opcode Fuzzy Hash: d47789057f54d3d5d235375a09c406a209fee87bea1c44866fc0f5d3bf2f426b
                                                      • Instruction Fuzzy Hash: 0C21B4BBE003433AE3029A205C05FAF229C5F81606F054818FD94A9091FB36F60EE2E7
                                                      Strings
                                                      • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1FD6FB96
                                                      • %s at line %d of [%.10s], xrefs: 1FD6FBA5
                                                      • misuse, xrefs: 1FD6FBA0
                                                      • API called with NULL prepared statement, xrefs: 1FD6FB65
                                                      • API called with finalized prepared statement, xrefs: 1FD6FB7A
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$API called with NULL prepared statement$API called with finalized prepared statement$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                                      • API String ID: 0-860711957
                                                      • Opcode ID: a37649bf357c3ba8e6822119797aa7c85ddc875cfdaab778b3b74eb72d3939fc
                                                      • Instruction ID: 8cd158f228e1f5b933f370fc1d1bb0755f906c62bb5bef9b7a1b011b781bb84d
                                                      • Opcode Fuzzy Hash: a37649bf357c3ba8e6822119797aa7c85ddc875cfdaab778b3b74eb72d3939fc
                                                      • Instruction Fuzzy Hash: A2B1D4B5A04B419BD7508F34DC45B6B77E5BF45328F44096CE88A8B242F776F40ACBA2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %z%s%Q$%z, %Q HIDDEN, %s HIDDEN)$CREATE TABLE x($rank
                                                      • API String ID: 0-3324442540
                                                      • Opcode ID: a3f598140a26e98059b6e3bcc7bc3f378d7b5a55bb78131c13f30c00a6adfe7f
                                                      • Instruction ID: a81e42925fdedb83bc5c684154c1cc86130b1140dff56dedbf54fe359f5c8f47
                                                      • Opcode Fuzzy Hash: a3f598140a26e98059b6e3bcc7bc3f378d7b5a55bb78131c13f30c00a6adfe7f
                                                      • Instruction Fuzzy Hash: 57811772A00311DFDB019F24DC44A9B7BE5FF85369F04062AFC459B221EB36E964D7A2
                                                      Strings
                                                      • invalid, xrefs: 1FD574BC
                                                      • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1FD574CD
                                                      • %s at line %d of [%.10s], xrefs: 1FD574DC
                                                      • unable to close due to unfinalized statements or unfinished backups, xrefs: 1FD575D1
                                                      • misuse, xrefs: 1FD574D7
                                                      • API call with %s database connection pointer, xrefs: 1FD574C1
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$API call with %s database connection pointer$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$invalid$misuse$unable to close due to unfinalized statements or unfinished backups
                                                      • API String ID: 0-3800776574
                                                      • Opcode ID: b4ba7eab85460d0287798684d677a4efb53e7d33f6568143f7f0cb8242fb3481
                                                      • Instruction ID: 933baf6cdb5b930389e5e27441b68e3971ebd26fcff42800761d3afcae4c0e76
                                                      • Opcode Fuzzy Hash: b4ba7eab85460d0287798684d677a4efb53e7d33f6568143f7f0cb8242fb3481
                                                      • Instruction Fuzzy Hash: D0519774A00704ABDF529B24AC48BA777B5BF41324F260019E85A97221FB32F555C2B2
                                                      Strings
                                                      • PRAGMA %Q.page_size, xrefs: 1FCFBD03
                                                      • undersize RTree blobs in "%q_node", xrefs: 1FCFBDA1
                                                      • SELECT length(data) FROM '%q'.'%q_node' WHERE nodeno = 1, xrefs: 1FCFBD67
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: PRAGMA %Q.page_size$SELECT length(data) FROM '%q'.'%q_node' WHERE nodeno = 1$undersize RTree blobs in "%q_node"
                                                      • API String ID: 0-3485589083
                                                      • Opcode ID: c199cc8e4c377a6155993707fde475bbed78f8aa9a4745552dd510bf15ecfa5e
                                                      • Instruction ID: ca489c5f2a0801571c4a33b61e9f0dd57269616dbefa331a4d381afcd6d5d55a
                                                      • Opcode Fuzzy Hash: c199cc8e4c377a6155993707fde475bbed78f8aa9a4745552dd510bf15ecfa5e
                                                      • Instruction Fuzzy Hash: D131D6B1A00212ABD7089B25CC84A56F7A9FF44365F044226FC4596211DB37FD68DBF2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (FK)
                                                      • API String ID: 0-1642768157
                                                      • Opcode ID: 22d466069852b2b51f286d7245100f26f1acdb370a522cd90aefe992009c5a04
                                                      • Instruction ID: 00ef0e4e99def084a93180f0b2b4485875798aec245c389e59a56f976187d9a4
                                                      • Opcode Fuzzy Hash: 22d466069852b2b51f286d7245100f26f1acdb370a522cd90aefe992009c5a04
                                                      • Instruction Fuzzy Hash: 5981D7777092009FD7009F18EC80BA6F3A1FB85235F24476EE54A8B6A1E732E515E751
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: [%!g,%!g],$[%!g,%!g]]
                                                      • API String ID: 0-3388633204
                                                      • Opcode ID: 028c5c29823b0fc9bfebfd04e24eca3417f045eb31f1345cbfac4831ee3a2113
                                                      • Instruction ID: 0c9f8228e3d7e73c5721dc956f6fb072e99037cc5c28982fae074f198659ba66
                                                      • Opcode Fuzzy Hash: 028c5c29823b0fc9bfebfd04e24eca3417f045eb31f1345cbfac4831ee3a2113
                                                      • Instruction Fuzzy Hash: 10510331A007118BD700DF29CCC4B96B7B4BF43310F004769F84A9A661F776E559DBA6
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7cded44841165ea6e7c1e801605b973714da163fffc6de681e56899324174838
                                                      • Instruction ID: 8ed4803aa563a4313f63ec9fd0ec72d26a7f44c81fd3df5bdc35f97121ea8635
                                                      • Opcode Fuzzy Hash: 7cded44841165ea6e7c1e801605b973714da163fffc6de681e56899324174838
                                                      • Instruction Fuzzy Hash: 3611B9F9E043107FD704AB14EC44E6B77A9EFD1610F8405A4F8458B271EB36E91DE2A6
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d7c0a64c567377825aa826e38cd61e7aab24cd6bc2d57a6723dcf8eefeade29f
                                                      • Instruction ID: 136f23fe362dbffd3c1ae4d690dde78ad92a9cd804cc16edccbdc950cfdc7c1a
                                                      • Opcode Fuzzy Hash: d7c0a64c567377825aa826e38cd61e7aab24cd6bc2d57a6723dcf8eefeade29f
                                                      • Instruction Fuzzy Hash: B6B1AEB6B04302ABC744CF29CC80A5AB7E9FF88264F444639F949D7711E735F9249BA1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: CREATE TABLE x(input, token, start, end, position)$simple$unknown tokenizer: %s
                                                      • API String ID: 0-2679805236
                                                      • Opcode ID: 23e6187d07829a3b73f474bf158628dfb0a132206e59ec580987b608849e227d
                                                      • Instruction ID: f5e6d963c27d7f378671f46ad753120562d49641c91203b2a54afbee34d3df0c
                                                      • Opcode Fuzzy Hash: 23e6187d07829a3b73f474bf158628dfb0a132206e59ec580987b608849e227d
                                                      • Instruction Fuzzy Hash: 1E71C2729083068FC704DF28CC84A5AB7E5FFD5224F180A69E849D7311EB76F909DBA1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: remove_diacritics=0$remove_diacritics=1$remove_diacritics=2$separators=$tokenchars=
                                                      • API String ID: 0-131617836
                                                      • Opcode ID: 4992c489bcb7071eca1cbf45a841b17dbf642d1b6cf8e0591f87ed807ab4aa4f
                                                      • Instruction ID: ced3907856b29af95f9c60b3a64f1904aed7f41fe5e8f066280cfc3f89a899b9
                                                      • Opcode Fuzzy Hash: 4992c489bcb7071eca1cbf45a841b17dbf642d1b6cf8e0591f87ed807ab4aa4f
                                                      • Instruction Fuzzy Hash: EE51C376A04282CBD301DF24D4417AAF7B1BB42324F8583A8E8465F645DF32FD8AEB51
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %!0.15g$JSON cannot hold BLOB values$null
                                                      • API String ID: 0-3074873597
                                                      • Opcode ID: 03fbb611f1a7c1b8f5dbd602d6abcce5acfed26b7742d9dc2aaf4eb309533656
                                                      • Instruction ID: 16a1f252a086f934c06225d93e4c8d4f1f4fb06414e1e7118b61c27d9e8c0d4a
                                                      • Opcode Fuzzy Hash: 03fbb611f1a7c1b8f5dbd602d6abcce5acfed26b7742d9dc2aaf4eb309533656
                                                      • Instruction Fuzzy Hash: 19419EB9600701BFE3507B74DC81BBB77A4DB42329F080629F191C65D2D3AAB59883F1
                                                      Strings
                                                      • no such database: %s, xrefs: 1FC71E05
                                                      • CREATE TABLE x( name TEXT, path TEXT, pageno INTEGER, pagetype TEXT, ncell INTEGER, payload INTEGER, unused INTEGER, mx_payload INTEGER, pgoffset INTEGER, pgsize INTEGER, schema TEXT HIDDEN, aggregate BOOLEAN HIDDEN), xrefs: 1FC71E2C
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: CREATE TABLE x( name TEXT, path TEXT, pageno INTEGER, pagetype TEXT, ncell INTEGER, payload INTEGER, unused INTEGER, mx_payload INTEGER, pgoffset INTEGER, pgsize INTEGER, schema TEXT HIDDEN, aggregate BOOLEAN HIDDEN)$no such database: %s
                                                      • API String ID: 0-1404816483
                                                      • Opcode ID: 3c5edeae97c3ee019cce0fff35d07332b9d57abd38e07a2a9f57876e8dd005f9
                                                      • Instruction ID: e644c18f3ec2a7cdfb7b917db12cfc7fdca4787072aa49797c87f4b3a45a3371
                                                      • Opcode Fuzzy Hash: 3c5edeae97c3ee019cce0fff35d07332b9d57abd38e07a2a9f57876e8dd005f9
                                                      • Instruction Fuzzy Hash: 843137766043096BC3115F6ACC00BABB7EDEF85225F010669FD589B241EE7AF9058BF0
                                                      Strings
                                                      • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1FC89CF1
                                                      • %s at line %d of [%.10s], xrefs: 1FC89D00
                                                      • misuse, xrefs: 1FC89CFB
                                                      • API called with finalized prepared statement, xrefs: 1FC89CE5
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$API called with finalized prepared statement$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                                      • API String ID: 0-3620335220
                                                      • Opcode ID: accf9ffa4a1d8c30964b34e1fa328e26677dfee6b718f6340981e6a6123cdffa
                                                      • Instruction ID: c0672a7efbd54c057005d5839b59d3991d1cf3d4a3f378734f31db7542473582
                                                      • Opcode Fuzzy Hash: accf9ffa4a1d8c30964b34e1fa328e26677dfee6b718f6340981e6a6123cdffa
                                                      • Instruction Fuzzy Hash: C1113A6BF0076176DA115628BC44BDB7358EFC192EF04013AF90B9A601FB15B88963F7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: SELECT*FROM"%w".%s ORDER BY rowid$ase$sqlite_master$sqlite_temp_master
                                                      • API String ID: 0-231581592
                                                      • Opcode ID: 123ee649261fad299baecd60cfd2267c5311b3fa5495f2ac9b3e269d2c849b79
                                                      • Instruction ID: b517a0e92ed10b16d9281771141b809df712936c72243300b525d31712667202
                                                      • Opcode Fuzzy Hash: 123ee649261fad299baecd60cfd2267c5311b3fa5495f2ac9b3e269d2c849b79
                                                      • Instruction Fuzzy Hash: 3EE1E6B4A043419FD751CF28C880B7ABBF4BF95314F05465CE9889B251E771F964CBA2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: NEAR$fts5 expression tree is too large (maximum depth %d)$fts5: %s queries are not supported (detail!=full)$phrase
                                                      • API String ID: 0-593389478
                                                      • Opcode ID: eb8fc2588604d962ef3065f09901c2284ddbbb432ca843ad275ee969e0728b5f
                                                      • Instruction ID: d2a6e16b9201dd2aa00dd2ee9e77bef26210affb3f7b1dfa881917b9c04d27d1
                                                      • Opcode Fuzzy Hash: eb8fc2588604d962ef3065f09901c2284ddbbb432ca843ad275ee969e0728b5f
                                                      • Instruction Fuzzy Hash: 7D41EC35A007569FC7548E24C880B7AF3A4EF85628F14476AEA428F251EF72F885DBD1
                                                      Strings
                                                      • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1FC9F4B0
                                                      • %s at line %d of [%.10s], xrefs: 1FC9F4BF
                                                      • misuse, xrefs: 1FC9F4BA
                                                      • unable to delete/modify collation sequence due to active statements, xrefs: 1FC9F533
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse$unable to delete/modify collation sequence due to active statements
                                                      • API String ID: 0-3348720253
                                                      • Opcode ID: f941e51bcd57cf37ad29f73868cdbf387e4cae4c6415158e7cd04091c4f88672
                                                      • Instruction ID: 84684d50c55e5d8dbce025f0ad3887df804a9eb0983ef92eed949b2210e6cb39
                                                      • Opcode Fuzzy Hash: f941e51bcd57cf37ad29f73868cdbf387e4cae4c6415158e7cd04091c4f88672
                                                      • Instruction Fuzzy Hash: 4A412877A003429BD7008F24EC80BAAB7E4FF81325F14456EF5549B282E736F516DBA1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                                      • API String ID: 0-2528248365
                                                      • Opcode ID: c92b97a8b4ef61ac089f3ecffe7c6b250023b0b3fae16b4517210f026968c75a
                                                      • Instruction ID: efb8b722f6771316954e6107d3310043ec15df02b11da226cd85003f36b396ca
                                                      • Opcode Fuzzy Hash: c92b97a8b4ef61ac089f3ecffe7c6b250023b0b3fae16b4517210f026968c75a
                                                      • Instruction Fuzzy Hash: CA314639600B904BC324EF29C890AB3BBF2DF85701B54845CE6C74B786E722E842CB91
                                                      Strings
                                                      • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1FC61D3C
                                                      • %s at line %d of [%.10s], xrefs: 1FC61D4B
                                                      • misuse, xrefs: 1FC61D46
                                                      • unknown database: %s, xrefs: 1FC61CBD
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse$unknown database: %s
                                                      • API String ID: 0-142545749
                                                      • Opcode ID: 23cfcda3a5d24fa4d59da86f7a669c3f5189b3cdbed4e0840a0a072b8d6cdfed
                                                      • Instruction ID: 8582aae474895719469a21626e47e58001fbb87dfc42bfc8d211edc68ee62041
                                                      • Opcode Fuzzy Hash: 23cfcda3a5d24fa4d59da86f7a669c3f5189b3cdbed4e0840a0a072b8d6cdfed
                                                      • Instruction Fuzzy Hash: E92147B65047807BDB119A259C84FDB7BA99FC2B3AF10012CF85956381E731A405D7B2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                                      • API String ID: 0-2528248365
                                                      • Opcode ID: b1701ac0b7c81b5765bb9bfa12d37539760a6a549fd47d338b8d2a10260f1bf1
                                                      • Instruction ID: 680b66ce1e74151e7a3aa9503f0be54eb72078a082cd596c332ef9d634c634b4
                                                      • Opcode Fuzzy Hash: b1701ac0b7c81b5765bb9bfa12d37539760a6a549fd47d338b8d2a10260f1bf1
                                                      • Instruction Fuzzy Hash: 6A21F5B7A003115BCB00DE19DC81AEBBBE0FB84651F468126FD48D7341EB29E65997E2
                                                      Strings
                                                      • CREATE TABLE x(pgno INTEGER PRIMARY KEY, data BLOB, schema HIDDEN), xrefs: 1FC733D6
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: CREATE TABLE x(pgno INTEGER PRIMARY KEY, data BLOB, schema HIDDEN)
                                                      • API String ID: 0-1935849370
                                                      • Opcode ID: b7b751b6931be316ee138ae2d0dcabefacb8b0af325ad9358d1fb960f082c1f1
                                                      • Instruction ID: b70e73affc897a08a4b7906f3e9992c2a739981db2917ff7336ee664e86bc19f
                                                      • Opcode Fuzzy Hash: b7b751b6931be316ee138ae2d0dcabefacb8b0af325ad9358d1fb960f082c1f1
                                                      • Instruction Fuzzy Hash: A10196397043169AD302DF19D80178AB7D6EFC5311F05817AF5049B250EFB4B44B97A1
                                                      Strings
                                                      • Wrong number of entries in %%%s table - expected %lld, actual %lld, xrefs: 1FD33E6C
                                                      • SELECT count(*) FROM %Q.'%q%s', xrefs: 1FD33E26
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: SELECT count(*) FROM %Q.'%q%s'$Wrong number of entries in %%%s table - expected %lld, actual %lld
                                                      • API String ID: 0-3026403748
                                                      • Opcode ID: 7526a57e97e441f57c2616452e32cafb0f873b198af8bf34dd7f67bcea9e163a
                                                      • Instruction ID: 1733200b5acb4c8b5a106dfdd092d65f40fd1bf9d6b07f0c820498a5d38fef66
                                                      • Opcode Fuzzy Hash: 7526a57e97e441f57c2616452e32cafb0f873b198af8bf34dd7f67bcea9e163a
                                                      • Instruction Fuzzy Hash: 21F044F6D043416BCB125B00AD40E7F76E9AFC5A12F050A2CF28A75210EF2BF554A7A7
                                                      APIs
                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,2FE34BC9,?,?,00000000,1FE5D1CB,000000FF,?,1FE05B30,?,?,1FE05ADF,?), ref: 1FE05BF6
                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 1FE05C08
                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,1FE5D1CB,000000FF,?,1FE05B30,?,?,1FE05ADF,?), ref: 1FE05C2A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                      • String ID: CorExitProcess$mscoree.dll
                                                      • API String ID: 4061214504-1276376045
                                                      • Opcode ID: a17782e161a780c845089c5b84d34797ccc59aefe490f161916238397a0e1288
                                                      • Instruction ID: 1bb97f20847dd9ae91501b1c0112f1376ecccfa8226e8765938db6a07c955d30
                                                      • Opcode Fuzzy Hash: a17782e161a780c845089c5b84d34797ccc59aefe490f161916238397a0e1288
                                                      • Instruction Fuzzy Hash: EB01AC72914629AFCF05AF50CD48BED77B9FB45724F000926E811A1290DB3A9810CA50
                                                      Strings
                                                      • fts5: syntax error near "%.*s", xrefs: 1FD7751C
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: fts5: syntax error near "%.*s"
                                                      • API String ID: 0-498961494
                                                      • Opcode ID: 662679298f70de80744ac8fca0bb24235dbb893d761ef54b611be8aa0c9bb629
                                                      • Instruction ID: 082a22e97ad5e7f4b61082fd28303d37e8bff09053e959780b942a53a0e81a8e
                                                      • Opcode Fuzzy Hash: 662679298f70de80744ac8fca0bb24235dbb893d761ef54b611be8aa0c9bb629
                                                      • Instruction Fuzzy Hash: F1B1BEB4904341CFD791CF24C884B6ABBE4BF85318F154E1EF8858B250EB76E585CBA6
                                                      Strings
                                                      • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1FC91459
                                                      • %s at line %d of [%.10s], xrefs: 1FC91468
                                                      • database corruption, xrefs: 1FC91463
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                                      • API String ID: 0-2528248365
                                                      • Opcode ID: e2e31fceb102eb7565333f85d3eeaf8c84d5e0aec991d5e639d7c59afba54e96
                                                      • Instruction ID: 3526094c259f309d302e3d643a167f9b4f552ed43af7e0c80414d9960200bc28
                                                      • Opcode Fuzzy Hash: e2e31fceb102eb7565333f85d3eeaf8c84d5e0aec991d5e639d7c59afba54e96
                                                      • Instruction Fuzzy Hash: 957117B6A043009FC705CF25C881A677BE4BFC8310F154A9DF8999B252E731F945CBA2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: winShmMap1$winShmMap2$winShmMap3
                                                      • API String ID: 0-3826999013
                                                      • Opcode ID: 4b58db9665e8379cfbf55c3598ed43aad706b3be9aa971f31dd11cf25d5e3af2
                                                      • Instruction ID: f1498f8af489b04d08b398bf09e64d81566689396a446f09102a9d4c7ba5c3a9
                                                      • Opcode Fuzzy Hash: 4b58db9665e8379cfbf55c3598ed43aad706b3be9aa971f31dd11cf25d5e3af2
                                                      • Instruction Fuzzy Hash: 1261BC725083019FDB14DF25CC85A67B7E5AF84724F01496DF98297392EB36F818CB62
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: (join-%u)$(subquery-%u)
                                                      • API String ID: 0-2916047017
                                                      • Opcode ID: 69e2ff3f9888cfc5808a3dac2f5ed6f9f8c39cb63b274e5a7d8dfa55720a2194
                                                      • Instruction ID: 01280a14c36f9b62506e7d7a58a6cc2343c0a779a8c560ffabfc4f7de2ac76f1
                                                      • Opcode Fuzzy Hash: 69e2ff3f9888cfc5808a3dac2f5ed6f9f8c39cb63b274e5a7d8dfa55720a2194
                                                      • Instruction Fuzzy Hash: E751D476B0C3418BCB18CF24D8A0A6BB7E1AF85314F04875DEC5A4B226E631F816DB95
                                                      Strings
                                                      • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1FC935EA
                                                      • %s at line %d of [%.10s], xrefs: 1FC935F9
                                                      • misuse, xrefs: 1FC935F4
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                                      • API String ID: 0-3564305576
                                                      • Opcode ID: ce47aa3c27d62078c52abeada6e5caa96569ee747818ae4acc569b126c4cb88f
                                                      • Instruction ID: 848f919e51a9e734ac7089e0d588cb888664bb87b640ca5d44d0aeea7ce396ab
                                                      • Opcode Fuzzy Hash: ce47aa3c27d62078c52abeada6e5caa96569ee747818ae4acc569b126c4cb88f
                                                      • Instruction Fuzzy Hash: BC5106F6A00311AFDB148F24CC84A56BBA9FF44724F05565CF8699B252E732F814DBE2
                                                      Strings
                                                      • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1FD097E0
                                                      • %s at line %d of [%.10s], xrefs: 1FD097EF
                                                      • database corruption, xrefs: 1FD097EA
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                                      • API String ID: 0-2528248365
                                                      • Opcode ID: 518111b4395eb417831dca84c2f834759a924e368d4f9b822152ff97d04e1d21
                                                      • Instruction ID: 5fa19d5363c05643fe7b2f44b7b012f697f67c26d4500fc9900c629d9ca4969c
                                                      • Opcode Fuzzy Hash: 518111b4395eb417831dca84c2f834759a924e368d4f9b822152ff97d04e1d21
                                                      • Instruction Fuzzy Hash: 4C41287A2047908FD7219F7C94406E6FFE09F81251F0809AED2DA8B752E262F485D762
                                                      Strings
                                                      • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1FDD5976
                                                      • %s at line %d of [%.10s], xrefs: 1FDD5985
                                                      • misuse, xrefs: 1FDD5980
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                                      • API String ID: 0-3564305576
                                                      • Opcode ID: cac2c714e6c630c1ae32b0d7cadb4f3583fe70bf3798dea6b09c45843513b6f2
                                                      • Instruction ID: a2652ad392f054552292ee15e6b0ef7fda439c33f7890241d97268bdc3282ef8
                                                      • Opcode Fuzzy Hash: cac2c714e6c630c1ae32b0d7cadb4f3583fe70bf3798dea6b09c45843513b6f2
                                                      • Instruction Fuzzy Hash: 394117759003619BD754CB14CC80BFAB7E4AFC5320FC41629F8445B281E739F994C7A2
                                                      Strings
                                                      • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1FC953FE
                                                      • %s at line %d of [%.10s], xrefs: 1FC9540D
                                                      • database corruption, xrefs: 1FC95408
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                                      • API String ID: 0-2528248365
                                                      • Opcode ID: 02cf01364aec0a3c7322e8cbe03fc26f0a9e56be66b2f336023941532d6b0cbd
                                                      • Instruction ID: f591923b9e779e721321db7e1650af3a5c7d60cf5a3501ddc4a1547dfe5e6eba
                                                      • Opcode Fuzzy Hash: 02cf01364aec0a3c7322e8cbe03fc26f0a9e56be66b2f336023941532d6b0cbd
                                                      • Instruction Fuzzy Hash: D8315B2A64079146D7219F3998407E6B7E0BFE1712F44086EE9C9C7681F316F492E3A2
                                                      Strings
                                                      • error in tokenizer constructor, xrefs: 1FD77F92
                                                      • no such tokenizer: %s, xrefs: 1FD77F1B
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: error in tokenizer constructor$no such tokenizer: %s
                                                      • API String ID: 0-815501780
                                                      • Opcode ID: d5fe16cf0c2c5bf7f7d705ec2354e1495a781b8dfd0b7c76f65d9a134988969d
                                                      • Instruction ID: f951ad5af1e8f40259ea41c7b7e2487e4cf1aef6fdb9bdf2236476b720b5a53e
                                                      • Opcode Fuzzy Hash: d5fe16cf0c2c5bf7f7d705ec2354e1495a781b8dfd0b7c76f65d9a134988969d
                                                      • Instruction Fuzzy Hash: 5D317C767013558FC760CE19D840AAAB3E5EF84629F160A6DE9899F200EB32F805CB61
                                                      Strings
                                                      • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1FCA146B
                                                      • %s at line %d of [%.10s], xrefs: 1FCA147A
                                                      • database corruption, xrefs: 1FCA1475
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                                      • API String ID: 0-2528248365
                                                      • Opcode ID: 05c6c0f3e4a98d334c89cce057a1549ea0d613d7f88e8b5976d42b7052621625
                                                      • Instruction ID: d2e6801b7562ed29bfed555725c40d195da3832a90eb6c1cb2e0fe9e2958a7ba
                                                      • Opcode Fuzzy Hash: 05c6c0f3e4a98d334c89cce057a1549ea0d613d7f88e8b5976d42b7052621625
                                                      • Instruction Fuzzy Hash: 7131B1766093928FC320CF29D940967FBF0EF85215B04869EE4868BA53D731F549DBA1
                                                      Strings
                                                      • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1FC9FDE6, 1FC9FE61
                                                      • %s at line %d of [%.10s], xrefs: 1FC9FE82
                                                      • database corruption, xrefs: 1FC9FE7D
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$database corruption$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f
                                                      • API String ID: 0-2528248365
                                                      • Opcode ID: ee3e1f231b201532023c28c4fb9657ca816b1e864160aa7635ec2966bec7b57d
                                                      • Instruction ID: 6544c1835c9375b8761425f38eed7859e3d825072dfd71cb1e023d3f8c5ed556
                                                      • Opcode Fuzzy Hash: ee3e1f231b201532023c28c4fb9657ca816b1e864160aa7635ec2966bec7b57d
                                                      • Instruction Fuzzy Hash: 51312BA96243818AD3148F28C400766BBA1BF55308F64D5CDE4498F793E37BC4C7EB96
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s%s
                                                      • API String ID: 0-3252725368
                                                      • Opcode ID: 04e4e631754afa916a0327980bcc0de61fa1e10295d286f8e4f147312d952cfe
                                                      • Instruction ID: ce65704b696a004f20d3b1573472684f0ac4385315b81da4006e4240b5b0968b
                                                      • Opcode Fuzzy Hash: 04e4e631754afa916a0327980bcc0de61fa1e10295d286f8e4f147312d952cfe
                                                      • Instruction Fuzzy Hash: CD11A2769002259BDB05AB15DC88A9633A9FF8136AF040126FD08C6214F737B624D7B2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: integer overflow
                                                      • API String ID: 0-1678498654
                                                      • Opcode ID: 7ec5f5eb4f2c51cde5f2f6b592ffae9d50141941d3c39dfbbae22680f1f9da61
                                                      • Instruction ID: 63bc57301e4fd95fd450490d22cc0ce0647c17f9edb08aba91d570e7eef571f3
                                                      • Opcode Fuzzy Hash: 7ec5f5eb4f2c51cde5f2f6b592ffae9d50141941d3c39dfbbae22680f1f9da61
                                                      • Instruction Fuzzy Hash: BF11B27AC087126ADB01AF24AC41B8A37A16F17334F050399F4551A2F6FB71A5CAE3D2
                                                      Strings
                                                      • JSON path error near '%q', xrefs: 1FD01F92
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: JSON path error near '%q'
                                                      • API String ID: 0-481711382
                                                      • Opcode ID: dce7f482696871505d177cb160f5d6479c30ad94ec65e732f61d8e7aaf3fb993
                                                      • Instruction ID: ce652c6ae59a3a1f27913a1229389415c331ed734f1405796dbf74fd19d13217
                                                      • Opcode Fuzzy Hash: dce7f482696871505d177cb160f5d6479c30ad94ec65e732f61d8e7aaf3fb993
                                                      • Instruction Fuzzy Hash: 2801C4727093116FDB24AA649C01BAB7BD5DF41360F10076CF895962D1EB76F80193E2
                                                      Strings
                                                      • ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f, xrefs: 1FC61E53
                                                      • %s at line %d of [%.10s], xrefs: 1FC61E63
                                                      • misuse, xrefs: 1FC61E59
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s at line %d of [%.10s]$ebead0e7230cd33bcec9f95d2183069565b9e709bf745c9b5db65cc0cbf92c0f$misuse
                                                      • API String ID: 0-3564305576
                                                      • Opcode ID: d0e63bf59ecf9ac3e8e5d5c26cea923d3a0f3d0da92f82a2998da75a61d8f72f
                                                      • Instruction ID: 8bd72cb617c386ffebcda9d86c25124d34573d00fb977fe8f495859233a463b7
                                                      • Opcode Fuzzy Hash: d0e63bf59ecf9ac3e8e5d5c26cea923d3a0f3d0da92f82a2998da75a61d8f72f
                                                      • Instruction Fuzzy Hash: 8E11E33470CA509FD714CE3AD88CA96BBB8AF82B26F044559F005CB322D335E515D7E2
                                                      Strings
                                                      • CREATE TABLE x(key,value,type,atom,id,parent,fullkey,path,json HIDDEN,root HIDDEN), xrefs: 1FC77F76
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: CREATE TABLE x(key,value,type,atom,id,parent,fullkey,path,json HIDDEN,root HIDDEN)
                                                      • API String ID: 0-3072645960
                                                      • Opcode ID: f3db3880b69257458c3ff59cef51839cb7d8dfe1637f1bf2ddb338c77a10a878
                                                      • Instruction ID: a081c410b2c7389e6c42d8ccf2a3e6ac8fef5722042bdd0f1a3206667e4165e0
                                                      • Opcode Fuzzy Hash: f3db3880b69257458c3ff59cef51839cb7d8dfe1637f1bf2ddb338c77a10a878
                                                      • Instruction Fuzzy Hash: BAF0F63B70434246D7015F58FC01BC9B7D1AFC1311F190679F8449A1A0FB60E88997A1
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 554031d1474c899e9372e104042577ae0e22fb1a1031532e9918dbc1a6465a11
                                                      • Instruction ID: dbc0bc16a71b41e577a58ee282c745fe1dbedf0dcbda4159fa15e466d7ba45e7
                                                      • Opcode Fuzzy Hash: 554031d1474c899e9372e104042577ae0e22fb1a1031532e9918dbc1a6465a11
                                                      • Instruction Fuzzy Hash: D041FD766007059FD314CF18D980A52F7E1FF84324F148A6EE9468BA62EB72FC55DB90
                                                      APIs
                                                      • SetFilePointerEx.KERNEL32(00000000,00000000,00000000,?,00000001,00000000,?,?,00000000), ref: 1FE4F4E0
                                                      • GetLastError.KERNEL32(?,?,?,?), ref: 1FE4F4ED
                                                      • SetFilePointerEx.KERNEL32(?,?,?,?,?), ref: 1FE4F513
                                                      • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000,?,?,?), ref: 1FE4F539
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID: FilePointer$ErrorLast
                                                      • String ID:
                                                      • API String ID: 142388799-0
                                                      • Opcode ID: ca4c869b9ecad418cef9cf1f5b374512f0e6699937c99b611c2a24209ea3b8eb
                                                      • Instruction ID: 3fd7d7c132ba95cae622bcbfdd839511e6a5ea5f621a57fb4216c429a183aabb
                                                      • Opcode Fuzzy Hash: ca4c869b9ecad418cef9cf1f5b374512f0e6699937c99b611c2a24209ea3b8eb
                                                      • Instruction Fuzzy Hash: 45112771900269BBDF109FA5DC4C9DF3F79FF41B64F204149F824A61A0DB32AA51DBA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: string or blob too big
                                                      • API String ID: 0-2803948771
                                                      • Opcode ID: 701b26f4e1f44a92fe1319e38cf1405ef1ad42ef933c977e825bd6717f256b1e
                                                      • Instruction ID: 29c02b2e055537fdcf3d7f85cdf46a7f0fdcc1c4f297b0aaf140e326857e02cb
                                                      • Opcode Fuzzy Hash: 701b26f4e1f44a92fe1319e38cf1405ef1ad42ef933c977e825bd6717f256b1e
                                                      • Instruction Fuzzy Hash: 6DA1F576E0CB868FD704DE28C8D0756B7D1AF89231F180B5DE8A1573E1E770E485AB82
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: *$?
                                                      • API String ID: 0-2367018687
                                                      • Opcode ID: c024cb30170bdaae31df024a3af1167493005580149d4967af63f9f7d8b1f564
                                                      • Instruction ID: 29f2c361d5b607dc1595d1872fc5b8972dcb0a9a9f67710a9be133160e2d51c3
                                                      • Opcode Fuzzy Hash: c024cb30170bdaae31df024a3af1167493005580149d4967af63f9f7d8b1f564
                                                      • Instruction Fuzzy Hash: 48711C70A043518FE7558F28C88072BBBE6FF85218F454E6DE8C98F211EB76E94587A1
                                                      Strings
                                                      • winDelete, xrefs: 1FC6569C
                                                      • delayed %dms for lock/sharing conflict at line %d, xrefs: 1FC656D1
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: delayed %dms for lock/sharing conflict at line %d$winDelete
                                                      • API String ID: 0-1405699761
                                                      • Opcode ID: ededf2ff98d109fe99ff90a31b0316e362838c50730a53c0c5b16bd5d42bccbf
                                                      • Instruction ID: 49ae4ca3fab7fe3b6f0d47c9f08c87712186995d5a498d22025817c600d14edd
                                                      • Opcode Fuzzy Hash: ededf2ff98d109fe99ff90a31b0316e362838c50730a53c0c5b16bd5d42bccbf
                                                      • Instruction Fuzzy Hash: B3316BB3E052218BDB143A389DCC49A7719B7A2235F210933ED17C6391E623E464E7F1
                                                      Strings
                                                      • sqlite_stat1, xrefs: 1FD4DF30
                                                      • SELECT tbl,idx,stat FROM %Q.sqlite_stat1, xrefs: 1FD4DF4F
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: SELECT tbl,idx,stat FROM %Q.sqlite_stat1$sqlite_stat1
                                                      • API String ID: 0-3572622772
                                                      • Opcode ID: f2017594a70d762a95c1f4c0998821e3b8c25851ac195498f8e3f719082bf068
                                                      • Instruction ID: 6ad577f797afa56c05587fdc935615a826d6431329c6fe50c877ed20678bbb4a
                                                      • Opcode Fuzzy Hash: f2017594a70d762a95c1f4c0998821e3b8c25851ac195498f8e3f719082bf068
                                                      • Instruction Fuzzy Hash: 9321E175A013865FCB60DE25DC90E7AB3B4AF81624F65066CFC849B6A1E321FC05CBA1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: OsError 0x%lx (%lu)
                                                      • API String ID: 0-3720535092
                                                      • Opcode ID: 8f72aa112ee5e736bd96db4145f0f7558c0360a34be785119a142079cd59574c
                                                      • Instruction ID: d424b83f05984a38726528745cc9bd680c32576f8a41a98b5257bbae05890be9
                                                      • Opcode Fuzzy Hash: 8f72aa112ee5e736bd96db4145f0f7558c0360a34be785119a142079cd59574c
                                                      • Instruction Fuzzy Hash: 7B21D371600321ABEB48AB64DC4CFAB37A5FF41B65F000526F945D1160EB37EA24D7B2
                                                      Strings
                                                      • DROP TABLE '%q'.'%q_node';DROP TABLE '%q'.'%q_rowid';DROP TABLE '%q'.'%q_parent';, xrefs: 1FC7F752
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: DROP TABLE '%q'.'%q_node';DROP TABLE '%q'.'%q_rowid';DROP TABLE '%q'.'%q_parent';
                                                      • API String ID: 0-2071071404
                                                      • Opcode ID: c3b6390ccda5548a3855188cd82caf1da00f75b5f981c68d413a8fb51f50b793
                                                      • Instruction ID: 5a9f2efb7fea4bccc84df53d53a685468dd7151359792a5e1c823e95a50b9c6a
                                                      • Opcode Fuzzy Hash: c3b6390ccda5548a3855188cd82caf1da00f75b5f981c68d413a8fb51f50b793
                                                      • Instruction Fuzzy Hash: B211C4B5600211AFE604A729DCCDFAB33ADFB81325F00022AF905D2150EB67B965D6B1
                                                      Strings
                                                      • GetXStateFeaturesMask, xrefs: 1FE30E34
                                                      • InitializeCriticalSectionEx, xrefs: 1FE30E84
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: GetXStateFeaturesMask$InitializeCriticalSectionEx
                                                      • API String ID: 0-4196971266
                                                      • Opcode ID: d5a0b6e4397a604dcfb7cca6c3e0435b85f2075d67941da6cac87d7db8d08eb2
                                                      • Instruction ID: 84228471c3f821994bb9b94d6db8512ae38d28c180a6e73d136ba27bdd508853
                                                      • Opcode Fuzzy Hash: d5a0b6e4397a604dcfb7cca6c3e0435b85f2075d67941da6cac87d7db8d08eb2
                                                      • Instruction Fuzzy Hash: DD018F3294122877CF113AA68C09ECE7F16EF407B6F014122FE1E29220EA769830D7D0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3374485220.000000001FC58000.00000020.00001000.00020000.00000000.sdmp, Offset: 1FC50000, based on PE: true
                                                      • Associated: 00000001.00000002.3374461624.000000001FC50000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FC51000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FDB6000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374485220.000000001FE5D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE5F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3374990292.000000001FE68000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375067781.000000001FE92000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9D000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3375092275.000000001FE9F000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_1fc50000_RegAsm.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %z%s%z
                                                      • API String ID: 0-3434679432
                                                      • Opcode ID: 121b5ff51a16aa90288717f288932f737c6d7c8d4dd3954501bc7276f7b16caa
                                                      • Instruction ID: 1ce3dcfb4e26ed9f0f453b165d51f1685056c20214dbbdeeb4e4042f63f8375e
                                                      • Opcode Fuzzy Hash: 121b5ff51a16aa90288717f288932f737c6d7c8d4dd3954501bc7276f7b16caa
                                                      • Instruction Fuzzy Hash: FAF0A7F09147069FDB508B15DD4177BB2D9FF84211F44492DEC86C6650EB31F945CB51