Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe

Overview

General Information

Sample name:c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe
Analysis ID:1467942
MD5:e96cdfd7c641b4fea03541b97f6342a1
SHA1:535e5952f7fa869edae1296ba904632207c44aef
SHA256:1131e8baca9159531db856b4f814c52fd05e7dc32a5412d7e52a41e731e55be9
Tags:exe
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Contains functionality to log keystrokes (.Net Source)
Installs a global keyboard hook
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.technique.net.au", "Username": "logo@technique.net.au", "Password": "Business@2222"}
SourceRuleDescriptionAuthorStrings
c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x700:$s3: 83 EC 38 53 B0 3D 88 44 24 2B 88 44 24 2F B0 E8 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1e9d0:$s5: delete[]
  • 0x1de88:$s6: constructor or from DllMain.
SourceRuleDescriptionAuthorStrings
00000000.00000002.4094244027.0000000003745000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.4094244027.0000000003745000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.4094244027.0000000003745000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        00000000.00000002.4093598949.000000000270C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000002.4094811322.00000000050E0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 15 entries
            SourceRuleDescriptionAuthorStrings
            0.0.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x700:$s3: 83 EC 38 53 B0 3D 88 44 24 2B 88 44 24 2F B0 E8 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1e9d0:$s5: delete[]
            • 0x1de88:$s6: constructor or from DllMain.
            0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x700:$s3: 83 EC 38 53 B0 3D 88 44 24 2B 88 44 24 2F B0 E8 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1e9d0:$s5: delete[]
            • 0x1de88:$s6: constructor or from DllMain.
            0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610000.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610000.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610000.4.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  Click to see the 45 entries

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 122.201.84.5, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, Initiated: true, ProcessId: 6668, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49738
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeAvira: detected
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.technique.net.au", "Username": "logo@technique.net.au", "Password": "Business@2222"}
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeVirustotal: Detection: 54%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeJoe Sandbox ML: detected
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49730 version: TLS 1.2
                  Source: Binary string: _.pdb source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.1639474007.00000000004E9000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093403417.0000000002610000.00000004.08000000.00040000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093243032.000000000225E000.00000004.00000020.00020000.00000000.sdmp
                  Source: global trafficTCP traffic: 192.168.2.4:49738 -> 122.201.84.5:587
                  Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                  Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                  Source: Joe Sandbox ViewASN Name: DREAMSCAPE-AS-APDreamscapeNetworksLimitedAU DREAMSCAPE-AS-APDreamscapeNetworksLimitedAU
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: global trafficTCP traffic: 192.168.2.4:49738 -> 122.201.84.5:587
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                  Source: global trafficDNS traffic detected: DNS query: mail.technique.net.au
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.000000000298F000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002B70000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002804000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002ACB000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002854000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.00000000027C1000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.00000000028F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.technique.net.au
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095308322.00000000055E9000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548753308.00000000055DB000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3865071099.00000000055D7000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548488579.00000000055C3000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.000000000298F000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3549000830.0000000005ADD000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4092517684.00000000004D7000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002B70000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095038772.0000000005559000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548424836.0000000005547000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548447390.0000000005558000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.000000000270C000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548837275.00000000055E8000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548300536.000000000555F000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095499511.0000000005A10000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002778000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548876333.0000000005A45000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548602855.0000000005590000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864525401.00000000055CF000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4094997378.000000000552B000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002804000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095308322.00000000055E9000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548753308.00000000055DB000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3865071099.00000000055D7000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548488579.00000000055C3000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.000000000298F000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3549000830.0000000005ADD000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4092517684.00000000004D7000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002B70000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095038772.0000000005559000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548424836.0000000005547000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548447390.0000000005558000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.000000000270C000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548837275.00000000055E8000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548300536.000000000555F000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095499511.0000000005A10000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002778000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548876333.0000000005A45000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548602855.0000000005590000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864525401.00000000055CF000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4094997378.000000000552B000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002804000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.00000000026C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548753308.00000000055DB000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864438719.0000000005571000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548488579.00000000055C3000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095088181.0000000005571000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.000000000298F000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3549000830.0000000005ADD000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4092517684.00000000004D7000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002B70000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548837275.00000000055E8000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548300536.000000000555F000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864690101.00000000055E4000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864970405.000000000552A000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4094997378.000000000552B000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002804000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095276915.00000000055DC000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864708408.00000000055FB000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548978780.0000000005526000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4092517684.000000000049E000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095327160.00000000055FD000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002ACB000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095293551.00000000055E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548753308.00000000055DB000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864438719.0000000005571000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548488579.00000000055C3000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095088181.0000000005571000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.000000000298F000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3549000830.0000000005ADD000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4092517684.00000000004D7000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002B70000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548837275.00000000055E8000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548300536.000000000555F000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864690101.00000000055E4000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864970405.000000000552A000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4094997378.000000000552B000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002804000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095276915.00000000055DC000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864708408.00000000055FB000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548978780.0000000005526000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4092517684.000000000049E000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095327160.00000000055FD000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002ACB000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095293551.00000000055E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4094244027.0000000003745000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.1639474007.00000000004E9000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4094811322.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093403417.0000000002610000.00000004.08000000.00040000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093243032.000000000225E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4094244027.0000000003745000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.00000000026C1000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.1639474007.00000000004E9000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4094811322.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093403417.0000000002610000.00000004.08000000.00040000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093243032.000000000225E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                  Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49730 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, 3DlgK9re6m.cs.Net Code: xCBm
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                  System Summary

                  barindex
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, type: SAMPLEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0.0.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229ec5e.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229fb46.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229fb46.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.3.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.4e96e0.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610ee8.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229ec5e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.3.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.4e96e0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000000.00000002.4094811322.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000000.00000002.4093403417.0000000002610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_00408C600_2_00408C60
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_0040DC110_2_0040DC11
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_00407C3F0_2_00407C3F
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_00418CCC0_2_00418CCC
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_00406CA00_2_00406CA0
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_004028B00_2_004028B0
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_0041A4BE0_2_0041A4BE
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_00408C600_2_00408C60
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_004182440_2_00418244
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_004016500_2_00401650
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_00402F200_2_00402F20
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_004193C40_2_004193C4
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_004187880_2_00418788
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_00402F890_2_00402F89
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_00402B900_2_00402B90
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_004073A00_2_004073A0
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_0222D6200_2_0222D620
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_0222CA080_2_0222CA08
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_0222CD500_2_0222CD50
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_02220FD00_2_02220FD0
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_022210300_2_02221030
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_058005000_2_05800500
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_05B3C5A00_2_05B3C5A0
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_05B3DD900_2_05B3DD90
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_05B3B7C80_2_05B3B7C8
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_05B383580_2_05B38358
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_05B300060_2_05B30006
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_05B300400_2_05B30040
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_05B3D6A00_2_05B3D6A0
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_061C31540_2_061C3154
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_061C3A100_2_061C3A10
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_064806A80_2_064806A8
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_0648BF520_2_0648BF52
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_0648BF600_2_0648BF60
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_06485BD10_2_06485BD1
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: String function: 0040E1D8 appears 43 times
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4094244027.0000000003745000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamef2f28b76-fc5f-4a0c-983d-845e781e7a0d.exe4 vs c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamef2f28b76-fc5f-4a0c-983d-845e781e7a0d.exe4 vs c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.00000000026C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.1639474007.00000000004E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamef2f28b76-fc5f-4a0c-983d-845e781e7a0d.exe4 vs c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.1639474007.00000000004E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4094811322.00000000050E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamef2f28b76-fc5f-4a0c-983d-845e781e7a0d.exe4 vs c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4092264042.0000000000198000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093403417.0000000002610000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamef2f28b76-fc5f-4a0c-983d-845e781e7a0d.exe4 vs c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093243032.000000000225E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamef2f28b76-fc5f-4a0c-983d-845e781e7a0d.exe4 vs c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093243032.000000000225E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeBinary or memory string: OriginalFilenamef2f28b76-fc5f-4a0c-983d-845e781e7a0d.exe4 vs c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, type: SAMPLEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0.0.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229ec5e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229fb46.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229fb46.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610ee8.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.3.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.4e96e0.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610ee8.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229ec5e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.3.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.4e96e0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000000.00000002.4094811322.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000000.00000002.4093403417.0000000002610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeStatic PE information: Section: .rsrc ZLIB complexity 0.9952230798192772
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, slKb.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, mAKJ.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, xQRSe0Fg.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, n3rhMa.csCryptographic APIs: 'CreateDecryptor'
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, MQzE4FWn.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, nSmgRyX5a1.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, 6IMLmJtk.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, 6IMLmJtk.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, 3HroK7qN.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, 3HroK7qN.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@2/2
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,KiUserExceptionDispatcher,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,KiUserExceptionDispatcher,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCommand line argument: 08A0_2_00413780
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeVirustotal: Detection: 54%
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: _.pdb source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.1639474007.00000000004E9000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093403417.0000000002610000.00000004.08000000.00040000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093243032.000000000225E000.00000004.00000020.00020000.00000000.sdmp

                  Data Obfuscation

                  barindex
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229fb46.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610ee8.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 0.3.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.4e96e0.0.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,KiUserExceptionDispatcher,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeStatic PE information: real checksum: 0x23bfb should be: 0x4d812
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_0040E21D push ecx; ret 0_2_0040E230
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_0040BB97 push dword ptr [ecx-75h]; iretd 0_2_0040BBA3
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_02224347 push ebp; iretd 0_2_02224360
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_02224752 pushad ; retf 0_2_02224755
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_02224F5E push edx; ret 0_2_02224F63
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_061CC250 push es; ret 0_2_061CC260
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_061C2856 push 14062C2Fh; retf 0_2_061C2865
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_064833F0 push es; ret 0_2_064833F4
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_0648DF2F push ecx; ret 0_2_0648DF49
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'zcCE8fodSZvj4', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229fb46.2.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'zcCE8fodSZvj4', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610ee8.3.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'zcCE8fodSZvj4', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 0.3.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.4e96e0.0.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'zcCE8fodSZvj4', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeMemory allocated: 2180000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeMemory allocated: 26C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeMemory allocated: 2180000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,KiUserExceptionDispatcher,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1200000Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1199829Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1199704Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1199581Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1199454Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1199344Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1199212Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1199080Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1198938Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1198829Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1198704Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1198579Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1198454Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1198329Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1198204Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1198079Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1197954Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1197829Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1197704Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1197579Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1197454Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1197329Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1197204Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1197079Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1196954Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1196829Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1196704Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1196579Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1196454Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1196250Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1195969Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1195787Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1195640Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1195524Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1195422Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1195310Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1195203Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1195094Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1194969Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1194860Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1194735Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1194610Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1194485Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1194360Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1194235Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1194110Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1193985Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1193860Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1193735Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1193610Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1193485Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1193360Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWindow / User API: threadDelayed 2269Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWindow / User API: threadDelayed 7545Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -32281802128991695s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1200000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1199829s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1199704s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1199581s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1199454s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1199344s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1199212s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1199080s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1198938s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1198829s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1198704s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1198579s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1198454s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1198329s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1198204s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1198079s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1197954s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1197829s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1197704s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1197579s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1197454s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1197329s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1197204s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1197079s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1196954s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1196829s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1196704s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1196579s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1196454s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1196250s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1195969s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1195787s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1195640s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1195524s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1195422s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1195310s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1195203s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1195094s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1194969s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1194860s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1194735s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1194610s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1194485s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1194360s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1194235s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1194110s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1193985s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1193860s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1193735s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1193610s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1193485s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe TID: 1732Thread sleep time: -1193360s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1200000Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1199829Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1199704Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1199581Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1199454Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1199344Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1199212Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1199080Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1198938Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1198829Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1198704Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1198579Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1198454Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1198329Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1198204Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1198079Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1197954Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1197829Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1197704Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1197579Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1197454Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1197329Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1197204Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1197079Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1196954Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1196829Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1196704Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1196579Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1196454Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1196250Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1195969Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1195787Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1195640Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1195524Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1195422Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1195310Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1195203Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1195094Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1194969Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1194860Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1194735Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1194610Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1194485Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1194360Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1194235Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1194110Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1193985Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1193860Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1193735Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1193610Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1193485Jump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeThread delayed: delay time: 1193360Jump to behavior
                  Source: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.1653952673.0000000005A19000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864546853.0000000005A28000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095535541.0000000005A2B000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548876333.0000000005A27000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeAPI call chain: ExitProcess graph end nodegraph_0-48400
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040CE09
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,KiUserExceptionDispatcher,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,KiUserExceptionDispatcher,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_0040ADB0 GetProcessHeap,HeapFree,0_2_0040ADB0
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040CE09
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040E61C
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00416F6A
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_004123F1 SetUnhandledExceptionFilter,0_2_004123F1
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeMemory allocated: page read and write | page guardJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: GetLocaleInfoA,0_2_00417A20
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeCode function: 0_2_00412A15 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00412A15
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610000.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229ec5e.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229fb46.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229fb46.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610ee8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.4e96e0.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610ee8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229ec5e.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.4e96e0.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.4094244027.0000000003745000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4094811322.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1639474007.00000000004E9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4093403417.0000000002610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4093243032.000000000225E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe PID: 6668, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610000.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229ec5e.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229fb46.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229fb46.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610ee8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.4e96e0.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610ee8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229ec5e.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.4e96e0.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.4094244027.0000000003745000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4094811322.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1639474007.00000000004E9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4093403417.0000000002610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4093243032.000000000225E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610000.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229ec5e.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229fb46.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229fb46.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610ee8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.4e96e0.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610ee8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.4e96e0.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229ec5e.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.4094244027.0000000003745000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4093598949.000000000270C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4094811322.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1639474007.00000000004E9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4093403417.0000000002610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4093243032.000000000225E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe PID: 6668, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610000.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229ec5e.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229fb46.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229fb46.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610ee8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.4e96e0.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610ee8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229ec5e.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.4e96e0.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.4094244027.0000000003745000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4094811322.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1639474007.00000000004E9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4093403417.0000000002610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4093243032.000000000225E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe PID: 6668, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.50e0000.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610000.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229ec5e.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229fb46.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229fb46.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610ee8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.4e96e0.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.2610ee8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.229ec5e.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe.4e96e0.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.4094244027.0000000003745000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4094811322.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1639474007.00000000004E9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4093403417.0000000002610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.4093243032.000000000225E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  1
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Native API
                  Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
                  Deobfuscate/Decode Files or Information
                  21
                  Input Capture
                  1
                  File and Directory Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts2
                  Command and Scripting Interpreter
                  Logon Script (Windows)Logon Script (Windows)2
                  Obfuscated Files or Information
                  Security Account Manager35
                  System Information Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                  Software Packing
                  NTDS1
                  Query Registry
                  Distributed Component Object Model21
                  Input Capture
                  2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  DLL Side-Loading
                  LSA Secrets141
                  Security Software Discovery
                  SSH1
                  Clipboard Data
                  23
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts141
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials141
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Network Configuration Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe54%VirustotalBrowse
                  c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe100%AviraTR/Spy.Gen8
                  c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://api.ipify.org/0%URL Reputationsafe
                  http://r3.o.lencr.org00%URL Reputationsafe
                  https://api.ipify.org0%URL Reputationsafe
                  https://account.dyn.com/0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  http://x1.c.lencr.org/00%URL Reputationsafe
                  http://x1.i.lencr.org/00%URL Reputationsafe
                  http://r3.i.lencr.org/00%URL Reputationsafe
                  http://mail.technique.net.au0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  mail.technique.net.au
                  122.201.84.5
                  truetrue
                    unknown
                    api.ipify.org
                    104.26.12.205
                    truefalse
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/false
                      • URL Reputation: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://r3.o.lencr.org0c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095308322.00000000055E9000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548753308.00000000055DB000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3865071099.00000000055D7000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548488579.00000000055C3000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.000000000298F000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3549000830.0000000005ADD000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4092517684.00000000004D7000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002B70000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095038772.0000000005559000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548424836.0000000005547000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548447390.0000000005558000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.000000000270C000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548837275.00000000055E8000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548300536.000000000555F000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095499511.0000000005A10000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002778000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548876333.0000000005A45000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548602855.0000000005590000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864525401.00000000055CF000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4094997378.000000000552B000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002804000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.ipify.orgc2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4094244027.0000000003745000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.00000000026C1000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.1639474007.00000000004E9000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4094811322.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093403417.0000000002610000.00000004.08000000.00040000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093243032.000000000225E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://account.dyn.com/c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4094244027.0000000003745000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.1639474007.00000000004E9000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4094811322.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093403417.0000000002610000.00000004.08000000.00040000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093243032.000000000225E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namec2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.00000000026C1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://x1.c.lencr.org/0c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548753308.00000000055DB000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864438719.0000000005571000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548488579.00000000055C3000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095088181.0000000005571000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.000000000298F000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3549000830.0000000005ADD000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4092517684.00000000004D7000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002B70000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548837275.00000000055E8000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548300536.000000000555F000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864690101.00000000055E4000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864970405.000000000552A000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4094997378.000000000552B000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002804000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095276915.00000000055DC000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864708408.00000000055FB000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548978780.0000000005526000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4092517684.000000000049E000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095327160.00000000055FD000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002ACB000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095293551.00000000055E6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://x1.i.lencr.org/0c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548753308.00000000055DB000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864438719.0000000005571000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548488579.00000000055C3000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095088181.0000000005571000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.000000000298F000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3549000830.0000000005ADD000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4092517684.00000000004D7000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002B70000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548837275.00000000055E8000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548300536.000000000555F000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864690101.00000000055E4000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864970405.000000000552A000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4094997378.000000000552B000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002804000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095276915.00000000055DC000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864708408.00000000055FB000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548978780.0000000005526000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4092517684.000000000049E000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095327160.00000000055FD000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002ACB000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095293551.00000000055E6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://mail.technique.net.auc2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.000000000298F000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002B70000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002804000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002ACB000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002854000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.00000000027C1000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.00000000028F9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://r3.i.lencr.org/0c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095308322.00000000055E9000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548753308.00000000055DB000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3865071099.00000000055D7000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548488579.00000000055C3000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.000000000298F000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3549000830.0000000005ADD000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4092517684.00000000004D7000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002B70000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095038772.0000000005559000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548424836.0000000005547000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548447390.0000000005558000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.000000000270C000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548837275.00000000055E8000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548300536.000000000555F000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4095499511.0000000005A10000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002778000.00000004.00000800.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548876333.0000000005A45000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3548602855.0000000005590000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000003.3864525401.00000000055CF000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4094997378.000000000552B000.00000004.00000020.00020000.00000000.sdmp, c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe, 00000000.00000002.4093598949.0000000002804000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      104.26.12.205
                      api.ipify.orgUnited States
                      13335CLOUDFLARENETUSfalse
                      122.201.84.5
                      mail.technique.net.auAustralia
                      38719DREAMSCAPE-AS-APDreamscapeNetworksLimitedAUtrue
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1467942
                      Start date and time:2024-07-05 06:00:07 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 7m 52s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:6
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@1/0@2/2
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 98%
                      • Number of executed functions: 84
                      • Number of non-executed functions: 37
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      TimeTypeDescription
                      00:00:55API Interceptor10106515x Sleep call for process: c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      104.26.12.205SecuriteInfo.com.Win64.RansomX-gen.22171.1307.exeGet hashmaliciousConti, PureLog Stealer, Targeted RansomwareBrowse
                      • api.ipify.org/
                      482730621.exeGet hashmaliciousStealitBrowse
                      • api.ipify.org/?format=json
                      482730621.exeGet hashmaliciousStealitBrowse
                      • api.ipify.org/?format=json
                      Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                      • api.ipify.org/?format=json
                      Sky-Beta.exeGet hashmaliciousStealitBrowse
                      • api.ipify.org/?format=json
                      SecuriteInfo.com.Backdoor.Win32.Agent.myuuxz.13708.17224.exeGet hashmaliciousBunny LoaderBrowse
                      • api.ipify.org/
                      lods.cmdGet hashmaliciousRemcosBrowse
                      • api.ipify.org/
                      122.201.84.50NJYTCJYLo.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        B24E33 ENQUIRY.vbeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          mail.technique.net.au0NJYTCJYLo.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 122.201.84.5
                          B24E33 ENQUIRY.vbeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 122.201.84.5
                          api.ipify.orgXX(1).exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 172.67.74.152
                          Ship Docs_CI PL HBL COO_.exeGet hashmaliciousAgentTeslaBrowse
                          • 104.26.12.205
                          M.V TBN - VESSEL'S DETAILS.docx.scr.exeGet hashmaliciousAgentTeslaBrowse
                          • 104.26.13.205
                          0001.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 172.67.74.152
                          Zz3h8cOX1E.exeGet hashmaliciousQuasarBrowse
                          • 104.26.13.205
                          Luciana Alvarez CV.exeGet hashmaliciousAgentTeslaBrowse
                          • 104.26.13.205
                          Acal BFi UK - Products List 020240704.exeGet hashmaliciousAgentTesla, RedLine, StormKitty, XWormBrowse
                          • 172.67.74.152
                          z4XlS0wTQM.exeGet hashmaliciousQuasarBrowse
                          • 104.26.12.205
                          Zz3h8cOX1E.exeGet hashmaliciousQuasarBrowse
                          • 104.26.13.205
                          5gO02Ijl9V.exeGet hashmaliciousGuLoaderBrowse
                          • 104.26.12.205
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          CLOUDFLARENETUS6xmBUtHylU.exeGet hashmaliciousLummaCBrowse
                          • 188.114.96.3
                          XX(1).exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 172.67.74.152
                          OVER DUE INVOICE PAYMENT.docxGet hashmaliciousSnake KeyloggerBrowse
                          • 188.114.96.3
                          https://m.exactag.com/ai.aspx?tc=d9912543bc40b07205bbd26a23a8d2e6b6b4f9&url=http%253AW0S.sdscondo.com/index.xml%23?email=cGV0ZXIuYnJvd24yM0Bxci5jb20uYXU=Get hashmaliciousHTMLPhisherBrowse
                          • 104.17.2.184
                          Ship Docs_CI PL HBL COO_.exeGet hashmaliciousAgentTeslaBrowse
                          • 104.26.12.205
                          https://rb.gy/zsqpjaGet hashmaliciousHTMLPhisherBrowse
                          • 104.17.2.184
                          https://singingfiles.com/show.php?l=0&u=2156442&id=64574Get hashmaliciousUnknownBrowse
                          • 188.114.97.3
                          http://business.ifbsmetaiidentiityconfirms.com/meta-community-standard100068928266341/Get hashmaliciousHTMLPhisherBrowse
                          • 188.114.97.3
                          http://services.business-manange.com/Get hashmaliciousHTMLPhisherBrowse
                          • 172.67.138.117
                          http://pub-2e7429ed1f544f43a4684eeceb978dbb.r2.dev/home.htmlGet hashmaliciousHTMLPhisherBrowse
                          • 104.18.2.35
                          DREAMSCAPE-AS-APDreamscapeNetworksLimitedAUhttps://scm.ci/cgi-bin/redirect.phpGet hashmaliciousUnknownBrowse
                          • 27.123.25.1
                          0NJYTCJYLo.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 122.201.84.5
                          https://scm.ci/cgi-bin/redirect.phpGet hashmaliciousUnknownBrowse
                          • 27.123.25.1
                          https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2flodgesonvashon.us11.list%2dmanage.com%2ftrack%2fclick%3fu%3d7bd9671a0b3250a7fef40b908%26id%3d9037f6334e%26e%3d176d192631&umid=c3b5e576-eabb-43b1-b355-8b3314499765&auth=f59947c46ffdca8529044338828c8694fe545b0c-470863c8cfe4c44d03e20bf02e2ceab308b9cbffGet hashmaliciousUnknownBrowse
                          • 203.170.87.17
                          B24E33 ENQUIRY.vbeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 122.201.84.5
                          https://scm.ci/cgi-bin/redirect.phpGet hashmaliciousUnknownBrowse
                          • 27.123.25.1
                          https://www.thaicreate.com/outlink.php?l=https://p6f.org/mI1AchQ3EllQ3Ez01lavallQ3EQ3E2APchD5QD5Q4DCz01oTx4RAW4GGet hashmaliciousHTMLPhisherBrowse
                          • 203.170.87.81
                          https://is.gd/Drz8uTGet hashmaliciousUnknownBrowse
                          • 103.254.137.2
                          malware.htmlGet hashmaliciousHTMLPhisherBrowse
                          • 185.184.154.145
                          tXwY81Gv84.elfGet hashmaliciousMiraiBrowse
                          • 116.0.24.106
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          3b5074b1b5d032e5620f69f9f700ff0eXX(1).exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 104.26.12.205
                          Ship Docs_CI PL HBL COO_.exeGet hashmaliciousAgentTeslaBrowse
                          • 104.26.12.205
                          https://singingfiles.com/show.php?l=0&u=2156442&id=64574Get hashmaliciousUnknownBrowse
                          • 104.26.12.205
                          https://sula.starladeroff.com/Get hashmaliciousUnknownBrowse
                          • 104.26.12.205
                          http://business.ifbsmetaiidentiityconfirms.com/meta-community-standard100068928266341/Get hashmaliciousHTMLPhisherBrowse
                          • 104.26.12.205
                          http://helpdesk-advertising-review-id-9865133.d3m7n55z273utf.amplifyapp.com/index.htmlGet hashmaliciousUnknownBrowse
                          • 104.26.12.205
                          https://pub-9445ce0d74714d1c934c51ffcf83c3f2.r2.dev/slnt.html?nycsbsGet hashmaliciousHTMLPhisherBrowse
                          • 104.26.12.205
                          https://pradeeprunner.com/auth.htmlGet hashmaliciousUnknownBrowse
                          • 104.26.12.205
                          https://iwahadxi.hosted.phplist.com/lists/lt.php/?tid=eU1SAFEEUlZTABhUAVAGGAZWVFsfXVQLWkkDBQIAUAwCAgcAAldPWwdaBlNRVAgYVwEEXh9QClxcSQcAUlcbWgQGAAJVVwRXBAoBSQcBAVALVA8LHwIEXVtJUg8GVxsAVVMHGA5SB1EBC1YDAQQBDAGet hashmaliciousUnknownBrowse
                          • 104.26.12.205
                          http://multichaindappsx.pages.dev/Get hashmaliciousUnknownBrowse
                          • 104.26.12.205
                          No context
                          No created / dropped files found
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):7.537140181080374
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe
                          File size:266'752 bytes
                          MD5:e96cdfd7c641b4fea03541b97f6342a1
                          SHA1:535e5952f7fa869edae1296ba904632207c44aef
                          SHA256:1131e8baca9159531db856b4f814c52fd05e7dc32a5412d7e52a41e731e55be9
                          SHA512:dca000cf7cfea99b4a79e27489b098c9a07fef6dad19ed3fffeaa3a5696e69a07737449758f68179568222563c9c66cc09609b6189d66a0c414b9ae288736463
                          SSDEEP:3072:gDKW1LgppLRHMY0TBfJvjcTp5XnN4f28uuQbz588HwmGahgFR9dBkdXQ8ythtzt/:gDKW1Lgbdl0TBBvjc/nKlYa8HJGLdVCq
                          TLSH:CF44DF207580C1B3C477153544EACB799A36303607B996D7BB9D2BBA6F213E1A3352CE
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......h..-,q.~,q.~,q.~2#.~?q.~...~+q.~,q.~\q.~2#n~.q.~2#i~.q.~2#{~-q.~Rich,q.~..................:f....PE..L...t..P..........#........
                          Icon Hash:90cececece8e8eb0
                          Entrypoint:0x40cd2f
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                          DLL Characteristics:TERMINAL_SERVER_AWARE
                          Time Stamp:0x5000A574 [Fri Jul 13 22:47:16 2012 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:5
                          OS Version Minor:0
                          File Version Major:5
                          File Version Minor:0
                          Subsystem Version Major:5
                          Subsystem Version Minor:0
                          Import Hash:bf5a4aa99e5b160f8521cadd6bfe73b8
                          Instruction
                          call 00007F9248B96596h
                          jmp 00007F9248B90759h
                          mov edi, edi
                          push ebp
                          mov ebp, esp
                          sub esp, 20h
                          mov eax, dword ptr [ebp+08h]
                          push esi
                          push edi
                          push 00000008h
                          pop ecx
                          mov esi, 0041F058h
                          lea edi, dword ptr [ebp-20h]
                          rep movsd
                          mov dword ptr [ebp-08h], eax
                          mov eax, dword ptr [ebp+0Ch]
                          pop edi
                          mov dword ptr [ebp-04h], eax
                          pop esi
                          test eax, eax
                          je 00007F9248B908BEh
                          test byte ptr [eax], 00000008h
                          je 00007F9248B908B9h
                          mov dword ptr [ebp-0Ch], 01994000h
                          lea eax, dword ptr [ebp-0Ch]
                          push eax
                          push dword ptr [ebp-10h]
                          push dword ptr [ebp-1Ch]
                          push dword ptr [ebp-20h]
                          call dword ptr [0041B000h]
                          leave
                          retn 0008h
                          ret
                          mov eax, 00413563h
                          mov dword ptr [004228E4h], eax
                          mov dword ptr [004228E8h], 00412C4Ah
                          mov dword ptr [004228ECh], 00412BFEh
                          mov dword ptr [004228F0h], 00412C37h
                          mov dword ptr [004228F4h], 00412BA0h
                          mov dword ptr [004228F8h], eax
                          mov dword ptr [004228FCh], 004134DBh
                          mov dword ptr [00422900h], 00412BBCh
                          mov dword ptr [00422904h], 00412B1Eh
                          mov dword ptr [00422908h], 00412AABh
                          ret
                          mov edi, edi
                          push ebp
                          mov ebp, esp
                          call 00007F9248B9084Bh
                          call 00007F9248B970D0h
                          cmp dword ptr [ebp+00h], 00000000h
                          Programming Language:
                          • [ASM] VS2008 build 21022
                          • [IMP] VS2005 build 50727
                          • [C++] VS2008 build 21022
                          • [ C ] VS2008 build 21022
                          • [LNK] VS2008 build 21022
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x215b40x50.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x260000x1f1bc.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x1b1c00x1c.rdata
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x20da00x40.rdata
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x1b0000x184.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x197180x198005e0f3421531e3d473f13824d067273fbFalse0.5789483762254902data6.748552727161787IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x1b0000x6db40x6e005826801f33fc1b607aa8e942aa92e9faFalse0.5467329545454546data6.442956247632331IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0x220000x30c00x16002fe51a72ede820cd7cf55a77ba59b1f4False0.3126775568181818data3.2625868398009703IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x260000x1f1bc0x1f20079f9ec68b11758f8d217adc07088cec8False0.9952230798192772data7.994924071112424IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_RCDATA0x261240x1ebcfdata1.0003653606347744
                          RT_RCDATA0x44cf40x20data1.28125
                          RT_VERSION0x44d140x2bcdata0.44
                          RT_MANIFEST0x44fd00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                          DLLImport
                          KERNEL32.dllRaiseException, GetLastError, MultiByteToWideChar, lstrlenA, InterlockedDecrement, GetProcAddress, LoadLibraryA, FreeResource, SizeofResource, LockResource, LoadResource, FindResourceA, GetModuleHandleA, Module32Next, CloseHandle, Module32First, CreateToolhelp32Snapshot, GetCurrentProcessId, SetEndOfFile, GetStringTypeW, GetStringTypeA, LCMapStringW, LCMapStringA, GetLocaleInfoA, HeapFree, GetProcessHeap, HeapAlloc, GetCommandLineA, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, VirtualAlloc, HeapReAlloc, HeapSize, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetModuleHandleW, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, ReadFile, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, FlushFileBuffers, SetFilePointer, SetHandleCount, GetFileType, GetStartupInfoA, RtlUnwind, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, CompareStringA, CompareStringW, SetEnvironmentVariableA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, SetStdHandle, CreateFileA
                          ole32.dllOleInitialize
                          OLEAUT32.dllSafeArrayCreate, SafeArrayAccessData, SafeArrayUnaccessData, SafeArrayDestroy, SafeArrayCreateVector, VariantClear, VariantInit, SysFreeString, SysAllocString
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 5, 2024 06:00:55.838167906 CEST49730443192.168.2.4104.26.12.205
                          Jul 5, 2024 06:00:55.838196039 CEST44349730104.26.12.205192.168.2.4
                          Jul 5, 2024 06:00:55.838304043 CEST49730443192.168.2.4104.26.12.205
                          Jul 5, 2024 06:00:55.851339102 CEST49730443192.168.2.4104.26.12.205
                          Jul 5, 2024 06:00:55.851355076 CEST44349730104.26.12.205192.168.2.4
                          Jul 5, 2024 06:00:56.330765963 CEST44349730104.26.12.205192.168.2.4
                          Jul 5, 2024 06:00:56.330854893 CEST49730443192.168.2.4104.26.12.205
                          Jul 5, 2024 06:00:56.334939957 CEST49730443192.168.2.4104.26.12.205
                          Jul 5, 2024 06:00:56.334949017 CEST44349730104.26.12.205192.168.2.4
                          Jul 5, 2024 06:00:56.335238934 CEST44349730104.26.12.205192.168.2.4
                          Jul 5, 2024 06:00:56.386421919 CEST49730443192.168.2.4104.26.12.205
                          Jul 5, 2024 06:00:56.399410963 CEST49730443192.168.2.4104.26.12.205
                          Jul 5, 2024 06:00:56.440541029 CEST44349730104.26.12.205192.168.2.4
                          Jul 5, 2024 06:00:56.538403988 CEST44349730104.26.12.205192.168.2.4
                          Jul 5, 2024 06:00:56.538489103 CEST44349730104.26.12.205192.168.2.4
                          Jul 5, 2024 06:00:56.538564920 CEST49730443192.168.2.4104.26.12.205
                          Jul 5, 2024 06:00:56.568008900 CEST49730443192.168.2.4104.26.12.205
                          Jul 5, 2024 06:02:34.534404993 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:34.539282084 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:34.539380074 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:35.787312031 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:35.787545919 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:35.792417049 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:36.100128889 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:36.100398064 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:36.105269909 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:36.418004990 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:36.418442965 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:36.429444075 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:36.758630037 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:36.758647919 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:36.758661985 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:36.758744955 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:36.773044109 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:36.777906895 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:37.085483074 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:37.091497898 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:37.096352100 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:37.403538942 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:37.407494068 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:37.412389994 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:37.719795942 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:37.720166922 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:37.725112915 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:38.321947098 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:38.352866888 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:38.358455896 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:38.665534973 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:38.676564932 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:38.682722092 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:38.998826027 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.002723932 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.010135889 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.317107916 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.328274965 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.328772068 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.328843117 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.328918934 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.330152988 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.333265066 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.333329916 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.333576918 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.333607912 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.333760977 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.333810091 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.335051060 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.335061073 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.335083961 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.335093021 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.335100889 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.335109949 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.335143089 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.335148096 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.335169077 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.335185051 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.338170052 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.338180065 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.338226080 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.338464975 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.338474989 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.338522911 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.338603020 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.338651896 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.339988947 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.340059042 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.340100050 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.340168953 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.340209961 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.340224028 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.340260983 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.340281010 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.343081951 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.343133926 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.343210936 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.343264103 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.343281984 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.343331099 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.343368053 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.343416929 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.344713926 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.344790936 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.344934940 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.344996929 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.345036983 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.345113039 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.345242977 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.345253944 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.345304966 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:02:39.345305920 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.345426083 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.345531940 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.345541954 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.345550060 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.345560074 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.348067045 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.348076105 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.348150969 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.348160982 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.348169088 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.348189116 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.348197937 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.348206997 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.349509001 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.349519968 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.349536896 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.349545956 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.349587917 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.349596977 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.349605083 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.349613905 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.349914074 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.349988937 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.349998951 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.350074053 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.350136042 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.350176096 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.350224018 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.350275040 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.350366116 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.350419998 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.350491047 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.350500107 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.350549936 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:39.350560904 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:40.310030937 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:02:40.355317116 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:14.394565105 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:14.400458097 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:14.708101988 CEST58749738122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:14.708858967 CEST49738587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:14.714570999 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:14.720582962 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:14.720664978 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:15.856456041 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:15.866574049 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:15.871689081 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:16.175806046 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:16.182564974 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:16.187480927 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:16.493336916 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:16.493791103 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:16.498548985 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:16.816564083 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:16.816577911 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:16.816584110 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:16.816591024 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:16.816718102 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:16.820688963 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:16.825432062 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:17.129883051 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:17.130825996 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:17.135680914 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:17.439744949 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:17.439999104 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:17.445209980 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:17.750021935 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:17.750344038 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:17.755194902 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:18.080255032 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:18.080596924 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:18.085504055 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:18.390178919 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:18.390454054 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:18.395319939 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:18.708074093 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:18.708810091 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:18.713757992 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.018107891 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.032655954 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.032747984 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.032778978 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.037714005 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.037725925 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.037735939 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.072176933 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.076983929 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.084233046 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.090367079 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.090389013 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.090418100 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.090440035 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.090447903 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.090491056 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.090627909 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.090663910 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.090672970 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.090682983 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.090693951 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.090719938 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.090737104 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.091672897 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.091726065 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.091763973 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.091778040 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.091790915 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.091801882 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.091815948 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.091829062 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.097168922 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.097203970 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.097223997 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.097244978 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.097793102 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.097832918 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.097866058 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.097878933 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.097910881 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.097918987 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.097940922 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.097963095 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.097979069 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.099539042 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.099600077 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.099634886 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.099674940 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.099679947 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.099709034 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.103962898 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.104007006 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.104506969 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.104526043 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.104568005 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.104635954 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.104648113 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.104743004 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.104968071 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.104978085 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.104988098 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.104998112 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.105010986 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.106336117 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.106345892 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.106358051 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.106596947 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.106606960 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.106640100 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.106650114 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.106697083 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.106707096 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.106718063 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.106801033 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.120309114 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.120337963 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.120337963 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.120413065 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.120434046 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:19.126672029 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.126681089 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.126786947 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.126796961 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.126806021 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.126815081 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.126832962 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.126842022 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.126904011 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.126914024 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.126965046 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.126975060 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.126991987 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.127001047 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.127010107 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.127063990 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.127074003 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.127427101 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.127454996 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.127558947 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:19.127568960 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:20.058800936 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:20.129220963 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:22.729159117 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:22.734040022 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:23.038222075 CEST58749739122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:23.077553988 CEST49739587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:23.085810900 CEST49740587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:23.090678930 CEST58749740122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:23.092063904 CEST49740587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:24.172553062 CEST58749740122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:24.172703981 CEST49740587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:24.177632093 CEST58749740122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:24.475943089 CEST58749740122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:24.476109982 CEST49740587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:24.480926037 CEST58749740122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:24.780406952 CEST58749740122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:24.780786991 CEST49740587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:24.785824060 CEST58749740122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:25.036639929 CEST49740587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:25.042898893 CEST58749740122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:25.044828892 CEST49740587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:25.082401991 CEST49741587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:25.088449001 CEST58749741122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:25.089070082 CEST49741587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:26.162312984 CEST58749741122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:26.162451029 CEST49741587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:26.167274952 CEST58749741122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:26.466238022 CEST58749741122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:26.466522932 CEST49741587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:26.471393108 CEST58749741122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:26.772327900 CEST58749741122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:26.772701979 CEST49741587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:26.777770996 CEST58749741122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:27.087920904 CEST58749741122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:27.087946892 CEST58749741122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:27.087960958 CEST58749741122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:27.090807915 CEST49741587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:27.094573975 CEST49741587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:27.101196051 CEST58749741122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:27.399401903 CEST58749741122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:27.409666061 CEST49741587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:27.416062117 CEST58749741122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:27.876384974 CEST58749741122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:27.878899097 CEST49741587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:27.885049105 CEST58749741122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:28.185787916 CEST58749741122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:28.186155081 CEST49741587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:28.205131054 CEST58749741122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:28.465368032 CEST49741587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:28.470691919 CEST58749741122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:28.470750093 CEST49741587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:28.532288074 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:28.537158966 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:28.537239075 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:29.349941969 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:29.350181103 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:29.355046988 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:30.462814093 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:30.462949038 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:30.463052034 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:30.463063002 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:30.463093996 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:30.463109016 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:30.467777014 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:30.773812056 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:30.774605989 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:30.779434919 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:31.092952967 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:31.092968941 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:31.092987061 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:31.093147993 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:31.094696999 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:31.099586964 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:31.404402971 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:31.406577110 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:31.411451101 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:31.716495037 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:31.718903065 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:31.724843025 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:32.032566071 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:32.032861948 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:32.040227890 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:32.357786894 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:32.357983112 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:32.362888098 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:32.667737961 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:32.668159962 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:32.673054934 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.047766924 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.054575920 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.059401035 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.494015932 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.494427919 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.494427919 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.494460106 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.494645119 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.495980978 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.499306917 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.499317884 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.499325991 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.499382973 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.499416113 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.499581099 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.501285076 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.501293898 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.501302004 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.501312017 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.501395941 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.501395941 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.501494884 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.501503944 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.501512051 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.501547098 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.501605988 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.503972054 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.503981113 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.504045010 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.504156113 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.504204988 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.504296064 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.504398108 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.506325006 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.506395102 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.506582975 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.506753922 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.506876945 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.508846998 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.508898020 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.508935928 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.508970022 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.509023905 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.509254932 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.509413004 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.509522915 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.511331081 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.511532068 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.511753082 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.511862993 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.511921883 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.511949062 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.511976004 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.512047052 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.512123108 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.512183905 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.512185097 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:33.512248993 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.512307882 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.512316942 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.512413979 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.512423992 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.512458086 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.512466908 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.512515068 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.512523890 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.513746977 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.513972044 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.514027119 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.514072895 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.514081955 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.514134884 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.514143944 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.514173985 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.516244888 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.516335011 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.516345024 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.516577005 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.516699076 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.516707897 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.516761065 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.516769886 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.516844988 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.516854048 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.516911030 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.516920090 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.516963959 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.516973972 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.517066956 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.517076969 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.517129898 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:33.517222881 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:34.455773115 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:34.496025085 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:36.585995913 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:36.590960026 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:36.931713104 CEST58749742122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:36.933686018 CEST49742587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:36.936606884 CEST49743587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:36.945136070 CEST58749743122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:36.952593088 CEST49743587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:38.082988977 CEST58749743122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:38.083126068 CEST49743587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:38.087954998 CEST58749743122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:38.389360905 CEST58749743122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:38.389523029 CEST49743587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:38.394398928 CEST58749743122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:38.402570963 CEST49743587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:38.407994986 CEST58749743122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:38.408057928 CEST49743587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:38.470411062 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:38.475346088 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:38.475419044 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:39.267546892 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:39.267739058 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:39.272573948 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:39.572573900 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:39.572855949 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:39.577828884 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:39.877355099 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:39.877733946 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:39.882591963 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:40.189887047 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:40.189910889 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:40.189925909 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:40.189961910 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:40.192882061 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:40.197698116 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:40.496296883 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:40.498123884 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:40.503082037 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:40.801944017 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:40.802822113 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:40.807832956 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:41.109982014 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:41.110848904 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:41.116456985 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:41.720702887 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:41.721223116 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:41.726749897 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.025026083 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.025254011 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.030100107 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.351095915 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.357750893 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.363078117 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.661526918 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.663407087 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.663501978 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.663572073 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.663667917 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.668625116 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.668658018 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.668669939 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.668679953 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.700177908 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.705123901 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.705136061 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.705179930 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.705189943 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.705197096 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.705229998 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.705240011 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.705255985 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.705259085 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.705270052 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.705303907 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.705311060 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.705329895 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.705338001 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.705349922 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.705382109 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.709677935 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.709727049 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.709990025 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.710052967 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.710150003 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.710202932 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.710216045 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.710268021 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.710300922 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.710345030 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.710391045 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.710443974 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.710468054 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.710522890 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.710555077 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.710608006 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.710632086 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.710680008 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.710697889 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.710747004 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.710767984 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.712301016 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.714551926 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.714616060 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.714776039 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.714828014 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.715007067 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715018034 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715063095 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.715095043 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:42.715157986 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715190887 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715240002 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715298891 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715323925 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715393066 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715445042 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715456009 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715506077 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715514898 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715554953 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715564966 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715611935 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715621948 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715670109 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715678930 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715739012 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715749025 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715759039 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715835094 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715848923 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.715867996 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.717051029 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.717138052 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.717148066 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.717315912 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.717325926 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.719433069 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.719861031 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.719872952 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.719983101 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.719993114 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.720010996 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.720020056 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.720077991 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.720088005 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.720133066 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.720223904 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.720233917 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:42.720242977 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:43.636904955 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:43.839776039 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:54.798336983 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:54.803169966 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:55.101679087 CEST58749744122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:55.102195024 CEST49744587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:55.106597900 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:55.111432076 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:55.111500025 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:55.909920931 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:55.910726070 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:55.916560888 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:56.219146967 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:56.219301939 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:56.224138975 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:56.528192043 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:56.528676987 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:56.533550978 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:56.885138988 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:56.885199070 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:56.885255098 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:56.885257006 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:56.887139082 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:56.892251968 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:57.195138931 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:57.200496912 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:57.205396891 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:57.508078098 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:57.508356094 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:57.514121056 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:57.817122936 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:57.818800926 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:57.823645115 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:58.147583008 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:58.147818089 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:58.152743101 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:58.455553055 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:58.455735922 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:58.460721016 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:58.770806074 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:58.770971060 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:58.776087046 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.078527927 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.078836918 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.078895092 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.078895092 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.080226898 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.080226898 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.084078074 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.084089041 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.084098101 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.084209919 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.085325003 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.085483074 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.085493088 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.085503101 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.085513115 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.085603952 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.085603952 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.085640907 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.085650921 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.085659027 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.085793972 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.088632107 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.088643074 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.088848114 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.089041948 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.089131117 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.090502024 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.090557098 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.090600014 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.090611935 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.090615034 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.090682983 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.090785980 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.090814114 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.090816021 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.090847015 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.090874910 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.090904951 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.090985060 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.093698025 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.093863010 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.093997955 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.095247984 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.095383883 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.095427036 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.095484972 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.095588923 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.095845938 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.095916033 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.095941067 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.095956087 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.095988989 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.096025944 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.096051931 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.096054077 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.096124887 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.096134901 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.096183062 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.096220970 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.096230984 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.096317053 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.096327066 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.096430063 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.096441031 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.096915960 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.098851919 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100001097 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100011110 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100254059 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100265026 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100272894 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100285053 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100292921 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100375891 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100389957 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100516081 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100526094 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100589037 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100617886 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100672007 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100691080 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100742102 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100750923 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100853920 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100862980 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100939989 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.100949049 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.101011038 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.101021051 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.101094007 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.101103067 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.101111889 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.480963945 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.486121893 CEST58749745122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.486242056 CEST49745587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.548114061 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:03:59.552922964 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:03:59.556813002 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:00.363586903 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:00.363732100 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:00.368685961 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:00.675371885 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:00.675542116 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:00.680380106 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:00.988118887 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:00.992711067 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:00.997608900 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:01.319009066 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:01.319025993 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:01.319035053 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:01.319152117 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:01.320605993 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:01.325474977 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:01.632024050 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:01.640718937 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:01.645570040 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:01.951411009 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:01.954550028 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:01.959572077 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:02.265934944 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:02.267112017 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:02.272010088 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:02.594713926 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:02.594943047 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:02.599812984 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:02.905704021 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:02.905911922 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:02.910768032 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.227157116 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.228660107 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.233449936 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.539623022 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.539982080 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.540090084 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.540105104 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.540158033 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.543209076 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.544913054 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.544953108 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.544962883 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.544970989 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.545022964 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.545094967 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.548067093 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.548075914 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.548118114 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.548127890 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.548171043 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.548175097 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.548175097 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.548182011 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.548199892 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.548222065 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.548291922 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.549666882 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.549726009 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.549787045 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.549787045 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.549788952 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.549952030 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.549952984 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.550074100 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.553035021 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.553075075 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.553090096 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.553131104 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.553173065 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.553209066 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.553212881 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.553224087 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.553232908 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.553309917 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.553354979 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.553472042 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.554574013 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.554583073 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.554686069 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.554764986 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.554862022 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.554897070 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.555064917 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.557930946 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.557987928 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.558024883 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.558034897 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.558079004 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.558099985 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.558116913 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.558128119 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.558155060 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.558232069 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.558306932 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.558343887 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.558396101 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.558406115 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.558413982 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.558423996 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.559441090 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.559489012 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.559499025 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.559691906 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.559703112 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.559784889 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.559796095 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.559813023 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.559823036 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.559875011 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.559885025 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.559894085 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.559994936 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.560003996 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.560015917 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.560060978 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.562832117 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.562889099 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.562899113 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.562975883 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.562985897 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.562994957 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.563074112 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.563091040 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.563188076 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.563196898 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.563205004 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.563214064 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.715512037 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.720662117 CEST58749746122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.721358061 CEST49746587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.789777040 CEST49747587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:03.794681072 CEST58749747122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:03.794766903 CEST49747587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:04.011831999 CEST49747587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:04.016769886 CEST58749747122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:04.016836882 CEST49747587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:04.070225000 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:04.075073957 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:04.075138092 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:05.038444996 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:05.038660049 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:05.043554068 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:05.343961000 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:05.350456953 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:05.356071949 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:05.657335997 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:05.713669062 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:05.718683958 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:06.027543068 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:06.027565956 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:06.027580023 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:06.027627945 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:06.033094883 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:06.037908077 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:06.338150024 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:06.386704922 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:06.412089109 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:06.416965961 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:06.716949940 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:06.717134953 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:06.722217083 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:07.022422075 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:07.026618004 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:07.031461000 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:07.354018927 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:07.354253054 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:07.359181881 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:07.658824921 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:07.659017086 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:07.664103985 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:07.973980904 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:07.974195004 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:07.979204893 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.278995991 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.286437988 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.286750078 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.286789894 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.286838055 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.290738106 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.291294098 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.291349888 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.291552067 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.291589975 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.291870117 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.291909933 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.295922041 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.295933008 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.295941114 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.295954943 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.295964003 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.295973063 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.295969963 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.295999050 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.295999050 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.296017885 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.296022892 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.296027899 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.296061039 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.296077013 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.296288967 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.296298027 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.296340942 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.296669006 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.296716928 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.300954103 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.301008940 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.301063061 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.301073074 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.301142931 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.301183939 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.301194906 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.301206112 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.301249027 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.301274061 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.301295042 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.301306009 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.301311970 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.301359892 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.301619053 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.301691055 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.305852890 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.305917978 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.305974007 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306024075 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306034088 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306036949 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:08.306108952 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306138992 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306157112 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306361914 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306548119 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306586027 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306633949 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306672096 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306716919 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306725979 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306759119 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306773901 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306845903 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306854963 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306864977 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306874037 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306916952 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306926012 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.306936026 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.310709953 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.310720921 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.310779095 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.310795069 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.311044931 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.311053991 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.311062098 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.311072111 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:08.311079979 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:09.239799976 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:09.373826981 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:38.041385889 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:38.046338081 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:38.346441031 CEST58749748122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:38.346822977 CEST49748587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:38.347881079 CEST49749587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:38.352710962 CEST58749749122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:38.352783918 CEST49749587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:38.418958902 CEST49749587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:38.423852921 CEST58749749122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:38.423913956 CEST49749587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:38.497751951 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:38.502619982 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:38.502681971 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:39.313868999 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:39.314026117 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:39.318921089 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:39.625488997 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:39.625688076 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:39.630599022 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:39.937892914 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:39.942151070 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:39.946899891 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:40.261420965 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:40.261442900 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:40.261456966 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:40.261507988 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:40.264518023 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:40.269270897 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:40.576159954 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:40.578530073 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:40.583528996 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:40.892282963 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:40.892503023 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:40.897301912 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:41.205238104 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:41.206892967 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:41.211743116 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:41.535388947 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:41.535650015 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:41.540451050 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:41.846666098 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:41.846951008 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:41.851773024 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.168654919 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.168816090 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.173599005 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.479424953 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.479810953 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.479895115 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.479940891 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.480026007 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.481539965 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.486978054 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.487030029 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.487134933 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.487293005 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.487303972 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.487349987 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.488430023 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.488440990 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.488492012 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.488553047 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.488562107 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.488569975 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.488579035 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.488609076 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.488637924 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.488682985 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.488729954 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.494689941 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.494700909 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.494752884 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.494815111 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.494859934 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.495130062 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.495182991 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.495704889 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.495753050 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.495846033 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.495898962 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.495973110 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.495981932 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.495990992 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.496016979 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.496054888 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.496129990 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.496180058 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.496309042 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.496356010 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.499742031 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.499797106 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.499844074 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.499908924 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.500276089 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.500319958 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.500575066 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.500618935 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.500967979 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.501029968 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:42.501077890 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.501106977 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.501153946 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.501163960 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.501214027 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.501223087 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.501280069 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.501317024 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.501326084 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.501369953 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.501379967 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.501386881 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.504687071 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.504698038 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.504705906 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.504942894 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.504952908 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.504983902 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.504992008 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.505024910 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.505043030 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.505095959 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.505300045 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.505309105 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.505316973 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.505599022 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.505706072 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.505716085 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.505726099 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.505738020 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.505810022 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.505992889 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.506036043 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.506045103 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.506170034 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:42.506181002 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:43.440004110 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:43.498651981 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:51.958663940 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:51.968332052 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:52.270585060 CEST58749750122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:52.271195889 CEST49750587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:52.272490978 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:52.283152103 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:52.283207893 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:53.089324951 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:53.096985102 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:53.101917028 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:53.404478073 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:53.405091047 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:53.409934998 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:53.713761091 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:53.714169979 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:53.718976974 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:54.034720898 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:54.034739017 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:54.034754038 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:54.034960032 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:54.036736012 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:54.041611910 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:54.344789028 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:54.347138882 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:54.351958990 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:54.654172897 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:54.654439926 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:54.659229040 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:54.962609053 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:54.962852001 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:54.967731953 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:55.575474024 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:55.577375889 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:55.584849119 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:55.887474060 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:55.889446020 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:55.895410061 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.206409931 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.206589937 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.212798119 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.515594959 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.515858889 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.515886068 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.515933037 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.515969038 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.517194986 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.520761013 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.520771980 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.520783901 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.520817995 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.520818949 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.520862103 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.522171021 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.522217989 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.522236109 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.522244930 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.522254944 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.522264004 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.522274971 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.522283077 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.522294998 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.522315979 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.522319078 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.522353888 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.525571108 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.525579929 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.525614977 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.525616884 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.525614977 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.525631905 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.525660038 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.525702953 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.525748014 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.527072906 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.527112007 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.527120113 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.527162075 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.527172089 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.527239084 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.527314901 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.527357101 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.527367115 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.527394056 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.527416945 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.530472040 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.530510902 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.530529976 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.530565977 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.532730103 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.532800913 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.532880068 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.532888889 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.532903910 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.532932997 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.532933950 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.532982111 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.533010006 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.533016920 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:04:56.533916950 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.535348892 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537436962 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537447929 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537467957 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537477970 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537484884 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537496090 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537522078 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537571907 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537580967 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537632942 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537642956 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537743092 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537751913 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537760019 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537767887 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537789106 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537797928 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537806034 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537820101 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537837982 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537847996 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537858009 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537873983 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537910938 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.537964106 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:56.538001060 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:57.469861984 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:04:57.511863947 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:05:01.324862003 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:05:01.329792023 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:05:01.632396936 CEST58749751122.201.84.5192.168.2.4
                          Jul 5, 2024 06:05:01.633034945 CEST49751587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:05:01.636882067 CEST49752587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:05:01.642252922 CEST58749752122.201.84.5192.168.2.4
                          Jul 5, 2024 06:05:01.644871950 CEST49752587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:05:02.731417894 CEST58749752122.201.84.5192.168.2.4
                          Jul 5, 2024 06:05:02.731472969 CEST58749752122.201.84.5192.168.2.4
                          Jul 5, 2024 06:05:02.731560946 CEST49752587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:05:02.731606007 CEST49752587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:05:02.736377001 CEST58749752122.201.84.5192.168.2.4
                          Jul 5, 2024 06:05:03.039385080 CEST58749752122.201.84.5192.168.2.4
                          Jul 5, 2024 06:05:03.039542913 CEST49752587192.168.2.4122.201.84.5
                          Jul 5, 2024 06:05:03.044405937 CEST58749752122.201.84.5192.168.2.4
                          Jul 5, 2024 06:05:03.348575115 CEST58749752122.201.84.5192.168.2.4
                          Jul 5, 2024 06:05:03.402390957 CEST49752587192.168.2.4122.201.84.5
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 5, 2024 06:00:55.826935053 CEST5390253192.168.2.41.1.1.1
                          Jul 5, 2024 06:00:55.834028959 CEST53539021.1.1.1192.168.2.4
                          Jul 5, 2024 06:02:34.176769972 CEST6370053192.168.2.41.1.1.1
                          Jul 5, 2024 06:02:34.533390045 CEST53637001.1.1.1192.168.2.4
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jul 5, 2024 06:00:55.826935053 CEST192.168.2.41.1.1.10x45e9Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                          Jul 5, 2024 06:02:34.176769972 CEST192.168.2.41.1.1.10x44d2Standard query (0)mail.technique.net.auA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jul 5, 2024 06:00:55.834028959 CEST1.1.1.1192.168.2.40x45e9No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                          Jul 5, 2024 06:00:55.834028959 CEST1.1.1.1192.168.2.40x45e9No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                          Jul 5, 2024 06:00:55.834028959 CEST1.1.1.1192.168.2.40x45e9No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                          Jul 5, 2024 06:02:34.533390045 CEST1.1.1.1192.168.2.40x44d2No error (0)mail.technique.net.au122.201.84.5A (IP address)IN (0x0001)false
                          • api.ipify.org
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.449730104.26.12.2054436668C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe
                          TimestampBytes transferredDirectionData
                          2024-07-05 04:00:56 UTC155OUTGET / HTTP/1.1
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                          Host: api.ipify.org
                          Connection: Keep-Alive
                          2024-07-05 04:00:56 UTC211INHTTP/1.1 200 OK
                          Date: Fri, 05 Jul 2024 04:00:56 GMT
                          Content-Type: text/plain
                          Content-Length: 11
                          Connection: close
                          Vary: Origin
                          CF-Cache-Status: DYNAMIC
                          Server: cloudflare
                          CF-RAY: 89e47370dccd7c88-EWR
                          2024-07-05 04:00:56 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                          Data Ascii: 8.46.123.33


                          TimestampSource PortDest PortSource IPDest IPCommands
                          Jul 5, 2024 06:02:35.787312031 CEST58749738122.201.84.5192.168.2.4220-biz204.vodien.com.au ESMTP Exim 4.96.1 #2 Fri, 05 Jul 2024 14:09:43 +1000
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          Jul 5, 2024 06:02:35.787545919 CEST49738587192.168.2.4122.201.84.5EHLO 841675
                          Jul 5, 2024 06:02:36.100128889 CEST58749738122.201.84.5192.168.2.4250-biz204.vodien.com.au Hello 841675 [8.46.123.33]
                          250-SIZE 157286400
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPECONNECT
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          Jul 5, 2024 06:02:36.100398064 CEST49738587192.168.2.4122.201.84.5STARTTLS
                          Jul 5, 2024 06:02:36.418004990 CEST58749738122.201.84.5192.168.2.4220 TLS go ahead
                          Jul 5, 2024 06:03:15.856456041 CEST58749739122.201.84.5192.168.2.4220-biz204.vodien.com.au ESMTP Exim 4.96.1 #2 Fri, 05 Jul 2024 14:10:23 +1000
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          Jul 5, 2024 06:03:15.866574049 CEST49739587192.168.2.4122.201.84.5EHLO 841675
                          Jul 5, 2024 06:03:16.175806046 CEST58749739122.201.84.5192.168.2.4250-biz204.vodien.com.au Hello 841675 [8.46.123.33]
                          250-SIZE 157286400
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPECONNECT
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          Jul 5, 2024 06:03:16.182564974 CEST49739587192.168.2.4122.201.84.5STARTTLS
                          Jul 5, 2024 06:03:16.493336916 CEST58749739122.201.84.5192.168.2.4220 TLS go ahead
                          Jul 5, 2024 06:03:24.172553062 CEST58749740122.201.84.5192.168.2.4220-biz204.vodien.com.au ESMTP Exim 4.96.1 #2 Fri, 05 Jul 2024 14:10:31 +1000
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          Jul 5, 2024 06:03:24.172703981 CEST49740587192.168.2.4122.201.84.5EHLO 841675
                          Jul 5, 2024 06:03:24.475943089 CEST58749740122.201.84.5192.168.2.4250-biz204.vodien.com.au Hello 841675 [8.46.123.33]
                          250-SIZE 157286400
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPECONNECT
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          Jul 5, 2024 06:03:24.476109982 CEST49740587192.168.2.4122.201.84.5STARTTLS
                          Jul 5, 2024 06:03:24.780406952 CEST58749740122.201.84.5192.168.2.4220 TLS go ahead
                          Jul 5, 2024 06:03:26.162312984 CEST58749741122.201.84.5192.168.2.4220-biz204.vodien.com.au ESMTP Exim 4.96.1 #2 Fri, 05 Jul 2024 14:10:33 +1000
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          Jul 5, 2024 06:03:26.162451029 CEST49741587192.168.2.4122.201.84.5EHLO 841675
                          Jul 5, 2024 06:03:26.466238022 CEST58749741122.201.84.5192.168.2.4250-biz204.vodien.com.au Hello 841675 [8.46.123.33]
                          250-SIZE 157286400
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPECONNECT
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          Jul 5, 2024 06:03:26.466522932 CEST49741587192.168.2.4122.201.84.5STARTTLS
                          Jul 5, 2024 06:03:26.772327900 CEST58749741122.201.84.5192.168.2.4220 TLS go ahead
                          Jul 5, 2024 06:03:29.349941969 CEST58749742122.201.84.5192.168.2.4220-biz204.vodien.com.au ESMTP Exim 4.96.1 #2 Fri, 05 Jul 2024 14:10:36 +1000
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          Jul 5, 2024 06:03:29.350181103 CEST49742587192.168.2.4122.201.84.5EHLO 841675
                          Jul 5, 2024 06:03:30.462814093 CEST58749742122.201.84.5192.168.2.4250-biz204.vodien.com.au Hello 841675 [8.46.123.33]
                          250-SIZE 157286400
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPECONNECT
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          Jul 5, 2024 06:03:30.462949038 CEST49742587192.168.2.4122.201.84.5STARTTLS
                          Jul 5, 2024 06:03:30.463052034 CEST58749742122.201.84.5192.168.2.4250-biz204.vodien.com.au Hello 841675 [8.46.123.33]
                          250-SIZE 157286400
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPECONNECT
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          Jul 5, 2024 06:03:30.463063002 CEST58749742122.201.84.5192.168.2.4250-biz204.vodien.com.au Hello 841675 [8.46.123.33]
                          250-SIZE 157286400
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPECONNECT
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          Jul 5, 2024 06:03:30.773812056 CEST58749742122.201.84.5192.168.2.4220 TLS go ahead
                          Jul 5, 2024 06:03:38.082988977 CEST58749743122.201.84.5192.168.2.4220-biz204.vodien.com.au ESMTP Exim 4.96.1 #2 Fri, 05 Jul 2024 14:10:45 +1000
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          Jul 5, 2024 06:03:38.083126068 CEST49743587192.168.2.4122.201.84.5EHLO 841675
                          Jul 5, 2024 06:03:38.389360905 CEST58749743122.201.84.5192.168.2.4250-biz204.vodien.com.au Hello 841675 [8.46.123.33]
                          250-SIZE 157286400
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPECONNECT
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          Jul 5, 2024 06:03:38.389523029 CEST49743587192.168.2.4122.201.84.5STARTTLS
                          Jul 5, 2024 06:03:39.267546892 CEST58749744122.201.84.5192.168.2.4220-biz204.vodien.com.au ESMTP Exim 4.96.1 #2 Fri, 05 Jul 2024 14:10:46 +1000
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          Jul 5, 2024 06:03:39.267739058 CEST49744587192.168.2.4122.201.84.5EHLO 841675
                          Jul 5, 2024 06:03:39.572573900 CEST58749744122.201.84.5192.168.2.4250-biz204.vodien.com.au Hello 841675 [8.46.123.33]
                          250-SIZE 157286400
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPECONNECT
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          Jul 5, 2024 06:03:39.572855949 CEST49744587192.168.2.4122.201.84.5STARTTLS
                          Jul 5, 2024 06:03:39.877355099 CEST58749744122.201.84.5192.168.2.4220 TLS go ahead
                          Jul 5, 2024 06:03:55.909920931 CEST58749745122.201.84.5192.168.2.4220-biz204.vodien.com.au ESMTP Exim 4.96.1 #2 Fri, 05 Jul 2024 14:11:03 +1000
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          Jul 5, 2024 06:03:55.910726070 CEST49745587192.168.2.4122.201.84.5EHLO 841675
                          Jul 5, 2024 06:03:56.219146967 CEST58749745122.201.84.5192.168.2.4250-biz204.vodien.com.au Hello 841675 [8.46.123.33]
                          250-SIZE 157286400
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPECONNECT
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          Jul 5, 2024 06:03:56.219301939 CEST49745587192.168.2.4122.201.84.5STARTTLS
                          Jul 5, 2024 06:03:56.528192043 CEST58749745122.201.84.5192.168.2.4220 TLS go ahead
                          Jul 5, 2024 06:04:00.363586903 CEST58749746122.201.84.5192.168.2.4220-biz204.vodien.com.au ESMTP Exim 4.96.1 #2 Fri, 05 Jul 2024 14:11:07 +1000
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          Jul 5, 2024 06:04:00.363732100 CEST49746587192.168.2.4122.201.84.5EHLO 841675
                          Jul 5, 2024 06:04:00.675371885 CEST58749746122.201.84.5192.168.2.4250-biz204.vodien.com.au Hello 841675 [8.46.123.33]
                          250-SIZE 157286400
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPECONNECT
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          Jul 5, 2024 06:04:00.675542116 CEST49746587192.168.2.4122.201.84.5STARTTLS
                          Jul 5, 2024 06:04:00.988118887 CEST58749746122.201.84.5192.168.2.4220 TLS go ahead
                          Jul 5, 2024 06:04:05.038444996 CEST58749748122.201.84.5192.168.2.4220-biz204.vodien.com.au ESMTP Exim 4.96.1 #2 Fri, 05 Jul 2024 14:11:12 +1000
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          Jul 5, 2024 06:04:05.038660049 CEST49748587192.168.2.4122.201.84.5EHLO 841675
                          Jul 5, 2024 06:04:05.343961000 CEST58749748122.201.84.5192.168.2.4250-biz204.vodien.com.au Hello 841675 [8.46.123.33]
                          250-SIZE 157286400
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPECONNECT
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          Jul 5, 2024 06:04:05.350456953 CEST49748587192.168.2.4122.201.84.5STARTTLS
                          Jul 5, 2024 06:04:05.657335997 CEST58749748122.201.84.5192.168.2.4220 TLS go ahead
                          Jul 5, 2024 06:04:39.313868999 CEST58749750122.201.84.5192.168.2.4220-biz204.vodien.com.au ESMTP Exim 4.96.1 #2 Fri, 05 Jul 2024 14:11:46 +1000
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          Jul 5, 2024 06:04:39.314026117 CEST49750587192.168.2.4122.201.84.5EHLO 841675
                          Jul 5, 2024 06:04:39.625488997 CEST58749750122.201.84.5192.168.2.4250-biz204.vodien.com.au Hello 841675 [8.46.123.33]
                          250-SIZE 157286400
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPECONNECT
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          Jul 5, 2024 06:04:39.625688076 CEST49750587192.168.2.4122.201.84.5STARTTLS
                          Jul 5, 2024 06:04:39.937892914 CEST58749750122.201.84.5192.168.2.4220 TLS go ahead
                          Jul 5, 2024 06:04:53.089324951 CEST58749751122.201.84.5192.168.2.4220-biz204.vodien.com.au ESMTP Exim 4.96.1 #2 Fri, 05 Jul 2024 14:12:00 +1000
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          Jul 5, 2024 06:04:53.096985102 CEST49751587192.168.2.4122.201.84.5EHLO 841675
                          Jul 5, 2024 06:04:53.404478073 CEST58749751122.201.84.5192.168.2.4250-biz204.vodien.com.au Hello 841675 [8.46.123.33]
                          250-SIZE 157286400
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPECONNECT
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          Jul 5, 2024 06:04:53.405091047 CEST49751587192.168.2.4122.201.84.5STARTTLS
                          Jul 5, 2024 06:04:53.713761091 CEST58749751122.201.84.5192.168.2.4220 TLS go ahead
                          Jul 5, 2024 06:05:02.731417894 CEST58749752122.201.84.5192.168.2.4220-biz204.vodien.com.au ESMTP Exim 4.96.1 #2 Fri, 05 Jul 2024 14:12:09 +1000
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          Jul 5, 2024 06:05:02.731472969 CEST58749752122.201.84.5192.168.2.4220-biz204.vodien.com.au ESMTP Exim 4.96.1 #2 Fri, 05 Jul 2024 14:12:09 +1000
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          Jul 5, 2024 06:05:02.731606007 CEST49752587192.168.2.4122.201.84.5EHLO 841675
                          Jul 5, 2024 06:05:03.039385080 CEST58749752122.201.84.5192.168.2.4250-biz204.vodien.com.au Hello 841675 [8.46.123.33]
                          250-SIZE 157286400
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPECONNECT
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          Jul 5, 2024 06:05:03.039542913 CEST49752587192.168.2.4122.201.84.5STARTTLS
                          Jul 5, 2024 06:05:03.348575115 CEST58749752122.201.84.5192.168.2.4220 TLS go ahead

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Target ID:0
                          Start time:00:00:54
                          Start date:05/07/2024
                          Path:C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exe"
                          Imagebase:0x400000
                          File size:266'752 bytes
                          MD5 hash:E96CDFD7C641B4FEA03541B97F6342A1
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.4094244027.0000000003745000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.4094244027.0000000003745000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.4094244027.0000000003745000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.4093598949.000000000270C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.4094811322.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.4094811322.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.4094811322.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.4094811322.00000000050E0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1639474007.00000000004E9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.1639474007.00000000004E9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000003.1639474007.00000000004E9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.4093403417.0000000002610000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.4093403417.0000000002610000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.4093403417.0000000002610000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.4093403417.0000000002610000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.4093243032.000000000225E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.4093243032.000000000225E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.4093243032.000000000225E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low
                          Has exited:false

                          Reset < >

                            Execution Graph

                            Execution Coverage:8.1%
                            Dynamic/Decrypted Code Coverage:60.8%
                            Signature Coverage:11.8%
                            Total number of Nodes:416
                            Total number of Limit Nodes:49
                            execution_graph 48024 5800a80 48025 5800ac6 GlobalMemoryStatusEx 48024->48025 48026 5800af6 48025->48026 48027 61c3718 48028 61c3780 CreateWindowExW 48027->48028 48030 61c383c 48028->48030 48031 61c7358 DuplicateHandle 48032 61c73ee 48031->48032 48198 61c8f38 48199 61c8f92 OleGetClipboard 48198->48199 48200 61c8fd2 48199->48200 48201 61ca938 48202 61ca97c SetWindowsHookExA 48201->48202 48204 61ca9c2 48202->48204 48205 40cbf7 48206 40cc08 48205->48206 48249 40d534 HeapCreate 48206->48249 48209 40cc46 48310 41087e 71 API calls 8 library calls 48209->48310 48212 40cc4c 48213 40cc50 48212->48213 48214 40cc58 __RTC_Initialize 48212->48214 48311 40cbb4 62 API calls 3 library calls 48213->48311 48251 411a15 67 API calls 3 library calls 48214->48251 48216 40cc57 48216->48214 48218 40cc66 48219 40cc72 GetCommandLineA 48218->48219 48220 40cc6a 48218->48220 48252 412892 71 API calls 3 library calls 48219->48252 48312 40e79a 62 API calls 3 library calls 48220->48312 48223 40cc71 48223->48219 48224 40cc82 48313 4127d7 107 API calls 3 library calls 48224->48313 48226 40cc8c 48227 40cc90 48226->48227 48228 40cc98 48226->48228 48314 40e79a 62 API calls 3 library calls 48227->48314 48253 41255f 106 API calls 6 library calls 48228->48253 48231 40cc97 48231->48228 48232 40cc9d 48233 40cca1 48232->48233 48234 40cca9 48232->48234 48315 40e79a 62 API calls 3 library calls 48233->48315 48254 40e859 73 API calls 5 library calls 48234->48254 48237 40cca8 48237->48234 48238 40ccb0 48239 40ccb5 48238->48239 48240 40ccbc 48238->48240 48316 40e79a 62 API calls 3 library calls 48239->48316 48255 4019f0 OleInitialize 48240->48255 48243 40ccbb 48243->48240 48244 40ccd8 48245 40ccea 48244->48245 48317 40ea0a 62 API calls _doexit 48244->48317 48318 40ea36 62 API calls _doexit 48245->48318 48248 40ccef __freefls@4 48250 40cc3a 48249->48250 48250->48209 48309 40cbb4 62 API calls 3 library calls 48250->48309 48251->48218 48252->48224 48253->48232 48254->48238 48256 401ab9 48255->48256 48319 40b99e 48256->48319 48258 401abf 48259 401acd GetCurrentProcessId CreateToolhelp32Snapshot Module32First 48258->48259 48289 402467 48258->48289 48260 401dc3 FindCloseChangeNotification GetModuleHandleA 48259->48260 48268 401c55 48259->48268 48332 401650 48260->48332 48262 401e8b FindResourceA LoadResource LockResource SizeofResource 48334 40b84d 48262->48334 48266 401c9c CloseHandle 48266->48244 48267 401ecb _memset 48269 401efc SizeofResource 48267->48269 48268->48266 48272 401cf9 Module32Next 48268->48272 48270 401f1c 48269->48270 48271 401f5f 48269->48271 48270->48271 48390 401560 __VEC_memcpy __fptostr 48270->48390 48274 401f92 _memset 48271->48274 48391 401560 __VEC_memcpy __fptostr 48271->48391 48272->48260 48280 401d0f 48272->48280 48276 401fa2 FreeResource 48274->48276 48277 40b84d _malloc 62 API calls 48276->48277 48278 401fbb SizeofResource 48277->48278 48279 401fe5 _memset 48278->48279 48281 4020aa LoadLibraryA 48279->48281 48280->48266 48284 401dad Module32Next 48280->48284 48282 401650 48281->48282 48283 40216c GetProcAddress 48282->48283 48285 4021aa 48283->48285 48283->48289 48284->48260 48284->48280 48285->48289 48364 4018f0 48285->48364 48287 40243f 48287->48289 48392 40b6b5 62 API calls 2 library calls 48287->48392 48289->48244 48290 4021f1 48290->48287 48376 401870 48290->48376 48292 402269 VariantInit 48293 401870 75 API calls 48292->48293 48294 40228b VariantInit 48293->48294 48295 4022a7 48294->48295 48296 4022d9 SafeArrayCreate SafeArrayAccessData 48295->48296 48381 40b350 48296->48381 48299 40232c 48300 402354 SafeArrayDestroy 48299->48300 48308 40235b 48299->48308 48300->48308 48301 402392 SafeArrayCreateVector 48302 4023a4 48301->48302 48303 4023bc VariantClear VariantClear 48302->48303 48383 4019a0 48303->48383 48306 40242e 48307 4019a0 65 API calls 48306->48307 48307->48287 48308->48301 48309->48209 48310->48212 48311->48216 48312->48223 48313->48226 48314->48231 48315->48237 48316->48243 48317->48245 48318->48248 48321 40b9aa _strnlen __freefls@4 48319->48321 48320 40b9b8 48393 40bfc1 62 API calls __getptd_noexit 48320->48393 48321->48320 48324 40b9ec 48321->48324 48323 40b9bd 48394 40e744 6 API calls 2 library calls 48323->48394 48395 40d6e0 62 API calls 2 library calls 48324->48395 48327 40b9f3 48396 40b917 120 API calls 3 library calls 48327->48396 48329 40b9ff 48397 40ba18 LeaveCriticalSection _doexit 48329->48397 48330 40b9cd __freefls@4 48330->48258 48333 4017cc _memcpy_s 48332->48333 48333->48262 48335 40b900 48334->48335 48344 40b85f 48334->48344 48405 40d2e3 6 API calls __decode_pointer 48335->48405 48337 40b906 48406 40bfc1 62 API calls __getptd_noexit 48337->48406 48342 40b8bc RtlAllocateHeap 48342->48344 48344->48342 48345 40b870 48344->48345 48346 40b8ec 48344->48346 48349 40b8f1 48344->48349 48351 401ebf 48344->48351 48401 40b7fe 62 API calls 4 library calls 48344->48401 48402 40d2e3 6 API calls __decode_pointer 48344->48402 48345->48344 48398 40ec4d 62 API calls 2 library calls 48345->48398 48399 40eaa2 62 API calls 7 library calls 48345->48399 48400 40e7ee GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 48345->48400 48403 40bfc1 62 API calls __getptd_noexit 48346->48403 48404 40bfc1 62 API calls __getptd_noexit 48349->48404 48352 40af66 48351->48352 48356 40af70 48352->48356 48353 40b84d _malloc 62 API calls 48353->48356 48354 40af8a 48354->48267 48356->48353 48356->48354 48359 40af8c std::bad_alloc::bad_alloc 48356->48359 48407 40d2e3 6 API calls __decode_pointer 48356->48407 48357 40afb2 48409 40af49 62 API calls std::exception::exception 48357->48409 48359->48357 48408 40d2bd 73 API calls __cinit 48359->48408 48360 40afbc 48410 40cd39 RaiseException 48360->48410 48363 40afca 48365 401903 lstrlenA 48364->48365 48366 4018fc 48364->48366 48411 4017e0 48365->48411 48366->48290 48369 401940 GetLastError 48371 40194b MultiByteToWideChar 48369->48371 48372 40198d 48369->48372 48370 401996 48370->48290 48373 4017e0 72 API calls 48371->48373 48372->48370 48419 401030 GetLastError 48372->48419 48374 401970 MultiByteToWideChar 48373->48374 48374->48372 48377 40af66 74 API calls 48376->48377 48378 40187c 48377->48378 48379 401885 SysAllocString 48378->48379 48380 4018a4 48378->48380 48379->48380 48380->48292 48382 40231a SafeArrayUnaccessData 48381->48382 48382->48299 48384 4019df VariantClear 48383->48384 48385 4019aa InterlockedDecrement 48383->48385 48384->48306 48385->48384 48386 4019b8 48385->48386 48386->48384 48387 4019c2 SysFreeString 48386->48387 48388 4019c9 48386->48388 48387->48388 48423 40aec0 63 API calls 2 library calls 48388->48423 48390->48270 48391->48274 48392->48289 48393->48323 48395->48327 48396->48329 48397->48330 48398->48345 48399->48345 48401->48344 48402->48344 48403->48349 48404->48351 48405->48337 48406->48351 48407->48356 48408->48357 48409->48360 48410->48363 48412 4017e9 48411->48412 48416 401844 48412->48416 48417 40182d 48412->48417 48420 40b783 72 API calls 4 library calls 48412->48420 48418 40186d MultiByteToWideChar 48416->48418 48422 40b743 62 API calls 2 library calls 48416->48422 48417->48416 48421 40b6b5 62 API calls 2 library calls 48417->48421 48418->48369 48418->48370 48420->48417 48421->48416 48422->48416 48423->48384 48033 61cb450 48034 61cb45f 48033->48034 48037 61cb03c 48034->48037 48039 61cb047 48037->48039 48041 61cb0d4 48039->48041 48040 61cb545 48040->48040 48042 61cb0df 48041->48042 48043 61cb791 48042->48043 48046 61ccb60 48042->48046 48051 61ccb51 48042->48051 48043->48040 48047 61ccb81 48046->48047 48048 61ccba5 48047->48048 48056 61ccd09 48047->48056 48060 61ccd10 48047->48060 48048->48043 48052 61ccb61 48051->48052 48053 61ccba5 48052->48053 48054 61ccd09 3 API calls 48052->48054 48055 61ccd10 3 API calls 48052->48055 48053->48043 48054->48053 48055->48053 48057 61ccd1d 48056->48057 48058 61ccd56 48057->48058 48064 61cba8c 48057->48064 48058->48048 48061 61ccd1d 48060->48061 48062 61ccd56 48061->48062 48063 61cba8c 3 API calls 48061->48063 48062->48048 48063->48062 48065 61cba97 48064->48065 48067 61ccdc8 48065->48067 48068 61cbac0 48065->48068 48067->48067 48069 61cbacb 48068->48069 48075 61cbad0 48069->48075 48071 61cce37 48079 64815b0 48071->48079 48088 64815a8 48071->48088 48072 61cce71 48072->48067 48078 61cbadb 48075->48078 48076 61cde70 48076->48071 48077 61ccb60 3 API calls 48077->48076 48078->48076 48078->48077 48081 64815e1 48079->48081 48082 64816e1 48079->48082 48080 64815ed 48080->48072 48081->48080 48097 6481818 48081->48097 48101 6481828 48081->48101 48082->48072 48083 648162d 48104 61c21ab 48083->48104 48110 61c21c0 48083->48110 48089 64815e1 48088->48089 48092 64816e1 48088->48092 48090 64815ed 48089->48090 48093 6481818 3 API calls 48089->48093 48094 6481828 3 API calls 48089->48094 48090->48072 48091 648162d 48095 61c21ab GetModuleHandleW 48091->48095 48096 61c21c0 GetModuleHandleW 48091->48096 48092->48072 48093->48091 48094->48091 48095->48092 48096->48092 48098 6481828 48097->48098 48116 6481858 48098->48116 48099 6481832 48099->48083 48103 6481858 3 API calls 48101->48103 48102 6481832 48102->48083 48103->48102 48105 61c21eb 48104->48105 48142 61c2731 48105->48142 48106 61c226e 48107 61c158c GetModuleHandleW 48106->48107 48108 61c229a 48106->48108 48107->48108 48111 61c21eb 48110->48111 48115 61c2731 GetModuleHandleW 48111->48115 48112 61c226e 48113 61c158c GetModuleHandleW 48112->48113 48114 61c229a 48112->48114 48113->48114 48115->48112 48117 6481879 48116->48117 48119 648189c 48116->48119 48126 61c158c 48117->48126 48130 61c2bd9 48117->48130 48118 6481884 48118->48119 48123 6481858 3 API calls 48118->48123 48134 6481a58 48118->48134 48119->48099 48120 6481894 48120->48119 48138 64807dc 48120->48138 48123->48120 48127 61c2be0 GetModuleHandleW 48126->48127 48129 61c2c55 48127->48129 48129->48118 48131 61c2c28 GetModuleHandleW 48130->48131 48132 61c2c22 48130->48132 48133 61c2c55 48131->48133 48132->48131 48133->48118 48135 6481a6c 48134->48135 48136 64807dc LoadLibraryExW 48135->48136 48137 6481a91 48135->48137 48136->48137 48137->48120 48139 6481ab8 LoadLibraryExW 48138->48139 48141 6481b31 48139->48141 48141->48119 48143 61c276d 48142->48143 48144 61c27ee 48143->48144 48147 61c28ae 48143->48147 48157 61c28b0 48143->48157 48148 61c28b0 48147->48148 48149 61c158c GetModuleHandleW 48148->48149 48150 61c28e9 48148->48150 48149->48150 48151 61c158c GetModuleHandleW 48150->48151 48156 61c2aa5 48150->48156 48152 61c2a2b 48151->48152 48153 61c158c GetModuleHandleW 48152->48153 48152->48156 48154 61c2a79 48153->48154 48155 61c158c GetModuleHandleW 48154->48155 48154->48156 48155->48156 48156->48144 48158 61c28c5 48157->48158 48159 61c158c GetModuleHandleW 48158->48159 48160 61c28e9 48158->48160 48159->48160 48161 61c158c GetModuleHandleW 48160->48161 48166 61c2aa5 48160->48166 48162 61c2a2b 48161->48162 48163 61c158c GetModuleHandleW 48162->48163 48162->48166 48164 61c2a79 48163->48164 48165 61c158c GetModuleHandleW 48164->48165 48164->48166 48165->48166 48166->48144 48167 61c7110 48168 61c7156 GetCurrentProcess 48167->48168 48170 61c71a8 GetCurrentThread 48168->48170 48171 61c71a1 48168->48171 48172 61c71de 48170->48172 48173 61c71e5 GetCurrentProcess 48170->48173 48171->48170 48172->48173 48176 61c721b 48173->48176 48174 61c7243 GetCurrentThreadId 48175 61c7274 48174->48175 48176->48174 48177 61c0fc0 48178 61c0fcd 48177->48178 48181 61c1088 48178->48181 48183 61c0b84 48178->48183 48180 61c104e 48188 61c0ba4 48180->48188 48184 61c0b8f 48183->48184 48186 61c21ab GetModuleHandleW 48184->48186 48187 61c21c0 GetModuleHandleW 48184->48187 48185 61c1277 48185->48180 48186->48185 48187->48185 48189 61c0baf 48188->48189 48191 61c850b 48189->48191 48192 61c6f2c 48189->48192 48191->48181 48193 61c8520 48192->48193 48195 61c8551 48193->48195 48196 61c8561 KiUserCallbackDispatcher 48195->48196 48197 61c858e 48196->48197 48197->48193 48424 20dd030 48425 20dd048 48424->48425 48426 20dd0a2 48425->48426 48434 61c38d0 48425->48434 48440 61c7f50 48425->48440 48451 61c7f30 48425->48451 48463 61c38ce 48425->48463 48469 61c311c 48425->48469 48473 61c312c 48425->48473 48484 61c39f0 48425->48484 48435 61c38f6 48434->48435 48436 61c311c GetModuleHandleW 48435->48436 48437 61c3902 48436->48437 48438 61c312c 3 API calls 48437->48438 48439 61c3917 48438->48439 48439->48426 48441 61c7f53 48440->48441 48442 61c7fc1 48441->48442 48444 61c7fb1 48441->48444 48512 61c6ed4 48442->48512 48488 61c80e8 48444->48488 48492 6482009 48444->48492 48497 6482018 48444->48497 48502 61c80da 48444->48502 48506 64820e4 48444->48506 48445 61c7fbf 48452 61c7f3b 48451->48452 48453 61c7f67 48451->48453 48452->48426 48454 61c7fc1 48453->48454 48456 61c7fb1 48453->48456 48455 61c6ed4 3 API calls 48454->48455 48457 61c7fbf 48455->48457 48458 6482018 3 API calls 48456->48458 48459 6482009 3 API calls 48456->48459 48460 61c80e8 3 API calls 48456->48460 48461 61c80da 3 API calls 48456->48461 48462 64820e4 3 API calls 48456->48462 48458->48457 48459->48457 48460->48457 48461->48457 48462->48457 48464 61c38d0 48463->48464 48465 61c311c GetModuleHandleW 48464->48465 48466 61c3902 48465->48466 48467 61c312c 3 API calls 48466->48467 48468 61c3917 48467->48468 48468->48426 48470 61c3127 48469->48470 48544 61c3154 48470->48544 48472 61c3a07 48472->48426 48474 61c3137 48473->48474 48475 61c7fc1 48474->48475 48477 61c7fb1 48474->48477 48476 61c6ed4 3 API calls 48475->48476 48478 61c7fbf 48476->48478 48479 6482018 3 API calls 48477->48479 48480 6482009 3 API calls 48477->48480 48481 61c80e8 3 API calls 48477->48481 48482 61c80da 3 API calls 48477->48482 48483 64820e4 3 API calls 48477->48483 48479->48478 48480->48478 48481->48478 48482->48478 48483->48478 48485 61c3a00 48484->48485 48486 61c3154 GetModuleHandleW 48485->48486 48487 61c3a07 48486->48487 48487->48426 48490 61c80f6 48488->48490 48489 61c6ed4 3 API calls 48489->48490 48490->48489 48491 61c81ce 48490->48491 48491->48445 48494 648200f 48492->48494 48493 64820b8 48493->48445 48519 64820d0 48494->48519 48522 64820bf 48494->48522 48498 648202c 48497->48498 48500 64820bf 3 API calls 48498->48500 48501 64820d0 3 API calls 48498->48501 48499 64820b8 48499->48445 48500->48499 48501->48499 48504 61c80e3 48502->48504 48503 61c6ed4 3 API calls 48503->48504 48504->48503 48505 61c807f 48504->48505 48505->48445 48507 64820a2 48506->48507 48508 64820f2 48506->48508 48510 64820bf 3 API calls 48507->48510 48511 64820d0 3 API calls 48507->48511 48509 64820b8 48509->48445 48510->48509 48511->48509 48513 61c6edf 48512->48513 48514 61c822a 48513->48514 48515 61c82d4 48513->48515 48516 61c8282 CallWindowProcW 48514->48516 48518 61c8231 48514->48518 48517 61c312c 2 API calls 48515->48517 48516->48518 48517->48518 48518->48445 48520 64820e1 48519->48520 48525 64834f8 48519->48525 48520->48493 48523 64820e1 48522->48523 48524 64834f8 3 API calls 48522->48524 48523->48493 48524->48523 48528 61c6ed4 3 API calls 48525->48528 48530 61c81d8 48525->48530 48537 61c6ed2 48525->48537 48526 648351a 48526->48520 48528->48526 48531 61c81e8 48530->48531 48532 61c822a 48531->48532 48533 61c82d4 48531->48533 48534 61c8282 CallWindowProcW 48532->48534 48536 61c8231 48532->48536 48535 61c312c 2 API calls 48533->48535 48534->48536 48535->48536 48536->48526 48538 61c6edf 48537->48538 48539 61c822a 48538->48539 48540 61c82d4 48538->48540 48541 61c8282 CallWindowProcW 48539->48541 48543 61c8231 48539->48543 48542 61c312c 2 API calls 48540->48542 48541->48543 48542->48543 48543->48526 48545 61c315f 48544->48545 48546 61c158c GetModuleHandleW 48545->48546 48547 61c3ad7 48545->48547 48546->48547

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 4019f0-401ac7 OleInitialize call 401650 call 40b99e 5 40248a-402496 0->5 6 401acd-401c4f GetCurrentProcessId CreateToolhelp32Snapshot Module32First 0->6 7 401dc3-401ed4 FindCloseChangeNotification GetModuleHandleA call 401650 FindResourceA LoadResource LockResource SizeofResource call 40b84d call 40af66 6->7 8 401c55-401c6c call 401650 6->8 26 401ed6-401eed call 40ba30 7->26 27 401eef 7->27 13 401c73-401c77 8->13 15 401c93-401c95 13->15 16 401c79-401c7b 13->16 20 401c98-401c9a 15->20 18 401c7d-401c83 16->18 19 401c8f-401c91 16->19 18->15 22 401c85-401c8d 18->22 19->20 23 401cb0-401cce call 401650 20->23 24 401c9c-401caf CloseHandle 20->24 22->13 22->19 34 401cd0-401cd4 23->34 30 401ef3-401f1a call 401300 SizeofResource 26->30 27->30 39 401f1c-401f2f 30->39 40 401f5f-401f69 30->40 36 401cf0-401cf2 34->36 37 401cd6-401cd8 34->37 38 401cf5-401cf7 36->38 41 401cda-401ce0 37->41 42 401cec-401cee 37->42 38->24 43 401cf9-401d09 Module32Next 38->43 44 401f33-401f5d call 401560 39->44 45 401f73-401f75 40->45 46 401f6b-401f72 40->46 41->36 47 401ce2-401cea 41->47 42->38 43->7 48 401d0f 43->48 44->40 50 401f92-4021a4 call 40ba30 FreeResource call 40b84d SizeofResource call 40ac60 call 40ba30 call 401650 LoadLibraryA call 401650 GetProcAddress 45->50 51 401f77-401f8d call 401560 45->51 46->45 47->34 47->42 53 401d10-401d2e call 401650 48->53 50->5 87 4021aa-4021c0 50->87 51->50 61 401d30-401d34 53->61 63 401d50-401d52 61->63 64 401d36-401d38 61->64 68 401d55-401d57 63->68 66 401d3a-401d40 64->66 67 401d4c-401d4e 64->67 66->63 70 401d42-401d4a 66->70 67->68 68->24 71 401d5d-401d7b call 401650 68->71 70->61 70->67 76 401d80-401d84 71->76 78 401da0-401da2 76->78 79 401d86-401d88 76->79 83 401da5-401da7 78->83 81 401d8a-401d90 79->81 82 401d9c-401d9e 79->82 81->78 85 401d92-401d9a 81->85 82->83 83->24 86 401dad-401dbd Module32Next 83->86 85->76 85->82 86->7 86->53 89 4021c6-4021ca 87->89 90 40246a-402470 87->90 89->90 91 4021d0-402217 call 4018f0 89->91 92 402472-402475 90->92 93 40247a-402480 90->93 98 40221d-40223d 91->98 99 40244f-40245f 91->99 92->93 93->5 95 402482-402487 93->95 95->5 98->99 104 402243-402251 98->104 99->90 100 402461-402467 call 40b6b5 99->100 100->90 104->99 106 402257-4022b7 call 401870 VariantInit call 401870 VariantInit call 4018d0 104->106 114 4022c3-40232a call 4018d0 SafeArrayCreate SafeArrayAccessData call 40b350 SafeArrayUnaccessData 106->114 115 4022b9-4022be call 40ad90 106->115 122 402336-40234d call 4018d0 114->122 123 40232c-402331 call 40ad90 114->123 115->114 154 40234e call 20cd01d 122->154 155 40234e call 20cd006 122->155 123->122 127 402350-402352 128 402354-402355 SafeArrayDestroy 127->128 129 40235b-402361 127->129 128->129 130 402363-402368 call 40ad90 129->130 131 40236d-402375 129->131 130->131 133 402377-402379 131->133 134 40237b 131->134 135 40237d-40238f call 4018d0 133->135 134->135 152 402390 call 20cd01d 135->152 153 402390 call 20cd006 135->153 138 402392-4023a2 SafeArrayCreateVector 139 4023a4-4023a9 call 40ad90 138->139 140 4023ae-4023b4 138->140 139->140 142 4023b6-4023b8 140->142 143 4023ba 140->143 144 4023bc-402417 VariantClear * 2 call 4019a0 142->144 143->144 146 40241c-40242c VariantClear 144->146 147 402436-402445 call 4019a0 146->147 148 40242e-402433 146->148 147->99 151 402447-40244c 147->151 148->147 151->99 152->138 153->138 154->127 155->127
                            APIs
                            • OleInitialize.OLE32(00000000), ref: 004019FD
                            • _getenv.LIBCMT ref: 00401ABA
                            • GetCurrentProcessId.KERNEL32 ref: 00401ACD
                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00401AD6
                            • Module32First.KERNEL32 ref: 00401C48
                            • CloseHandle.KERNEL32(00000000,?,?,00000000,?), ref: 00401C9D
                            • Module32Next.KERNEL32(00000000,?), ref: 00401D02
                            • Module32Next.KERNEL32(00000000,?), ref: 00401DB6
                            • FindCloseChangeNotification.KERNEL32(00000000), ref: 00401DC4
                            • GetModuleHandleA.KERNEL32(00000000), ref: 00401DCB
                            • FindResourceA.KERNEL32(00000000,00000000,00000000), ref: 00401E90
                            • LoadResource.KERNEL32(00000000,00000000), ref: 00401E9E
                            • LockResource.KERNEL32(00000000), ref: 00401EA7
                            • SizeofResource.KERNEL32(00000000,00000000), ref: 00401EB3
                            • _malloc.LIBCMT ref: 00401EBA
                            • _memset.LIBCMT ref: 00401EDD
                            • SizeofResource.KERNEL32(00000000,?), ref: 00401F02
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: Resource$Module32$CloseFindHandleNextSizeof$ChangeCreateCurrentFirstInitializeLoadLockModuleNotificationProcessSnapshotToolhelp32_getenv_malloc_memset
                            • String ID: !$!$!$"$%$'$'$)$*$*$.$.$0$4$4$4$5$6$8$:$D$E$U$V$V$W$W$W$W$[$[$_._$___$h$o$o$o$v$v$v$v$x$x$x$x${${${${
                            • API String ID: 2366190142-2962942730
                            • Opcode ID: f33ec6517a8e462eea4e7ce496cce69d106849ef0d44fd50fc6c48668fb332a6
                            • Instruction ID: 7b7814addfdf4b3cbdaef5ede101091f5fb3e94df766619d88950efa0d528cfd
                            • Opcode Fuzzy Hash: f33ec6517a8e462eea4e7ce496cce69d106849ef0d44fd50fc6c48668fb332a6
                            • Instruction Fuzzy Hash: B3628C2100C7C19EC321DB388888A5FBFE55FA6328F484A5DF1E55B2E2C7799509C76B

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 212 5b3b7c8-5b3b7e9 213 5b3b7eb-5b3b7ee 212->213 214 5b3b7f0-5b3b80f 213->214 215 5b3b814-5b3b817 213->215 214->215 216 5b3b81d-5b3b83c 215->216 217 5b3bfbc-5b3bfbe 215->217 225 5b3b855-5b3b85f 216->225 226 5b3b83e-5b3b841 216->226 218 5b3bfc0 217->218 219 5b3bfc5-5b3bfc8 217->219 218->219 219->213 222 5b3bfce-5b3bfd7 219->222 230 5b3b865-5b3b876 call 5b320b4 225->230 226->225 227 5b3b843-5b3b853 226->227 227->230 232 5b3b87b-5b3b880 230->232 233 5b3b882-5b3b888 232->233 234 5b3b88d-5b3bb6a 232->234 233->222 255 5b3bb70-5b3bc1f 234->255 256 5b3bfae-5b3bfbb 234->256 265 5b3bc21-5b3bc46 255->265 266 5b3bc48 255->266 268 5b3bc51-5b3bc64 call 5b3233c 265->268 266->268 271 5b3bf95-5b3bfa1 268->271 272 5b3bc6a-5b3bc8c call 5b32348 268->272 271->255 273 5b3bfa7 271->273 272->271 276 5b3bc92-5b3bc9c 272->276 273->256 276->271 277 5b3bca2-5b3bcad 276->277 277->271 278 5b3bcb3-5b3bd89 277->278 290 5b3bd97-5b3bdc7 278->290 291 5b3bd8b-5b3bd8d 278->291 295 5b3bdd5-5b3bde1 290->295 296 5b3bdc9-5b3bdcb 290->296 291->290 297 5b3bde3-5b3bde7 295->297 298 5b3be41-5b3be45 295->298 296->295 297->298 301 5b3bde9-5b3be13 297->301 299 5b3bf86-5b3bf8f 298->299 300 5b3be4b-5b3be87 298->300 299->271 299->278 313 5b3be95-5b3bea3 300->313 314 5b3be89-5b3be8b 300->314 308 5b3be21-5b3be3e call 5b32354 301->308 309 5b3be15-5b3be17 301->309 308->298 309->308 316 5b3bea5-5b3beb0 313->316 317 5b3beba-5b3bec5 313->317 314->313 316->317 320 5b3beb2 316->320 321 5b3bec7-5b3becd 317->321 322 5b3bedd-5b3beee 317->322 320->317 323 5b3bed1-5b3bed3 321->323 324 5b3becf 321->324 326 5b3bef0-5b3bef6 322->326 327 5b3bf06-5b3bf12 322->327 323->322 324->322 328 5b3befa-5b3befc 326->328 329 5b3bef8 326->329 331 5b3bf14-5b3bf1a 327->331 332 5b3bf2a-5b3bf7f 327->332 328->327 329->327 333 5b3bf1e-5b3bf20 331->333 334 5b3bf1c 331->334 332->299 333->332 334->332
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                            • API String ID: 0-1342094364
                            • Opcode ID: a3bd415bcf555a4f5900033a928227d4c305ff6968803e52b273318766378063
                            • Instruction ID: d52b072087ebb88d23aec132843ae19e0f378d224102bca0ef34276fd233e63d
                            • Opcode Fuzzy Hash: a3bd415bcf555a4f5900033a928227d4c305ff6968803e52b273318766378063
                            • Instruction Fuzzy Hash: D9322E35E107198FCB14EF65D8955ADB7B2FF89300F60C6AAD409B7268EF30A985CB50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 487 5b3dd90-5b3ddae 488 5b3ddb0-5b3ddb3 487->488 489 5b3ddd6-5b3ddd9 488->489 490 5b3ddb5-5b3ddd1 488->490 491 5b3dde6-5b3dde9 489->491 492 5b3dddb-5b3dde5 489->492 490->489 494 5b3ddeb-5b3de05 491->494 495 5b3de0a-5b3de0d 491->495 494->495 496 5b3de24-5b3de26 495->496 497 5b3de0f-5b3de1d 495->497 499 5b3de28 496->499 500 5b3de2d-5b3de30 496->500 503 5b3de36-5b3de4c 497->503 505 5b3de1f 497->505 499->500 500->488 500->503 507 5b3de52-5b3de5b 503->507 508 5b3e077-5b3e081 503->508 505->496 509 5b3e082-5b3e0b7 507->509 510 5b3de61-5b3de7e 507->510 513 5b3e0b9-5b3e0bc 509->513 517 5b3e064-5b3e071 510->517 518 5b3de84-5b3deac 510->518 515 5b3e0c2-5b3e0d1 513->515 516 5b3e2ee-5b3e2f1 513->516 527 5b3e0d3-5b3e0ee 515->527 528 5b3e0f0-5b3e12b 515->528 519 5b3e2f7-5b3e303 516->519 520 5b3e3a8-5b3e3ab 516->520 517->507 517->508 518->517 545 5b3deb2-5b3debb 518->545 529 5b3e30e-5b3e310 519->529 521 5b3e3ce-5b3e3d0 520->521 522 5b3e3ad-5b3e3c9 520->522 525 5b3e3d2 521->525 526 5b3e3d7-5b3e3da 521->526 522->521 525->526 526->513 531 5b3e3e0-5b3e3e9 526->531 527->528 541 5b3e2c2-5b3e2d7 528->541 542 5b3e131-5b3e142 528->542 532 5b3e312-5b3e318 529->532 533 5b3e328-5b3e32f 529->533 534 5b3e31a 532->534 535 5b3e31c-5b3e31e 532->535 537 5b3e331-5b3e33e 533->537 538 5b3e340 533->538 534->533 535->533 543 5b3e345-5b3e347 537->543 538->543 541->516 552 5b3e148-5b3e165 542->552 553 5b3e2ad-5b3e2bc 542->553 547 5b3e349-5b3e34c 543->547 548 5b3e35e-5b3e397 543->548 545->509 550 5b3dec1-5b3dedd 545->550 547->531 548->515 567 5b3e39d-5b3e3a7 548->567 556 5b3dee3-5b3df0d 550->556 557 5b3e052-5b3e05e 550->557 552->553 565 5b3e16b-5b3e262 552->565 553->541 553->542 570 5b3df13-5b3df3b 556->570 571 5b3e048-5b3e04d 556->571 557->517 557->545 618 5b3e270 565->618 619 5b3e264-5b3e26e 565->619 570->571 578 5b3df41-5b3df6f 570->578 571->557 578->571 583 5b3df75-5b3df7e 578->583 583->571 585 5b3df84-5b3dfb6 583->585 592 5b3dfc5-5b3dfe1 585->592 593 5b3dfb8-5b3dfbc 585->593 592->557 596 5b3dfe3-5b3e046 592->596 593->571 595 5b3dfc2 593->595 595->592 596->557 620 5b3e275-5b3e277 618->620 619->620 620->553 621 5b3e279-5b3e283 620->621 623 5b3e291 621->623 624 5b3e285-5b3e28f 621->624 625 5b3e296-5b3e298 623->625 624->625 625->553 626 5b3e29a-5b3e2a6 625->626 626->553
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: $kq$$kq
                            • API String ID: 0-3550614674
                            • Opcode ID: 0252dd1d5baae552fe9d01ae3be3c5847d8bd18f33f346c05d203a829883332e
                            • Instruction ID: 65d7363562229d128c00431b113fc789e6a2778ac0d2fca103d0534689e99a2a
                            • Opcode Fuzzy Hash: 0252dd1d5baae552fe9d01ae3be3c5847d8bd18f33f346c05d203a829883332e
                            • Instruction Fuzzy Hash: 0C027B30B102158FDB14DB64D5956AEB7F6FB88300F6484A9E806EB399DF35EC46CB90

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 759 5800500-580050a 761 5800511-5800522 759->761 762 580050c-5800510 759->762 763 5800524-5800563 call 5800298 761->763 764 5800586-580058d 761->764 762->761 772 5800565-5800577 763->772 773 580058e-58005da 763->773 778 580057e 772->778 783 58005e1-58005e2 773->783 784 58005dc-58005e0 773->784 778->764 785 58005e4 783->785 786 58005e9-58005f5 783->786 784->783 785->786 787 58005f7-58005f9 786->787 788 58005fe-580060e 786->788 789 580089d-58008a4 787->789 790 5800610 788->790 791 5800615-5800625 788->791 790->789 793 5800884-5800892 791->793 794 580062b-5800639 791->794 797 5800894-5800896 793->797 798 58008a5-580091e 793->798 794->798 799 580063f 794->799 797->789 799->798 800 5800742-580076a 799->800 801 5800683-58006a5 799->801 802 5800646-5800658 799->802 803 5800809-5800835 799->803 804 58006aa-58006cb 799->804 805 580076f-5800797 799->805 806 58006d0-58006f1 799->806 807 5800854-5800876 799->807 808 58006f6-5800717 799->808 809 5800837-5800852 799->809 810 5800878-5800882 799->810 811 580071c-580073d 799->811 812 580079c-58007d9 799->812 813 580065d-580067e 799->813 814 58007de-5800804 799->814 800->789 801->789 802->789 803->789 804->789 805->789 806->789 807->789 808->789 809->789 810->789 811->789 812->789 813->789 814->789
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095415937.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5800000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: Xoq$$kq
                            • API String ID: 0-227003152
                            • Opcode ID: 9f0dac7c9576b77486bfb22742d4f548f33fdf5fb709f754baa163767cff5fee
                            • Instruction ID: 4158fe93cad748478a03c04b0fab2303280139e567f54b9e06286af7aee78e10
                            • Opcode Fuzzy Hash: 9f0dac7c9576b77486bfb22742d4f548f33fdf5fb709f754baa163767cff5fee
                            • Instruction Fuzzy Hash: 66B18331B05318CBCB48AFB9985977E7BA7BFC5700B58896DD406EB398DE349C028791
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5bbd1faad080521507f5d9d62f2808bde13914ba6610b71ab835e6240eefa572
                            • Instruction ID: 49b89aa9c305f54fa9bca71bab8dd77f7abccd997a94ee08e12f012486c40a63
                            • Opcode Fuzzy Hash: 5bbd1faad080521507f5d9d62f2808bde13914ba6610b71ab835e6240eefa572
                            • Instruction Fuzzy Hash: CB331D31D10B198ECB15DF68C884AADF7B1FF99300F15D69AE448B7225EB70AAC5CB41
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 970e1be9868a52b650c4f4aeb071e6bef944f236c7ce1f66fc7aa63961d48a0f
                            • Instruction ID: f4ef24f96fb75124a53c2f63acb1bf47e3bb2deafcc99692d4acadc2f9ca88c0
                            • Opcode Fuzzy Hash: 970e1be9868a52b650c4f4aeb071e6bef944f236c7ce1f66fc7aa63961d48a0f
                            • Instruction Fuzzy Hash: 57625B35B102048FDB14DBA4D555AADBBB2FF88350F6484A9E806FB395DB35EC42CB90
                            Memory Dump Source
                            • Source File: 00000000.00000002.4093196854.0000000002220000.00000040.00000800.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_2220000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9554e81eacd6f653074bef886b08dd41b7b7580800a50e4f86e998cf0a232411
                            • Instruction ID: d53f75269cfbd0bf5a4a874a955356971e8d3d7a01e54564aa7cf734f973ea17
                            • Opcode Fuzzy Hash: 9554e81eacd6f653074bef886b08dd41b7b7580800a50e4f86e998cf0a232411
                            • Instruction Fuzzy Hash: 32B17070E10219DFDB10CFE9C9817DDBBF2AF88314F15812AD815A7268EB759949CF81
                            Memory Dump Source
                            • Source File: 00000000.00000002.4093196854.0000000002220000.00000040.00000800.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_2220000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e4706fc1bcf91d80f34853d3038bdf0c1c1b611ddafab78151c6a88411f188f1
                            • Instruction ID: 247b7cb0e011ce1925d9fa38a8b133bf70179af3ad5100e0342ca3460e73fd25
                            • Opcode Fuzzy Hash: e4706fc1bcf91d80f34853d3038bdf0c1c1b611ddafab78151c6a88411f188f1
                            • Instruction Fuzzy Hash: DEB18070E1021ADFDB10CFE9D9817EDBBF2AF48314F148129E414EB298EB759849CB81
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095973859.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_61c0000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 568726de02b851dec8aa976e10d653b12deab13d36546431f235909a41f6f980
                            • Instruction ID: df99be156406d1baf96b7362c141b88adbf63b4e57b0bab2e29396f526447e66
                            • Opcode Fuzzy Hash: 568726de02b851dec8aa976e10d653b12deab13d36546431f235909a41f6f980
                            • Instruction Fuzzy Hash: 3BA19335E103198FCB44DFA4C8949EDFBBAFF99310F558619E416AB2A4EB30E845CB50
                            Memory Dump Source
                            • Source File: 00000000.00000002.4093196854.0000000002220000.00000040.00000800.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_2220000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 981385d0dd17f505183a3d791791abd504fbd9b1b2e9be12c07eaa86a05a990f
                            • Instruction ID: 290466345302560ac0174822275dbcdaa6daa4bb2ff207ee070bb1c173f53220
                            • Opcode Fuzzy Hash: 981385d0dd17f505183a3d791791abd504fbd9b1b2e9be12c07eaa86a05a990f
                            • Instruction Fuzzy Hash: 32917070E10219EFDF10CFE8C9857DDBBF2AF88314F15812AD405A7268DB759949CB81
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095973859.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_61c0000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 90f74010679295119689d6c231b0cf0c6de4f716a5353f179f30079702f84c0a
                            • Instruction ID: 580cbd412a8a1ca075fc07a8efecebb114bb5412b01084257aaf4d6851a038ca
                            • Opcode Fuzzy Hash: 90f74010679295119689d6c231b0cf0c6de4f716a5353f179f30079702f84c0a
                            • Instruction Fuzzy Hash: 1391A235E1031A9FCB44DFA0D8549DDFBBAFF99310F658219E416AB2A4EB30E845CB50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 156 40cbf7-40cc06 157 40cc08-40cc14 156->157 158 40cc2f 156->158 157->158 159 40cc16-40cc1d 157->159 160 40cc33-40cc3d call 40d534 158->160 159->158 161 40cc1f-40cc2d 159->161 164 40cc47 160->164 165 40cc3f-40cc46 call 40cbb4 160->165 161->160 167 40cc47 call 41087e 164->167 165->164 169 40cc4c-40cc4e 167->169 170 40cc50-40cc57 call 40cbb4 169->170 171 40cc58-40cc68 call 4129c9 call 411a15 169->171 170->171 178 40cc72-40cc82 GetCommandLineA call 412892 171->178 179 40cc6a-40cc71 call 40e79a 171->179 184 40cc87 call 4127d7 178->184 179->178 185 40cc8c-40cc8e 184->185 186 40cc90-40cc97 call 40e79a 185->186 187 40cc98-40cc9f call 41255f 185->187 186->187 192 40cca1-40cca8 call 40e79a 187->192 193 40cca9-40ccb3 call 40e859 187->193 192->193 198 40ccb5-40ccbb call 40e79a 193->198 199 40ccbc-40ccd3 call 4019f0 193->199 198->199 203 40ccd8-40cce2 199->203 204 40cce4-40cce5 call 40ea0a 203->204 205 40ccea-40cd2e call 40ea36 call 40e21d 203->205 204->205
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: __amsg_exit$_fast_error_exit$CommandEnvironmentInitializeLineStrings___crt__cinit__ioinit__mtinit__setargv__setenvp
                            • String ID:
                            • API String ID: 2598563909-0
                            • Opcode ID: 2d668fad8e0b173589b4563f5a4f7b2cb6976b6486fb72b9956ee4840b6c9fb0
                            • Instruction ID: 67c2b95978a5c3de314e94e7eee78366e8702871eb07600154e5c77a41a3d030
                            • Opcode Fuzzy Hash: 2d668fad8e0b173589b4563f5a4f7b2cb6976b6486fb72b9956ee4840b6c9fb0
                            • Instruction Fuzzy Hash: 5321E770A05304DAFB207BB3E98676932B46F00309F00453FE508B62D2EB7C89918A5C

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 342 4018f0-4018fa 343 401903-40193e lstrlenA call 4017e0 MultiByteToWideChar 342->343 344 4018fc-401900 342->344 347 401940-401949 GetLastError 343->347 348 401996-40199a 343->348 349 40194b-40198c MultiByteToWideChar call 4017e0 MultiByteToWideChar 347->349 350 40198d-40198f 347->350 349->350 350->348 352 401991 call 401030 350->352 352->348
                            APIs
                            • lstrlenA.KERNEL32(?), ref: 00401906
                            • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000001), ref: 0040192F
                            • GetLastError.KERNEL32 ref: 00401940
                            • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401958
                            • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401980
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$ErrorLastlstrlen
                            • String ID:
                            • API String ID: 3322701435-0
                            • Opcode ID: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
                            • Instruction ID: 001f8acd6346668203df0e37acbb0982e2c141f20d3592a2a78c171e7710dcce
                            • Opcode Fuzzy Hash: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
                            • Instruction Fuzzy Hash: 4011C4756003247BD3309B15CC88F677F6CEB86BA9F008169FD85AB291C635AC04C6F8

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 355 61c7100-61c7101 356 61c712f-61c719f GetCurrentProcess 355->356 357 61c7103-61c712c 355->357 361 61c71a8-61c71dc GetCurrentThread 356->361 362 61c71a1-61c71a7 356->362 357->356 363 61c71de-61c71e4 361->363 364 61c71e5-61c7219 GetCurrentProcess 361->364 362->361 363->364 365 61c721b-61c7221 364->365 366 61c7222-61c723d call 61c72df 364->366 365->366 370 61c7243-61c7272 GetCurrentThreadId 366->370 371 61c727b-61c72dd 370->371 372 61c7274-61c727a 370->372 372->371
                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 061C718E
                            • GetCurrentThread.KERNEL32 ref: 061C71CB
                            • GetCurrentProcess.KERNEL32 ref: 061C7208
                            • GetCurrentThreadId.KERNEL32 ref: 061C7261
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095973859.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_61c0000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: 1b95392a7d43e56c4ceb7ad5ce126cc3f4443b02aa25c2dc9852b2b3a460a09e
                            • Instruction ID: 743e886cff5ef991e7dcfa9c2318ea2942afc8f67f5b8e0d0033286e1030c414
                            • Opcode Fuzzy Hash: 1b95392a7d43e56c4ceb7ad5ce126cc3f4443b02aa25c2dc9852b2b3a460a09e
                            • Instruction Fuzzy Hash: 525154B09013498FDB54DFA9DA48BDEBBF1AF48324F208059E409A72A0DB749984CF65

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 379 61c7110-61c719f GetCurrentProcess 383 61c71a8-61c71dc GetCurrentThread 379->383 384 61c71a1-61c71a7 379->384 385 61c71de-61c71e4 383->385 386 61c71e5-61c7219 GetCurrentProcess 383->386 384->383 385->386 387 61c721b-61c7221 386->387 388 61c7222-61c723d call 61c72df 386->388 387->388 392 61c7243-61c7272 GetCurrentThreadId 388->392 393 61c727b-61c72dd 392->393 394 61c7274-61c727a 392->394 394->393
                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 061C718E
                            • GetCurrentThread.KERNEL32 ref: 061C71CB
                            • GetCurrentProcess.KERNEL32 ref: 061C7208
                            • GetCurrentThreadId.KERNEL32 ref: 061C7261
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095973859.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_61c0000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: 8138b60cceb529078013045d2e4ad57681123d95957538614288195708dbfd81
                            • Instruction ID: 74373bed1dc00915c1e10ee93004381c3dc513d90c423f82bd996e33ea6ae8e5
                            • Opcode Fuzzy Hash: 8138b60cceb529078013045d2e4ad57681123d95957538614288195708dbfd81
                            • Instruction Fuzzy Hash: 095145B09013498FDB54DFAADA48BDEBBF1AF48314F20C059E419A73A0DB749984CF65

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 401 40af66-40af6e 402 40af7d-40af88 call 40b84d 401->402 405 40af70-40af7b call 40d2e3 402->405 406 40af8a-40af8b 402->406 405->402 409 40af8c-40af98 405->409 410 40afb3-40afca call 40af49 call 40cd39 409->410 411 40af9a-40afb2 call 40aefc call 40d2bd 409->411 411->410
                            APIs
                            • _malloc.LIBCMT ref: 0040AF80
                              • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                              • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                              • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
                            • std::bad_alloc::bad_alloc.LIBCMT ref: 0040AFA3
                              • Part of subcall function 0040AEFC: std::exception::exception.LIBCMT ref: 0040AF08
                            • std::bad_exception::bad_exception.LIBCMT ref: 0040AFB7
                            • __CxxThrowException@8.LIBCMT ref: 0040AFC5
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                            • String ID:
                            • API String ID: 1411284514-0
                            • Opcode ID: 2a036851afa6ddc1d7df3bddf1a8d8bff45cbcbf2885913663491285a515d732
                            • Instruction ID: 8b9ae61c6da4be1dff3a05d3864a1109474d1d20ea1a05e38be312cad591667e
                            • Opcode Fuzzy Hash: 2a036851afa6ddc1d7df3bddf1a8d8bff45cbcbf2885913663491285a515d732
                            • Instruction Fuzzy Hash: 67F0BE21A0030662CA15BB61EC06D8E3B688F4031CB6000BFE811761D2CFBCEA55859E

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 420 5b3f1b8-5b3f1dd 421 5b3f1df-5b3f1e2 420->421 422 5b3f1e8-5b3f1fd 421->422 423 5b3fbaf-5b3fbb2 421->423 432 5b3f215-5b3f22b 422->432 433 5b3f1ff-5b3f205 422->433 424 5b3fbb4-5b3fbd3 423->424 425 5b3fbd8-5b3fbda 423->425 424->425 427 5b3fbe1-5b3fbe4 425->427 428 5b3fbdc 425->428 427->421 429 5b3fbea-5b3fbf4 427->429 428->427 438 5b3f236-5b3f238 432->438 434 5b3f207 433->434 435 5b3f209-5b3f20b 433->435 434->432 435->432 439 5b3f250-5b3f2c1 438->439 440 5b3f23a-5b3f240 438->440 451 5b3f2c3-5b3f2ef 439->451 452 5b3f2f6-5b3f312 439->452 441 5b3f242 440->441 442 5b3f244-5b3f246 440->442 441->439 442->439 451->452 457 5b3f347-5b3f36c 452->457 458 5b3f314-5b3f340 452->458 463 5b3f3a0-5b3f3c5 457->463 464 5b3f36e-5b3f399 457->464 458->457 469 5b3f3f0-5b3f3fe 463->469 470 5b3f3c7-5b3f3e9 463->470 464->463 471 5b3f400-5b3f409 469->471 472 5b3f40e-5b3f488 469->472 470->469 471->429 478 5b3f4d5-5b3f4ea 472->478 479 5b3f48a-5b3f4a8 472->479 478->423 483 5b3f4c4-5b3f4d3 479->483 484 5b3f4aa-5b3f4b9 479->484 483->478 483->479 484->483
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: $kq$$kq$$kq$$kq
                            • API String ID: 0-2881790790
                            • Opcode ID: 32adefe74d74fdbfb2564d9f2263677db3e3ca0ade268d5f0bf3faeb769e4f89
                            • Instruction ID: f36fd04bf4cff5cd2c4255aaa7c52aaafdb44151b5a55df518ecb4c2aa3e66f6
                            • Opcode Fuzzy Hash: 32adefe74d74fdbfb2564d9f2263677db3e3ca0ade268d5f0bf3faeb769e4f89
                            • Instruction Fuzzy Hash: 9C915074F102098FCF64DF25D991BAEB7B6FB88300F5085A9D809A7359EB34AD418F91

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 865 5b3f19e-5b3f1b4 866 5b3f1b6-5b3f1dd 865->866 867 5b3f1fd 865->867 871 5b3f1df-5b3f1e2 866->871 869 5b3f215-5b3f22b 867->869 870 5b3f1ff-5b3f205 867->870 879 5b3f236-5b3f238 869->879 872 5b3f207 870->872 873 5b3f209-5b3f20b 870->873 875 5b3f1e8-5b3f1f0 871->875 876 5b3fbaf-5b3fbb2 871->876 872->869 873->869 880 5b3f1fb 875->880 877 5b3fbb4-5b3fbd3 876->877 878 5b3fbd8-5b3fbda 876->878 877->878 881 5b3fbe1-5b3fbe4 878->881 882 5b3fbdc 878->882 884 5b3f250-5b3f2c1 879->884 885 5b3f23a-5b3f240 879->885 880->867 881->871 883 5b3fbea-5b3fbf4 881->883 882->881 898 5b3f2c3-5b3f2ef 884->898 899 5b3f2f6-5b3f312 884->899 887 5b3f242 885->887 888 5b3f244-5b3f246 885->888 887->884 888->884 898->899 904 5b3f347-5b3f36c 899->904 905 5b3f314-5b3f340 899->905 910 5b3f3a0-5b3f3c5 904->910 911 5b3f36e-5b3f399 904->911 905->904 916 5b3f3f0-5b3f3fe 910->916 917 5b3f3c7-5b3f3e9 910->917 911->910 918 5b3f400-5b3f409 916->918 919 5b3f40e-5b3f488 916->919 917->916 918->883 925 5b3f4d5-5b3f4ea 919->925 926 5b3f48a-5b3f4a8 919->926 925->876 930 5b3f4c4-5b3f4d3 926->930 931 5b3f4aa-5b3f4b9 926->931 930->925 930->926 931->930
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: $kq$$kq
                            • API String ID: 0-3550614674
                            • Opcode ID: c79544015b258157afa9b6a44a954fdd873c6be59eb0dc21e6c84ebbbc72d7a7
                            • Instruction ID: 2a2bd15342f36221e9b1ddd34fd217be8a2f67a06bfd48fc8b085d1b051b05f1
                            • Opcode Fuzzy Hash: c79544015b258157afa9b6a44a954fdd873c6be59eb0dc21e6c84ebbbc72d7a7
                            • Instruction Fuzzy Hash: 47514D74F102098FCF54DF64D9917AEB7B6FB88340F5084A9C909A7359EB34AC518F91

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1428 61c370e-61c377e 1430 61c3789-61c3790 1428->1430 1431 61c3780-61c3786 1428->1431 1432 61c379b-61c37d3 1430->1432 1433 61c3792-61c3798 1430->1433 1431->1430 1434 61c37db-61c383a CreateWindowExW 1432->1434 1433->1432 1435 61c383c-61c3842 1434->1435 1436 61c3843-61c387b 1434->1436 1435->1436 1440 61c387d-61c3880 1436->1440 1441 61c3888 1436->1441 1440->1441 1442 61c3889 1441->1442 1442->1442
                            APIs
                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 061C382A
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095973859.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_61c0000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: CreateWindow
                            • String ID:
                            • API String ID: 716092398-0
                            • Opcode ID: 42b27623e43368cce81811f7583757d5234e78876898fdccb0fc73b66384d6d1
                            • Instruction ID: 730b4d5f06da2a1dbe97d38310a1c4e4632d753ea835b0b9d00cc8174a0c53f1
                            • Opcode Fuzzy Hash: 42b27623e43368cce81811f7583757d5234e78876898fdccb0fc73b66384d6d1
                            • Instruction Fuzzy Hash: A551B1B5D00309DFDB14CF99C984ADEBBB5BF48310F24862AE419AB210D770A845CF90
                            APIs
                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 061C382A
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095973859.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_61c0000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: CreateWindow
                            • String ID:
                            • API String ID: 716092398-0
                            • Opcode ID: e3f7995db4dfd34c9bbaf6921914c92f7946a03c1d2c01bf12fe4807b41034d5
                            • Instruction ID: e1a92c3d6968d15979f3a4bc4be283151c7ca7e58c090ae71f939cc6803cd3c3
                            • Opcode Fuzzy Hash: e3f7995db4dfd34c9bbaf6921914c92f7946a03c1d2c01bf12fe4807b41034d5
                            • Instruction Fuzzy Hash: 1741AFB1D00309DFDB14CF9AC984ADEBBB5BF48310F24862EE419AB210D771A985CF90
                            APIs
                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 061C82A9
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095973859.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_61c0000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: CallProcWindow
                            • String ID:
                            • API String ID: 2714655100-0
                            • Opcode ID: a8f744ad1b019772ce2d040099cea13295c775aa1a5f98e5211d689785226366
                            • Instruction ID: 112126150d36272a90ad2c045b206b6b55c4118ca4b2d9365f7ce25e98d06bab
                            • Opcode Fuzzy Hash: a8f744ad1b019772ce2d040099cea13295c775aa1a5f98e5211d689785226366
                            • Instruction Fuzzy Hash: 824138B5900745CFCB94CF99C488AAEBFF5FB98324F14C459D519AB320C770A840CBA4
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095973859.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_61c0000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: Clipboard
                            • String ID:
                            • API String ID: 220874293-0
                            • Opcode ID: 1483b977fe935a28b90433db85e9e76362be7e223122fb51a2eba2dce94ce1e9
                            • Instruction ID: 15c788d3134dffd89c0a689bf6e2124616a99f6ceed44b8fae42169dc7267325
                            • Opcode Fuzzy Hash: 1483b977fe935a28b90433db85e9e76362be7e223122fb51a2eba2dce94ce1e9
                            • Instruction Fuzzy Hash: BE31F2B0E01248DFDB54CFA9C984BDEBBF5AF48314F248459E004BB2A4D7B46945CF65
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095973859.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_61c0000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: Clipboard
                            • String ID:
                            • API String ID: 220874293-0
                            • Opcode ID: 15851628a7f0f6f338968a69e23b65a31a36d98fb767a2c49ddeae4398705b9b
                            • Instruction ID: 4bf1e0599a8429048cb0a00920143770ed24a03cd84bde797adb6db7d83fcdee
                            • Opcode Fuzzy Hash: 15851628a7f0f6f338968a69e23b65a31a36d98fb767a2c49ddeae4398705b9b
                            • Instruction Fuzzy Hash: 6E3123B0E01208DFDB14CF99C984BCEBBF5AF48314F248459E004BB294D7B4A885CFA5
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 061C73DF
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095973859.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_61c0000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 5adae027f2310e261340c8a4d5a1eb77b2d1df51764bcda0ec04b33dad633698
                            • Instruction ID: 327d7b92bdcd06c72fc09fb9eec01dfd2c1feaad57f172f7848419cd8efc3489
                            • Opcode Fuzzy Hash: 5adae027f2310e261340c8a4d5a1eb77b2d1df51764bcda0ec04b33dad633698
                            • Instruction Fuzzy Hash: E52105B5D00219DFDB10CFA9D984AEEBBF4EB48320F14841AE958A3250C3749951CFA4
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 061C73DF
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095973859.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_61c0000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 6ba793e33da9c4b70188e7e51eaa0bbf37473913ab75ef25206317f60e9caf9f
                            • Instruction ID: 9485a3a978cf6a658d3e06e265fe7fb7d9f0d4a39f99b9e72d42cf9ca77f84c6
                            • Opcode Fuzzy Hash: 6ba793e33da9c4b70188e7e51eaa0bbf37473913ab75ef25206317f60e9caf9f
                            • Instruction Fuzzy Hash: B021C4B5D002599FDB10CFAAD984ADEBBF4EB48320F14841AE954A7350D374A944CFA5
                            APIs
                            • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 061CA9B3
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095973859.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_61c0000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: HookWindows
                            • String ID:
                            • API String ID: 2559412058-0
                            • Opcode ID: 0304a56073f3162e8b68a2c4a1779394d4ad0238d8ac70eb72d5f1777dc69fa8
                            • Instruction ID: 7431ab4e030ed50f234798e059e5adee2a3832c794864ef631bd317dbfa66247
                            • Opcode Fuzzy Hash: 0304a56073f3162e8b68a2c4a1779394d4ad0238d8ac70eb72d5f1777dc69fa8
                            • Instruction Fuzzy Hash: D52130B5D00249CFCB54CFAAC944BEEFBF4AF88320F10842AE459A7250C775A940CFA0
                            APIs
                            • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 061CA9B3
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095973859.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_61c0000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: HookWindows
                            • String ID:
                            • API String ID: 2559412058-0
                            • Opcode ID: fe88baebe47594956662dd105c3fda23b3cbd9c84a007826130383cf9d5aa52b
                            • Instruction ID: 44e7296729cf3198f5aad11bbe366852a8f271900512c1fa666bb5f13ae643bf
                            • Opcode Fuzzy Hash: fe88baebe47594956662dd105c3fda23b3cbd9c84a007826130383cf9d5aa52b
                            • Instruction Fuzzy Hash: AF2122B1D00209DFCB14CF9AC945BEEFBF9AF88320F10842AE459A7250C775A940CFA4
                            APIs
                            • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000000,?,06481A91,00000800), ref: 06481B22
                            Memory Dump Source
                            • Source File: 00000000.00000002.4096100395.0000000006480000.00000040.00000800.00020000.00000000.sdmp, Offset: 06480000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6480000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: 3da1727a0792483ec208b81a328873b3295069d7989f8165dd8b255e9865a900
                            • Instruction ID: 3a3f072470701cf7c570b3ae3c940795ea847a0912eb1655629a77d9bedfb495
                            • Opcode Fuzzy Hash: 3da1727a0792483ec208b81a328873b3295069d7989f8165dd8b255e9865a900
                            • Instruction Fuzzy Hash: A21114B6D00249DFCB24DFAAD944ADEFBF4EB88324F10842AE459A7310C375A545CFA5
                            APIs
                            • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000000,?,06481A91,00000800), ref: 06481B22
                            Memory Dump Source
                            • Source File: 00000000.00000002.4096100395.0000000006480000.00000040.00000800.00020000.00000000.sdmp, Offset: 06480000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6480000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: 51e04b820f727ea62754687937cc2f96c93f811f3c55239a4f03dfc7bc32616b
                            • Instruction ID: 35d334d344b291ded17ccca8c18afd4f8bff6247c577d5d87d1ef9a1da2122d0
                            • Opcode Fuzzy Hash: 51e04b820f727ea62754687937cc2f96c93f811f3c55239a4f03dfc7bc32616b
                            • Instruction Fuzzy Hash: 2A1126B6D002499FDB10DF9AD444ADEFBF4EB58320F10842AD819A7310C374A545CFA5
                            APIs
                            • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 05800AE7
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095415937.0000000005800000.00000040.00000800.00020000.00000000.sdmp, Offset: 05800000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5800000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: GlobalMemoryStatus
                            • String ID:
                            • API String ID: 1890195054-0
                            • Opcode ID: a6055432db7f35c11682fa1f395e00ff337a0354640a6eb0b8abf7a9b8502881
                            • Instruction ID: 54ea275c600971b7d4ab3d067b9990ae39c8b0e97daf09f53a07d145918b890e
                            • Opcode Fuzzy Hash: a6055432db7f35c11682fa1f395e00ff337a0354640a6eb0b8abf7a9b8502881
                            • Instruction Fuzzy Hash: 411123B1D0026ADFCB10CF9AC944BDEFBF4AF48320F10812AD818A7240D378A944CFA5
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000), ref: 061C2C46
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095973859.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_61c0000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: ad7527d5989cbeaf649c3a63d21e3516026edb429518ac805e2587cdc72bfcf2
                            • Instruction ID: 576ed36d23e5dbd220be3730ae60354442171df6925d96a529761293065a7121
                            • Opcode Fuzzy Hash: ad7527d5989cbeaf649c3a63d21e3516026edb429518ac805e2587cdc72bfcf2
                            • Instruction Fuzzy Hash: 701102B5D003498FCB10DF9AD944BDEFBF4EB48224F10846AD919B7210C374A645CFA9
                            APIs
                            • GetModuleHandleW.KERNEL32(00000000), ref: 061C2C46
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095973859.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_61c0000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: 4c3c88b057474fe0c4d28751f0c9ed96eac9a5d8ae8d91c71e2676fdbe66ea45
                            • Instruction ID: 5002743dd086fe8ca05b49b6eb411e12ed7c7a428ede38f1f5dde0182c31d74e
                            • Opcode Fuzzy Hash: 4c3c88b057474fe0c4d28751f0c9ed96eac9a5d8ae8d91c71e2676fdbe66ea45
                            • Instruction Fuzzy Hash: 32113FB1D002498FCB10DF9AC984ADEFBF4AF89324F10846AD469B7210C374A645CFA4
                            APIs
                              • Part of subcall function 0040AF66: _malloc.LIBCMT ref: 0040AF80
                            • SysAllocString.OLEAUT32 ref: 00401898
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: AllocString_malloc
                            • String ID:
                            • API String ID: 959018026-0
                            • Opcode ID: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
                            • Instruction ID: c2922591c351a4c461934d9b8210169c8be4224f150a02a6988c85a72df9e820
                            • Opcode Fuzzy Hash: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
                            • Instruction Fuzzy Hash: BEF02073501322A7E3316B658841B47B6E8DF80B28F00823FFD44BB391D3B9C85082EA
                            APIs
                            • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,061C84F5), ref: 061C857F
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095973859.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_61c0000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: CallbackDispatcherUser
                            • String ID:
                            • API String ID: 2492992576-0
                            • Opcode ID: 00eae48e357490e8b789854512b96e4e9ec5605c8852ee1f6038292c0e4ed1b7
                            • Instruction ID: 375dbc5d13b149eba6c907aa8e24ae057ff224e1217f6b4ede6d69d4fd675ec7
                            • Opcode Fuzzy Hash: 00eae48e357490e8b789854512b96e4e9ec5605c8852ee1f6038292c0e4ed1b7
                            • Instruction Fuzzy Hash: 99F067B1800308CFCB10CF89D4887DEFBF0AF88324F24842AD559A7250C378A444CFA0
                            APIs
                            • HeapCreate.KERNEL32(00000000,00001000,00000000), ref: 0040D549
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: CreateHeap
                            • String ID:
                            • API String ID: 10892065-0
                            • Opcode ID: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
                            • Instruction ID: a29dbb507fbbbc11cf477c5ad410ace9233c9b691e3651c0b65acef059567112
                            • Opcode Fuzzy Hash: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
                            • Instruction Fuzzy Hash: E8D05E36A54348AADB11AFB47C08B623BDCE388396F404576F80DC6290F678D641C548
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: LRkq
                            • API String ID: 0-1052062081
                            • Opcode ID: 18fc0847cd4b7ba3a48b250f4a12c8ac9809ce01c03b293451176f083045525c
                            • Instruction ID: 80a377dda8ad52174bba7cc6df227c2f3a69dc6aaba786c9dedbb0ef29d42beb
                            • Opcode Fuzzy Hash: 18fc0847cd4b7ba3a48b250f4a12c8ac9809ce01c03b293451176f083045525c
                            • Instruction Fuzzy Hash: B1516F34B102148FDB14EB68C959AAD77FAFF89710F2044A9E406EB3A4CB75EC41CB91
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: PHkq
                            • API String ID: 0-902561536
                            • Opcode ID: 918ed720acd4349cdd82da5668311ec3979460ef964b630a4ed41e631ecc041b
                            • Instruction ID: d032a8586a4f82336f6fcabe0fca49c72df49a9a45f8b8bb4d24f1f2643118e7
                            • Opcode Fuzzy Hash: 918ed720acd4349cdd82da5668311ec3979460ef964b630a4ed41e631ecc041b
                            • Instruction Fuzzy Hash: 8231AE30B002058FCB149B34951566F7BA7FB88610F2089A8D406FB395EE39EC46CB91
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: PHkq
                            • API String ID: 0-902561536
                            • Opcode ID: 5d8066afcab8335aabf52c5ad727894d9da1704e4398b53dbd4bb3da3e9b6fa4
                            • Instruction ID: cce31fa628e90789909827a0e38177162aa112758b525078319d50b2da5827e4
                            • Opcode Fuzzy Hash: 5d8066afcab8335aabf52c5ad727894d9da1704e4398b53dbd4bb3da3e9b6fa4
                            • Instruction Fuzzy Hash: F131D031B002018FCB159B34D61566E7BA7FB88210F2489ACD446FB395EF39EC42CB91
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: LRkq
                            • API String ID: 0-1052062081
                            • Opcode ID: 464a672d6c57ee13ef354543df815cf26ded1d7a8321e94ba3218d7ef082276f
                            • Instruction ID: 1731efa18694fa39fefc1dccd29344fc4a985ec4db13a236262916c586c6e87a
                            • Opcode Fuzzy Hash: 464a672d6c57ee13ef354543df815cf26ded1d7a8321e94ba3218d7ef082276f
                            • Instruction Fuzzy Hash: BA314031E102099BDB14CF68D552BAEB7BAFF85310F6089A9E805FB250FB71B941CB50
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: LRkq
                            • API String ID: 0-1052062081
                            • Opcode ID: ee52c67ce9b5d47623583b7584ddf778e14f7618b94b637fc287433c312e1afb
                            • Instruction ID: f6ee21bf6a35901af11b819e5294860882f30749e4b1583ad1404f4b376e0453
                            • Opcode Fuzzy Hash: ee52c67ce9b5d47623583b7584ddf778e14f7618b94b637fc287433c312e1afb
                            • Instruction Fuzzy Hash: 08313D71E102059BDB15CF68C592BADB7BAFF85300F6088A5E805FB254FB74A941CB50
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: LRkq
                            • API String ID: 0-1052062081
                            • Opcode ID: 5bc28d0c9f45cccaa2fa8aa8e0ed5aeccfc1d7c37674b688340a449b3980ff1f
                            • Instruction ID: 565ff8c50c046c55623a3f96956e25438bc092f63f1511ba0e1e5cc80b8efc34
                            • Opcode Fuzzy Hash: 5bc28d0c9f45cccaa2fa8aa8e0ed5aeccfc1d7c37674b688340a449b3980ff1f
                            • Instruction Fuzzy Hash: A41103717102044FC706AB79E4246AE7BB3EF8A310F1184A9E005CB39CEE34EC018B95
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: LRkq
                            • API String ID: 0-1052062081
                            • Opcode ID: 4989db873cfb8bbe573ab3fcd83b5e1ab7ab49388631e306a74f808356f5accf
                            • Instruction ID: c42b243ae9860f88658290954cfaa466c532e5c05c0494cd99afb12c767b99a8
                            • Opcode Fuzzy Hash: 4989db873cfb8bbe573ab3fcd83b5e1ab7ab49388631e306a74f808356f5accf
                            • Instruction Fuzzy Hash: 6B0124707042149FCB06AF78D0146AE7BF7EFCA310B1080AAD019CB3A4EE35EC418B95
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: $kq
                            • API String ID: 0-3037731980
                            • Opcode ID: 919ec7c45821cad571e5db8e2931fc65f92297e463d373448cae08e191c9498d
                            • Instruction ID: 929aef5fdab0a98ac4ef968e08d8e4b5d44ec17377dfd789f9b3c68961d79684
                            • Opcode Fuzzy Hash: 919ec7c45821cad571e5db8e2931fc65f92297e463d373448cae08e191c9498d
                            • Instruction Fuzzy Hash: DAF05835A44204CFDF2A9A44EA866EDB7BAFB40211F1848ABD902B3194C739F981CB50
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5cdd419bfbc74b835a57b1ead5aed36a960ece268b8272808148ab28afc84bd5
                            • Instruction ID: abf8725ce1d63736734d7711c4ef180c7a6355924764a2a41d369a37859cb7bd
                            • Opcode Fuzzy Hash: 5cdd419bfbc74b835a57b1ead5aed36a960ece268b8272808148ab28afc84bd5
                            • Instruction Fuzzy Hash: 59A25A34A00304CFCB24DF64C599A6DBBB2FB45355F6489A9E446AB3A5DB35EC81CF80
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4cb90d7ca642a6368b646574d521511e4e15f25bb173483b463255303e69fc54
                            • Instruction ID: 6e1472e3a99bbdadd375d92bc720cc125821391bf81edf54be3ddf98544a4768
                            • Opcode Fuzzy Hash: 4cb90d7ca642a6368b646574d521511e4e15f25bb173483b463255303e69fc54
                            • Instruction Fuzzy Hash: F8D18135B102048FCF14DF68D599A6DBBB2FB89310F2485A9E806E73A5DB35EC45CB84
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7a8803e0c31a5de2f0d85e37f669fddd7980b0bce535146d86e25ce64e007cd8
                            • Instruction ID: d4463c46bee941c6e93efd2cf2e69ac635f0ca89f6b4d5750ab0a359ab7894c6
                            • Opcode Fuzzy Hash: 7a8803e0c31a5de2f0d85e37f669fddd7980b0bce535146d86e25ce64e007cd8
                            • Instruction Fuzzy Hash: 4EA101757203008BCFA92778B06963C79A3FBC9356BB544ADE506D7380DE35EC429B4A
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ccd019ac916c8f60f0a2af422a60491731230d7aaade6e4c34d030d9d9e7297e
                            • Instruction ID: 7222d38d68859bebd8380f4bc6d0cf28c715152439aec6300b2d7526c4edf94d
                            • Opcode Fuzzy Hash: ccd019ac916c8f60f0a2af422a60491731230d7aaade6e4c34d030d9d9e7297e
                            • Instruction Fuzzy Hash: C8817E71A002049FDF04DF69D985B9DBBB6FF88310F14C1A9E909AB3A5DB71E844CB90
                            Memory Dump Source
                            • Source File: 00000000.00000002.4093196854.0000000002220000.00000040.00000800.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_2220000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 33b12303080e827ce1cff4d8ebaf9a1c4761002f8fdf9b1408c1bd9e3dac0b1a
                            • Instruction ID: 76e42605293ef34d963548550b7a1d49d5eb030227b0d013bc4bf4f6ef0ba0ab
                            • Opcode Fuzzy Hash: 33b12303080e827ce1cff4d8ebaf9a1c4761002f8fdf9b1408c1bd9e3dac0b1a
                            • Instruction Fuzzy Hash: A9715EB0E10219EFDF14CFA9C88179EBBF6AF88314F148029E405A7258DBB59845CF91
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 098103954ce05e4cac757b0548378b178ca8b1d1f232db3e39c2e8076fee80ec
                            • Instruction ID: 1aa5c6a6cb546aa306b7b79cd60f56506a9dc99576517067fafc0b51abb45385
                            • Opcode Fuzzy Hash: 098103954ce05e4cac757b0548378b178ca8b1d1f232db3e39c2e8076fee80ec
                            • Instruction Fuzzy Hash: 73419430B002459FDF20DB68D995B7FB766FB85310F2088AAD40AEB395E635EC858785
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6dc34bd74e33e33200999539ada3bfee9c54cc761e9641cb0c70d1d67bf1e9be
                            • Instruction ID: b5dd679403f503e81ebd04b0ffba803dc7622bc34c1f68db10c7c9f646157a96
                            • Opcode Fuzzy Hash: 6dc34bd74e33e33200999539ada3bfee9c54cc761e9641cb0c70d1d67bf1e9be
                            • Instruction Fuzzy Hash: 7651F3B1E002188FDB14DFA9C889B9DBBB1FF48310F55815AE819BB254D7B4A944CB94
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 05ca4f440fb3c174b405b79ccabb4b8107f3c667b679693164a001b27b1a6adb
                            • Instruction ID: b661bdacacd9fd707804520577110e83c96955f9f717afd794461af0f05e7a59
                            • Opcode Fuzzy Hash: 05ca4f440fb3c174b405b79ccabb4b8107f3c667b679693164a001b27b1a6adb
                            • Instruction Fuzzy Hash: BE510370E006188FDB14DFA9C889B9DBBF1FF48310F148159E819BB264D7B4A944CF94
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 74c8b3f144fc8a0a89844af2977729c3d72b4f7bc24716531283e849203fa665
                            • Instruction ID: dfeac3eb717b4da52d94c97826e5454353a602038f829fdad5a233dea63cb1b3
                            • Opcode Fuzzy Hash: 74c8b3f144fc8a0a89844af2977729c3d72b4f7bc24716531283e849203fa665
                            • Instruction Fuzzy Hash: 0E317031B106058BCF05DFA4D4996AEBBB3BF89310F608569E801FB344EF74A8028B95
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e8be601df5b1bc36ec213786126956b942c028df08f37d2c4410c5add181f96f
                            • Instruction ID: 6cc004e9433c73e72846a26629822d8923f511bf579e9784390b43d5794393c7
                            • Opcode Fuzzy Hash: e8be601df5b1bc36ec213786126956b942c028df08f37d2c4410c5add181f96f
                            • Instruction Fuzzy Hash: 16316F31B106058BCF05DFA4D4956AEBBB3BF89210F208569E805E7354EF70A8428B95
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 840da6d04098a6df61cbbb56d1ad9e49617cbf47d02594e324b5b11876e44a78
                            • Instruction ID: 230efbaf8c07f8260d92c1c2ad84a58d235ad0165ab7285940c7b8bb8710b35e
                            • Opcode Fuzzy Hash: 840da6d04098a6df61cbbb56d1ad9e49617cbf47d02594e324b5b11876e44a78
                            • Instruction Fuzzy Hash: 8131C171E102059BCF15CF64D9996AEBBB2FF85300F5184AAE801EB391EF74E8468B50
                            Memory Dump Source
                            • Source File: 00000000.00000002.4093196854.0000000002220000.00000040.00000800.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_2220000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5e453547a3e9fadce5a226354a963912cf34fc75d575b55667b668b3ef79d5c9
                            • Instruction ID: c95f6f29848dca6d68492b3559269967da659e5d4853559e3c9221da7203fb14
                            • Opcode Fuzzy Hash: 5e453547a3e9fadce5a226354a963912cf34fc75d575b55667b668b3ef79d5c9
                            • Instruction Fuzzy Hash: A441C0B0D00359EFDB10DF99C584ADEBFF5BF48314F10842AE819AB254DB75A949CB90
                            Memory Dump Source
                            • Source File: 00000000.00000002.4093196854.0000000002220000.00000040.00000800.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_2220000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8614cf531c4db9ad541fefbfb90978cc1a9c9a0baf6d329d242503088854a478
                            • Instruction ID: af036fe2131f373fa76a2b8ab1f7b9d502a53102fc72b234144b330237dcaa35
                            • Opcode Fuzzy Hash: 8614cf531c4db9ad541fefbfb90978cc1a9c9a0baf6d329d242503088854a478
                            • Instruction Fuzzy Hash: FE3141347102259FDF18EFB4D5546AE77B6AB89304F100468D806AB3ACDF7ADC45CBA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 043f56204144989575c318669658a761257228c5d3ad3ae888007505d85e17b3
                            • Instruction ID: 1ba0bea790afd8659b0e98c5a0ae1f714c73eb72857ac47e1795a22dbc6f528f
                            • Opcode Fuzzy Hash: 043f56204144989575c318669658a761257228c5d3ad3ae888007505d85e17b3
                            • Instruction Fuzzy Hash: 24317F31E102059BCF55CF64D5596AEBBB2FF89300F518569E802FB354EF71E8468B50
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5554303348b5f61218f45e5290877d8c999aa630d0dec834cde3e366fdf4b7c9
                            • Instruction ID: c13b67e53d8d86ae506d76fa8a4e02753d1f5bcad4fa6e5eec02aaf0cf4ff8cf
                            • Opcode Fuzzy Hash: 5554303348b5f61218f45e5290877d8c999aa630d0dec834cde3e366fdf4b7c9
                            • Instruction Fuzzy Hash: DE215A75B102159FDB00DFA9D941AAEBBF1FB48600F108069E905F7354EB34EC418BA4
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e5bbd10d2afff6c570cbc37048d55dea9a03c5735c854c4c5cc3f0732739106c
                            • Instruction ID: 10d61c48fe1593672733dd1465b56c6c8c8d51ed5d80837ee081ca4dd99fabaa
                            • Opcode Fuzzy Hash: e5bbd10d2afff6c570cbc37048d55dea9a03c5735c854c4c5cc3f0732739106c
                            • Instruction Fuzzy Hash: A62146B5A106159FDB00DFA9D981BAEBBF1FB48710F10806AE905F7395EB35EC018B90
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a759153f79cf61c3080789f9f38cce9f18164093078071036eda4935b7b02fbe
                            • Instruction ID: f5c571a9a52d91f623bf4a273f409692ada8b28bf34c9b8b4d140237170b5a44
                            • Opcode Fuzzy Hash: a759153f79cf61c3080789f9f38cce9f18164093078071036eda4935b7b02fbe
                            • Instruction Fuzzy Hash: 4421A131E102099BCF18CF64D5556AEBBB2EF89310F508569EC12B7390EF75A846CB40
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092916460.00000000020CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 020CD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_20cd000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8d92e46098937bb23efd7fa2f5e882f7c1c83b6487a42d1a1770ffef4bf22408
                            • Instruction ID: 19869bbc9e89e9b54b2bd3badb4c0e3edfc8211711f22283c5514b8750630827
                            • Opcode Fuzzy Hash: 8d92e46098937bb23efd7fa2f5e882f7c1c83b6487a42d1a1770ffef4bf22408
                            • Instruction Fuzzy Hash: EB21EDB1500304DFDB05AF14DAC0B2ABBA5EB98314F20857DE80D4A256C336D456EAA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bc255c303b954f86d8d4abcf38d0f0d3c78826c4ce4c1039ec809fe6f3626245
                            • Instruction ID: 3cd2fac4308ce1587cdc62a11a0a22eee06e7e430f9e7614a3eff0da940fe88e
                            • Opcode Fuzzy Hash: bc255c303b954f86d8d4abcf38d0f0d3c78826c4ce4c1039ec809fe6f3626245
                            • Instruction Fuzzy Hash: DB217F31E102059BCF18CFA4D5556AEB7B6FF89310F10856AE816BB390EF75A846CB40
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092963083.00000000020DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 020DD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_20dd000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c8da91135ab6e4ca35cc9ec8f0e024985f4cd602f2c192a5906bfe23ce046afe
                            • Instruction ID: cbde883e67c6f839fa36991705d6b1a16f53819a5d085be002114f68569994f6
                            • Opcode Fuzzy Hash: c8da91135ab6e4ca35cc9ec8f0e024985f4cd602f2c192a5906bfe23ce046afe
                            • Instruction Fuzzy Hash: 6D2146B2600300DFDB09DF14D5C0B2ABBA5FB84314F20C56DD9094B256C376F846DB61
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092963083.00000000020DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 020DD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_20dd000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e652b3d8428769cfe9d292ac30bb9957a5a27cd07a24e86a0996b751d56b2d43
                            • Instruction ID: d6ee47371a4fe31b56f65d651336a209c5b2744822ca42631b4222e0e0464c7e
                            • Opcode Fuzzy Hash: e652b3d8428769cfe9d292ac30bb9957a5a27cd07a24e86a0996b751d56b2d43
                            • Instruction Fuzzy Hash: 902138B2545300DFDB11DF14D9C4B3ABBA5FB94324F20C569D8494B245C376D446DAA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092963083.00000000020DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 020DD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_20dd000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1f907cb9cdbc464d53f07cab31344e1c94da6ba67fbf3da993bc0cabb0805ad4
                            • Instruction ID: 831e03319fe44ef0b8d53dc8884c6bc8d7d59c0388b22a13ccfdd82ab184b605
                            • Opcode Fuzzy Hash: 1f907cb9cdbc464d53f07cab31344e1c94da6ba67fbf3da993bc0cabb0805ad4
                            • Instruction Fuzzy Hash: 91210472504304DFDB15DF14D9C0B2ABFA5EBC4314F64C56ED9094B256C33AD847DA62
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092963083.00000000020DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 020DD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_20dd000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ddfdbcef9eddac502844d6a0fd7fe9cbcbea57bac4caaafe1b93343e9fd106f2
                            • Instruction ID: be5ef81b775e9f35c6794ce73437dababfe53322de917a92757597598dc87ce9
                            • Opcode Fuzzy Hash: ddfdbcef9eddac502844d6a0fd7fe9cbcbea57bac4caaafe1b93343e9fd106f2
                            • Instruction Fuzzy Hash: DA215E755093809FC703CF64D994711BFB1EB46214F29C5DBD8848B2A7C33A984ADB62
                            Memory Dump Source
                            • Source File: 00000000.00000002.4093196854.0000000002220000.00000040.00000800.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_2220000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6bc7b66104cfe807a6f61e2ccc452234a39e1dbe4eda016f0196242315de2586
                            • Instruction ID: 3333f2c9383c21e1a965d0e0d1a571eee1ca38b723a26fcfb1283f0ab47888c9
                            • Opcode Fuzzy Hash: 6bc7b66104cfe807a6f61e2ccc452234a39e1dbe4eda016f0196242315de2586
                            • Instruction Fuzzy Hash: BC213934B10215CFDB54EFB8C568AAD77F2AB4D700F100468E806EB3A5DB769C44CB50
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b19eba32ce6acf555f80318bf5021d81a6fb96ce7f679f13e55b2dfffdaee72b
                            • Instruction ID: b4f43000e1c1e32ee54e50f92555b1fdf42248a67fb35da6b987067d2d297647
                            • Opcode Fuzzy Hash: b19eba32ce6acf555f80318bf5021d81a6fb96ce7f679f13e55b2dfffdaee72b
                            • Instruction Fuzzy Hash: C12128B1C05258AFCB01DF9AC9846CEFFB4FF49320F10816AD558A7251D3746944CBA5
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3255b5f612481439dc3920058251542aee5b5d879e2b67529ad78ec57d5721f8
                            • Instruction ID: bf7e9f589e320f108a59e085242919210bd9f95fe08488f2cfd6ca8b9dbe9f71
                            • Opcode Fuzzy Hash: 3255b5f612481439dc3920058251542aee5b5d879e2b67529ad78ec57d5721f8
                            • Instruction Fuzzy Hash: E4217531B101149BCF54DB69E552AADBBB7EF84250F108469E805F7354DB31AC018B90
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b774f461ed1d425fcc488847fab7764291eab4768d0681be2324f65493ee67b0
                            • Instruction ID: 411e94d6d0ba6e8b784df51eede3855b152e865438c5d05e744e2a8e76c6d976
                            • Opcode Fuzzy Hash: b774f461ed1d425fcc488847fab7764291eab4768d0681be2324f65493ee67b0
                            • Instruction Fuzzy Hash: 99116536B101254BCF6496A8D8156BE77EBEBC9650B108579D406F7358EE34EC028BD1
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092916460.00000000020CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 020CD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_20cd000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: db79b5eb69be54bde6d22b58705b80061de706f1e28455fb2d9027648eeca995
                            • Instruction ID: 26fbc040ac6061f83778ee5d3f8372efbb807b4f82e362c8f5655cb31984d2c7
                            • Opcode Fuzzy Hash: db79b5eb69be54bde6d22b58705b80061de706f1e28455fb2d9027648eeca995
                            • Instruction Fuzzy Hash: 1C11DFB2404340CFCB02DF10D9C4B1ABFA1FB94314F24C5ADD8090B256C336D45ADBA1
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ef979c2d5ba0b87780fbb5d13e348ec9d1c88107e3a273226f80ac9ca2090cb1
                            • Instruction ID: 020c0e1ab7a61d7eff503a67f8e49001be7d551cf40da7b5ab4e18aad3dd78ee
                            • Opcode Fuzzy Hash: ef979c2d5ba0b87780fbb5d13e348ec9d1c88107e3a273226f80ac9ca2090cb1
                            • Instruction Fuzzy Hash: 6421EFB1D00259ABCB10DF9AD985A9EFFB4FB49320F10816AE918B7200C374A954CFA4
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 140782a87f33d4afba6ac9496201139fe0e181a0200f5e30eaa60fc9d4ce2a37
                            • Instruction ID: e05de56c5e45b92cedfe553ee29379cf4dadce1053c56cb0e68da09811ebc2e2
                            • Opcode Fuzzy Hash: 140782a87f33d4afba6ac9496201139fe0e181a0200f5e30eaa60fc9d4ce2a37
                            • Instruction Fuzzy Hash: 2C21C0B1D01259EBCB10DF9AD985ADEFFB4FB49320F10816AE918B7200D374A944CFA5
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ed5f7e37f1b0292a58e882c2581c5282904888afea2abf1efc666497aebc4bdc
                            • Instruction ID: 3350a7f27b6a5f38583adb8e622a2c05fce79e36ce1a111a3fe94b2aa8c4fac7
                            • Opcode Fuzzy Hash: ed5f7e37f1b0292a58e882c2581c5282904888afea2abf1efc666497aebc4bdc
                            • Instruction Fuzzy Hash: 7401BC32B100241BCF5495A8C815AFF76BBEBC9650F108579D50AF7754EE24DC0247E1
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092963083.00000000020DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 020DD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_20dd000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 021c8d7180bca40b1b4a0da321e6e5f783d7625571517dbbd39f1422581fcb41
                            • Instruction ID: 272248084e72f3215a4af4bb0fc29f8f323863be380a70254f3b5110e8823303
                            • Opcode Fuzzy Hash: 021c8d7180bca40b1b4a0da321e6e5f783d7625571517dbbd39f1422581fcb41
                            • Instruction Fuzzy Hash: 83119076504340DFDB06CF14D5C4B15BFA1FB84314F24C6AED9494B656C33AE44ADB52
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092963083.00000000020DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 020DD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_20dd000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6e076aa5e16aaa5104c2124104ac01287a50f003186d84f635ef1b786dd729d4
                            • Instruction ID: cf151b40197b80ae36ec4e877c491acee61ad02352a55a6f314712df6f34430c
                            • Opcode Fuzzy Hash: 6e076aa5e16aaa5104c2124104ac01287a50f003186d84f635ef1b786dd729d4
                            • Instruction Fuzzy Hash: 11119D76505380CFDB12CF14D5C4B2ABBA1FB94324F24C6AAD8494B646C33AD40ADBA2
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8df85c2a05f324641c87694c5cedaa61f1981baa27549efb5f76d65f103c33e2
                            • Instruction ID: e17af08fca1c3026c0cf4f994f4cfef2d81152680e326bca71a7ac8846c8ab03
                            • Opcode Fuzzy Hash: 8df85c2a05f324641c87694c5cedaa61f1981baa27549efb5f76d65f103c33e2
                            • Instruction Fuzzy Hash: 3411A171A002048FCB04EF55DD45B8ABB76FF80310F95C5A4C8085F2A9DB74E949CBE1
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092916460.00000000020CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 020CD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_20cd000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4caa30a8111f9b27042348059648dae97f0c059b0eb7601f3ad9b730978b69ad
                            • Instruction ID: 98a4d75ec21e5862422d71992ec406be931396f562163317e6702eb9bf6f68c9
                            • Opcode Fuzzy Hash: 4caa30a8111f9b27042348059648dae97f0c059b0eb7601f3ad9b730978b69ad
                            • Instruction Fuzzy Hash: 43012DA140D3809ED7124B298D94756BFA4EF53224F29849BD8848F197C2699C45D771
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092916460.00000000020CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 020CD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_20cd000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 752688657424c442b4a84425a40665d1f4bb08733672d81981869f2eb8d2786e
                            • Instruction ID: 4e7a508009c0fbc58d735675e7366d01572a37249be7e068acd7e5c7a8bf82fa
                            • Opcode Fuzzy Hash: 752688657424c442b4a84425a40665d1f4bb08733672d81981869f2eb8d2786e
                            • Instruction Fuzzy Hash: 90017CB15083449AE7218B29C984B6BBFD8EB41234F38C53EED484A286C379D842D6B1
                            Memory Dump Source
                            • Source File: 00000000.00000002.4093196854.0000000002220000.00000040.00000800.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_2220000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b91c7bea42478c94003ff175d1b1ed0d811bd4558213dc99b9d1f9fb31793def
                            • Instruction ID: 83d73cf2950ecaeb49b8e15c3f5f616787a12aea57876bc0b300a843843fc29c
                            • Opcode Fuzzy Hash: b91c7bea42478c94003ff175d1b1ed0d811bd4558213dc99b9d1f9fb31793def
                            • Instruction Fuzzy Hash: B4F04F30360220AFDA58A6789955B6972A69F85B54F010079F901CF7E9DFA3DC42C750
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ba76304ba5731389594ccf660b2ab01358e7d36786e5b909e9dd22917bda603e
                            • Instruction ID: 85d77b62529836aa111824859aea05598b99c4cac106593f884eac5c4a7f3de2
                            • Opcode Fuzzy Hash: ba76304ba5731389594ccf660b2ab01358e7d36786e5b909e9dd22917bda603e
                            • Instruction Fuzzy Hash: 3B01A7715201099FCB00FBA8FE845DDBB72EB81310F5057A8C5014F6ADDE75AA458BD1
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b455913e2ec2eb3d3bfd52e9d17c2d5b7abc918109957056be5fb2df4397fdfd
                            • Instruction ID: eff5d61009d68ff5f7cb8e6a897b8d3e5bb69aa29e80c5eb92787e740851c159
                            • Opcode Fuzzy Hash: b455913e2ec2eb3d3bfd52e9d17c2d5b7abc918109957056be5fb2df4397fdfd
                            • Instruction Fuzzy Hash: E30112309202099FCB00FFB8FE545ADBB72EB81300F5056A8C5059766CEB70AA488FD5
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c71e7c7a9d3f063e3db38a484d81d6b72a2f1f5ae66c36ad9d89d54d325c79fb
                            • Instruction ID: 2cfd8c8b88f54fde9a0579176c7f68accaec8873fc378fd7b11e4f1c8ae3720d
                            • Opcode Fuzzy Hash: c71e7c7a9d3f063e3db38a484d81d6b72a2f1f5ae66c36ad9d89d54d325c79fb
                            • Instruction Fuzzy Hash: E0D022F7A216106BCB103BD0FD401DA7B01A748716B1A48D2E008C339BDD3CC8024B80
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 91fdce74128fcdf382559d1c73bc0b59f254ef7fe4f63a01076b076a8ef087a0
                            • Instruction ID: e23164785af7bd7b66a9882c387624dca1cc3e3b27cedcdb5375ee086937738a
                            • Opcode Fuzzy Hash: 91fdce74128fcdf382559d1c73bc0b59f254ef7fe4f63a01076b076a8ef087a0
                            • Instruction Fuzzy Hash: E1C02B35230334A74D0032D4B8004CBB70EC68C2253508597F8084330BCE7AEC010BD5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: $kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                            • API String ID: 0-1324371161
                            • Opcode ID: 9f9fe1c7d2f07ca0beab44f1bd7f0458b739ba283956b9f2f1b8be2c4b1546b1
                            • Instruction ID: 84054d4537c0fa58c8ba6bd8b42909167d06dadaf4e67b90d23813a671b5dc8d
                            • Opcode Fuzzy Hash: 9f9fe1c7d2f07ca0beab44f1bd7f0458b739ba283956b9f2f1b8be2c4b1546b1
                            • Instruction Fuzzy Hash: 02123F30B11219CFDB24DFA5C955AAEB7B2FF84340F2085A9D40AAB364DB35AD85CF40
                            APIs
                            • IsDebuggerPresent.KERNEL32 ref: 004136F4
                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00413709
                            • UnhandledExceptionFilter.KERNEL32(0041FB80), ref: 00413714
                            • GetCurrentProcess.KERNEL32(C0000409), ref: 00413730
                            • TerminateProcess.KERNEL32(00000000), ref: 00413737
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                            • String ID:
                            • API String ID: 2579439406-0
                            • Opcode ID: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
                            • Instruction ID: 93bf0ba95bc2a0faef8203f21c221f33afe887fd41373e09ae0fa508b254143b
                            • Opcode Fuzzy Hash: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
                            • Instruction Fuzzy Hash: A521C3B4601204EFD720DF65E94A6457FB4FB08356F80407AE50887772E7B86682CF4D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: @$@$PA
                            • API String ID: 0-3039612711
                            • Opcode ID: 524773d1bc2011db47f0014430bcd25baf081f96639b8f8b2c6f9a821cea509b
                            • Instruction ID: 284407f43597d2b1529aa5dbb826e4f49811f0ea4eaa41d9cabafce47d44ff82
                            • Opcode Fuzzy Hash: 524773d1bc2011db47f0014430bcd25baf081f96639b8f8b2c6f9a821cea509b
                            • Instruction Fuzzy Hash: 64E159316083418FC724DF28C58066BB7E1AFD9314F14493EE8C5A7391EB79D949CB8A
                            APIs
                            • GetProcessHeap.KERNEL32 ref: 0040ADD0
                            • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 0040ADE1
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: Heap$FreeProcess
                            • String ID:
                            • API String ID: 3859560861-0
                            • Opcode ID: 97be969a41baf58eb72298c462d2c401217e5b830f10c891868ac5f2a1a85b43
                            • Instruction ID: 72dd180cd7110ee49b406fd12918c6a771032a3efea8c67e715e4993f3fed615
                            • Opcode Fuzzy Hash: 97be969a41baf58eb72298c462d2c401217e5b830f10c891868ac5f2a1a85b43
                            • Instruction Fuzzy Hash: 54E09A312003009FC320AB61DC08FA337AAEF88311F04C829E55A936A0DB78EC42CB58
                            Memory Dump Source
                            • Source File: 00000000.00000002.4096100395.0000000006480000.00000040.00000800.00020000.00000000.sdmp, Offset: 06480000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6480000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8c7d3db99d2639859344e4a7cde70469a082362eb11911fc1aebaea7c2cc481d
                            • Instruction ID: a1f20d785c44edbd481729dd0608c3081fc28832b3ad6a29805b3ef2f28be8a4
                            • Opcode Fuzzy Hash: 8c7d3db99d2639859344e4a7cde70469a082362eb11911fc1aebaea7c2cc481d
                            • Instruction Fuzzy Hash: D6D12A30E00209CFDB95EFA9C948BAEBBF2BF45304F15855AE405AF2A5DB749945CB80
                            APIs
                            • SetUnhandledExceptionFilter.KERNEL32(Function_000123AF), ref: 004123F6
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: ExceptionFilterUnhandled
                            • String ID:
                            • API String ID: 3192549508-0
                            • Opcode ID: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
                            • Instruction ID: 17be93bd3878235df00445469c4c747c8dbd7a907b9f456768254b9c32cbcc1b
                            • Opcode Fuzzy Hash: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
                            • Instruction Fuzzy Hash: CA900270661144D7865017705D0968669949B4C6427618471653DD4098DBAA40505569
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4093196854.0000000002220000.00000040.00000800.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_2220000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'kq
                            • API String ID: 0-3255046985
                            • Opcode ID: 08f7cf5fc29d1174b9e81a44a1acdecd5cdd44968166a6bba2ff9806f5052b83
                            • Instruction ID: 8335268d4d880d4b6e1ebf6695f32878e96f1d2453c3e81d8e5cb78cf4661135
                            • Opcode Fuzzy Hash: 08f7cf5fc29d1174b9e81a44a1acdecd5cdd44968166a6bba2ff9806f5052b83
                            • Instruction Fuzzy Hash: 21717D719242448FD709EF3AE85169EBFE2EF86300B14D1AAD0059B26DDF38580BCF95
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4093196854.0000000002220000.00000040.00000800.00020000.00000000.sdmp, Offset: 02220000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_2220000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4'kq
                            • API String ID: 0-3255046985
                            • Opcode ID: 22e2b7d53b7997db01087793473c52a16dc264cd6bf5f553c1cfd64c66beef9a
                            • Instruction ID: 95d074fe7906f9051eb75e951bdd0b49c2a6c71657c9d037496e99f01ea7b1b3
                            • Opcode Fuzzy Hash: 22e2b7d53b7997db01087793473c52a16dc264cd6bf5f553c1cfd64c66beef9a
                            • Instruction Fuzzy Hash: 91510971A202048FD708EF6BE9516AEBFE3EBCA300B14D169D1059B26CDF7868078F55
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8976f0a61fc1960936828f21bd26f3318fd330ab7a4f50ce487ee3b945538f04
                            • Instruction ID: d5e3495c9826dce769b252ea72d1bcaf7b5d46a24141b332915225fd3cdae7ad
                            • Opcode Fuzzy Hash: 8976f0a61fc1960936828f21bd26f3318fd330ab7a4f50ce487ee3b945538f04
                            • Instruction Fuzzy Hash: 9852A471A047129FC708CF29C99066AB7E1FF88304F044A3EE896E7B81D739E955CB95
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 20055dc05f39624d89f9d13173d00032c9ddb5f23ed3028259e70998ae7a08b4
                            • Instruction ID: 17d22deff8d32e931318445bbea846c6b698fa6fcc44f6923348d96d7e24b863
                            • Opcode Fuzzy Hash: 20055dc05f39624d89f9d13173d00032c9ddb5f23ed3028259e70998ae7a08b4
                            • Instruction Fuzzy Hash: 0A329E70A087029FD318CF29C98472AB7E1BF84304F148A3EE89567781D779E955CBDA
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 020392db844ceed98276714fd2150c2ad4a639f6bad3fb02a1d0621011a6745a
                            • Instruction ID: cc67e10771130af0a5279b37c8f7fa75a2653c997645fd1ae8a0b8309c7f2627
                            • Opcode Fuzzy Hash: 020392db844ceed98276714fd2150c2ad4a639f6bad3fb02a1d0621011a6745a
                            • Instruction Fuzzy Hash: 48E1D6306083514FC708CF28C99456ABBE2EFC5304F198A7EE8D68B386D779D94ACB55
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 75cdf14ac5a6ac82dfa6ec1eb0c7bb7ebe15bd557e5c4ab4a31b6072d8dcad2b
                            • Instruction ID: 40a772695998ed4e2cf5b7335c8d4e4070efce41fe7c758b36aa5a1d668e40f4
                            • Opcode Fuzzy Hash: 75cdf14ac5a6ac82dfa6ec1eb0c7bb7ebe15bd557e5c4ab4a31b6072d8dcad2b
                            • Instruction Fuzzy Hash: FC1264B8422B458ED720CF65ED8E18D3FB1BB56319B504209E2616B2E5DFBC258BCF44
                            Memory Dump Source
                            • Source File: 00000000.00000002.4096100395.0000000006480000.00000040.00000800.00020000.00000000.sdmp, Offset: 06480000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6480000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 967d40cea7f4b9671dda8c4b02af5350581e2c2cefd6542cc3c8b90c27784bdf
                            • Instruction ID: bc09160d57357406ef0f90de9000971a03e97bb1baccbe5cb5f3ac31b97decb8
                            • Opcode Fuzzy Hash: 967d40cea7f4b9671dda8c4b02af5350581e2c2cefd6542cc3c8b90c27784bdf
                            • Instruction Fuzzy Hash: 4DD1D831C2075A8ECB11EB64D964ADDB7B2FF95300F60D79AD1493B225EB706AC4CB41
                            Memory Dump Source
                            • Source File: 00000000.00000002.4096100395.0000000006480000.00000040.00000800.00020000.00000000.sdmp, Offset: 06480000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6480000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e30e9acfeb96a2526bf6f5260bc25cb453e2a4b733c0efb5a3a3079bcb3d8872
                            • Instruction ID: 3444f41f833e12114de068365dc17b1a8f5f2671a0cf812a734559139c0f8034
                            • Opcode Fuzzy Hash: e30e9acfeb96a2526bf6f5260bc25cb453e2a4b733c0efb5a3a3079bcb3d8872
                            • Instruction Fuzzy Hash: ABA16E36E102098FCF46EFB5D84459EBBB2FF89300B15416BE816AB251DB31E916CF80
                            Memory Dump Source
                            • Source File: 00000000.00000002.4096100395.0000000006480000.00000040.00000800.00020000.00000000.sdmp, Offset: 06480000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6480000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b620a33d96571fffc1414af8653fadba7def7e7c70045572953db98ded3055da
                            • Instruction ID: 592b36d74b9eea974a5cd38fc4ee0818889b9a8386d1472c4bef875018e202d8
                            • Opcode Fuzzy Hash: b620a33d96571fffc1414af8653fadba7def7e7c70045572953db98ded3055da
                            • Instruction Fuzzy Hash: 4FD1C731C2075A8ECB10EB64D954AD9B7B2FF95300F60D79AD14937225FB70AAC4CB41
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d7eb43f5c7231a46faedc5021e64e8c53aa15c9d881c6acff5b21ae3855d635d
                            • Instruction ID: 3c243981a69ceb2f1872b07f5a3ff308144714b60c2c9377030e7844af7b7182
                            • Opcode Fuzzy Hash: d7eb43f5c7231a46faedc5021e64e8c53aa15c9d881c6acff5b21ae3855d635d
                            • Instruction Fuzzy Hash: FED116B8822B458ED721CF64ED8A18D3FB1BB96314F554209E1616B2E5DFBC248BCF44
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 519d71d31dfe2b71d65c539f7253ce4d0ce1a0c509a5eaaf561cac07154b4855
                            • Instruction ID: 74c1b90a01db230de662c72faab58802bb742d928f34651097fec506a9751401
                            • Opcode Fuzzy Hash: 519d71d31dfe2b71d65c539f7253ce4d0ce1a0c509a5eaaf561cac07154b4855
                            • Instruction Fuzzy Hash: 15717072A9155347E39CCF5CECD17763713DBC5351F49C23ACA025B6EAC938A922C688
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 56d4400f77c04dc4446d24fbb084ed78fa0beaad766ef6ff58d44a670f1be69a
                            • Instruction ID: e93c334361593eb17f37b37ed9e80cdb2c00b1b1e1af3e0e9a736190e966ddef
                            • Opcode Fuzzy Hash: 56d4400f77c04dc4446d24fbb084ed78fa0beaad766ef6ff58d44a670f1be69a
                            • Instruction Fuzzy Hash: 4A615E3266055747E391DF6DEEC47663762EBC9351F18C630CA008B6A6CB39B92297CC
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f84f8abda09efbfc4fc50908dec446613bf2f52d635c093d4d9c5e236f650133
                            • Instruction ID: 39afabd8a370e1aacf823bb5b0eb141e0e266d105c364ee31248ba7b153c19f0
                            • Opcode Fuzzy Hash: f84f8abda09efbfc4fc50908dec446613bf2f52d635c093d4d9c5e236f650133
                            • Instruction Fuzzy Hash: 2851F94400D7E18EC716873A44E0AA7BFD10FAB115F4E9ACDA5E90B2E3C159C288DB77
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5804b07f674ae3d268ec1438c7da71b35f3107e62f64f1f633515dfb68ee091a
                            • Instruction ID: cff114a85fcb8f5deb46d81d22c4208fa3965af46b01a687ebeadebabb5a60ab
                            • Opcode Fuzzy Hash: 5804b07f674ae3d268ec1438c7da71b35f3107e62f64f1f633515dfb68ee091a
                            • Instruction Fuzzy Hash: 9A31D8302052028BE738CE19C954BEBB3B5AFC0349F44883ED986A73C4DABDD945D795
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9961543af999a1320c5b9d9b8c59a9b64f893fc8dbb42675723320a25693eab2
                            • Instruction ID: 40597224e526abc728bb10992f322fa75c91b34d76fbbe6bc80328d1c420bfc2
                            • Opcode Fuzzy Hash: 9961543af999a1320c5b9d9b8c59a9b64f893fc8dbb42675723320a25693eab2
                            • Instruction Fuzzy Hash: F321923170520247EB68C929C9547ABB3A5ABC0389F48853EC986A73C8DAB9E941D785
                            APIs
                            • LCMapStringW.KERNEL32(00000000,00000100,00420398,00000001,00000000,00000000,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 004170B3
                            • GetLastError.KERNEL32(?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000,?,7FFFFFFF,00000000,00000000,?,020F1900), ref: 004170C5
                            • MultiByteToWideChar.KERNEL32(7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 00417151
                            • _malloc.LIBCMT ref: 0041718A
                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000,?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000), ref: 004171BD
                            • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000), ref: 004171D9
                            • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,?,?), ref: 00417213
                            • _malloc.LIBCMT ref: 0041724C
                            • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,00000000,?), ref: 00417277
                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,?,00000000,00000000), ref: 0041729A
                            • __freea.LIBCMT ref: 004172A4
                            • __freea.LIBCMT ref: 004172AD
                            • ___ansicp.LIBCMT ref: 004172DE
                            • ___convertcp.LIBCMT ref: 00417309
                            • LCMapStringA.KERNEL32(?,?,00000000,?,00000000,00000000,?,?,?,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?), ref: 0041732A
                            • _malloc.LIBCMT ref: 00417362
                            • _memset.LIBCMT ref: 00417384
                            • LCMapStringA.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,7FFFFFFF,00000100,7FFFFFFF,?), ref: 0041739C
                            • ___convertcp.LIBCMT ref: 004173BA
                            • __freea.LIBCMT ref: 004173CF
                            • LCMapStringA.KERNEL32(?,?,?,?,7FFFFFFF,00000100,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 004173E9
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: String$ByteCharMultiWide__freea_malloc$___convertcp$ErrorLast___ansicp_memset
                            • String ID:
                            • API String ID: 3809854901-0
                            • Opcode ID: 699406c386ffa869d5cdd020c3adf727bae4a7aedc43fc2fcbe963bd6ef1e29e
                            • Instruction ID: cdfffc9a1d2b3026f9ae82d5cc8d175594050d3ba9b5f3d3ede674b9b5b9b85c
                            • Opcode Fuzzy Hash: 699406c386ffa869d5cdd020c3adf727bae4a7aedc43fc2fcbe963bd6ef1e29e
                            • Instruction Fuzzy Hash: 29B1B072908119EFCF119FA0CC808EF7BB5EF48354B14856BF915A2260D7398DD2DB98
                            APIs
                            • _malloc.LIBCMT ref: 004057DE
                              • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                              • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                              • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
                            • _malloc.LIBCMT ref: 00405842
                            • _malloc.LIBCMT ref: 00405906
                            • _malloc.LIBCMT ref: 00405930
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: _malloc$AllocateHeap
                            • String ID: 1.2.3
                            • API String ID: 680241177-2310465506
                            • Opcode ID: 1371ffb49ce3b8dee1113081a69af0fad64233f45308895947edc3c59a7df708
                            • Instruction ID: 6f54ea0e5a0cddcbb7a6eab5c61130b8c10e9e343dc86a4c4a61a5a67c51a18e
                            • Opcode Fuzzy Hash: 1371ffb49ce3b8dee1113081a69af0fad64233f45308895947edc3c59a7df708
                            • Instruction Fuzzy Hash: 8B61F7B1944B408FD720AF2A888066BBBE0FB45314F548D3FE5D5A3781D739D8498F5A
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
                            • String ID:
                            • API String ID: 3886058894-0
                            • Opcode ID: 61b9ef8a6f765c58139a33a573ef994292dae8fcc9e916c915b81b6d9ebba236
                            • Instruction ID: 0234425abcb0213f77efd30778ac7634d7a408156a07f93f58cd91f86a00e979
                            • Opcode Fuzzy Hash: 61b9ef8a6f765c58139a33a573ef994292dae8fcc9e916c915b81b6d9ebba236
                            • Instruction Fuzzy Hash: 1E519031A00605ABCB209F69C844A9FBB75EF41324F24863BF825B22D1D7799E51CBDD
                            APIs
                            • __lock_file.LIBCMT ref: 0040C6C8
                            • __fileno.LIBCMT ref: 0040C6D6
                            • __fileno.LIBCMT ref: 0040C6E2
                            • __fileno.LIBCMT ref: 0040C6EE
                            • __fileno.LIBCMT ref: 0040C6FE
                              • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                              • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: __fileno$__decode_pointer__getptd_noexit__lock_file
                            • String ID: 'B
                            • API String ID: 2805327698-2787509829
                            • Opcode ID: 0562b983a982954f07d72bd2f01eb344b0d1ff129a9d588568d63b7b4b77f5f9
                            • Instruction ID: db056c5abb1484b678344f3d998e50672bc49cccd6cfe868de5707b4f3f6250f
                            • Opcode Fuzzy Hash: 0562b983a982954f07d72bd2f01eb344b0d1ff129a9d588568d63b7b4b77f5f9
                            • Instruction Fuzzy Hash: 1A01253231451096C261ABBE5CC246E76A0DE81734726877FF024BB1D2DB3C99429E9D
                            APIs
                            • __getptd.LIBCMT ref: 00414744
                              • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
                              • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
                            • __getptd.LIBCMT ref: 0041475B
                            • __amsg_exit.LIBCMT ref: 00414769
                            • __lock.LIBCMT ref: 00414779
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                            • String ID: @.B
                            • API String ID: 3521780317-470711618
                            • Opcode ID: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
                            • Instruction ID: 91aff3cf2d6bbea4e2ea5d49e8e08bf0f41c3eb50374f8394f27d7b6c467aa53
                            • Opcode Fuzzy Hash: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
                            • Instruction Fuzzy Hash: 60F09631A407009BE720BB66850678D73A06F81719F91456FE4646B2D1CB7C6981CA5D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: $kq$$kq$$kq$$kq$$kq$$kq
                            • API String ID: 0-1342094364
                            • Opcode ID: 2a8dbc279a05d7de844f658b4fda523d4a0263dfffdb4f0c782b265ed5c0d35b
                            • Instruction ID: 642c1ea3bd53c0398990b81d1ef0a90fcef7efe9d246f26af85ac56c91625059
                            • Opcode Fuzzy Hash: 2a8dbc279a05d7de844f658b4fda523d4a0263dfffdb4f0c782b265ed5c0d35b
                            • Instruction Fuzzy Hash: 32F10C74B10204DFCB18EBA4D595A6EB7B3FF84340F248869D405AB3A9DB35EC86CB50
                            APIs
                            • __getptd.LIBCMT ref: 00413FD8
                              • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
                              • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
                            • __amsg_exit.LIBCMT ref: 00413FF8
                            • __lock.LIBCMT ref: 00414008
                            • InterlockedDecrement.KERNEL32(?), ref: 00414025
                            • InterlockedIncrement.KERNEL32(020F1660), ref: 00414050
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                            • String ID:
                            • API String ID: 4271482742-0
                            • Opcode ID: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
                            • Instruction ID: 77fb08d543caf33888dccec20a3998fa005b1348dfeb798e4aa279577202aa48
                            • Opcode Fuzzy Hash: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
                            • Instruction Fuzzy Hash: 9301A531A01621ABD724AF67990579E7B60AF48764F50442BE814B72D0C77C6DC2CBDD
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: __calloc_crt
                            • String ID: P$B$`$B
                            • API String ID: 3494438863-235554963
                            • Opcode ID: fdf4f6b62053dea64867d0c1085960dee66dbdb5e7cbac4bce55836661d1e8cf
                            • Instruction ID: 4bdca0f49684ef71ac3198dcc3f656e5d5ce7fed137673697bf40858e87bd1f9
                            • Opcode Fuzzy Hash: fdf4f6b62053dea64867d0c1085960dee66dbdb5e7cbac4bce55836661d1e8cf
                            • Instruction Fuzzy Hash: 6011A3327446115BE7348B1DBD50F662391EB84728BA4423BE619EA7E0E77CD8864A4C
                            APIs
                            • GetModuleHandleA.KERNEL32(KERNEL32,0040CDF5), ref: 00413615
                            • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00413625
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: AddressHandleModuleProc
                            • String ID: IsProcessorFeaturePresent$KERNEL32
                            • API String ID: 1646373207-3105848591
                            • Opcode ID: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
                            • Instruction ID: 3bb3582238f4ecb0ba7b9e8fe578e45fdcf0af3c55e5dfe2a5e3893bc0ad87fb
                            • Opcode Fuzzy Hash: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
                            • Instruction Fuzzy Hash: 96F06230600A09E2DB105FA1ED1E2EFBB74BB80746F5101A19196B0194DF38D0B6825A
                            APIs
                            • ___addlocaleref.LIBCMT ref: 0041470C
                              • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(00000001), ref: 004145E4
                              • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 004145F1
                              • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 004145FE
                              • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 0041460B
                              • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 00414618
                              • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 00414634
                              • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 00414644
                              • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 0041465A
                            • ___removelocaleref.LIBCMT ref: 00414717
                              • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 0041467B
                              • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 00414688
                              • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 00414695
                              • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 004146A2
                              • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 004146AF
                              • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 004146CB
                              • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(00000000), ref: 004146DB
                              • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 004146F1
                            • ___freetlocinfo.LIBCMT ref: 0041472B
                              • Part of subcall function 00414489: ___free_lconv_mon.LIBCMT ref: 004144CF
                              • Part of subcall function 00414489: ___free_lconv_num.LIBCMT ref: 004144F0
                              • Part of subcall function 00414489: ___free_lc_time.LIBCMT ref: 00414575
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: Interlocked$DecrementIncrement$___addlocaleref___free_lc_time___free_lconv_mon___free_lconv_num___freetlocinfo___removelocaleref
                            • String ID: @.B
                            • API String ID: 467427115-470711618
                            • Opcode ID: 3857329619949c293296419ec2be8f51648e9d3bf58d3a63f1cc8ec60b1035b6
                            • Instruction ID: 8e9b8205a585dc9325c25650a27042e0212317e7447dcce9b0fe23aa5a8dd77f
                            • Opcode Fuzzy Hash: 3857329619949c293296419ec2be8f51648e9d3bf58d3a63f1cc8ec60b1035b6
                            • Instruction Fuzzy Hash: BDE0863250192255CE35261D76806EF93A98FD3725B3A017FF864AF7D8EB2C4CC0809D
                            APIs
                            • __fileno.LIBCMT ref: 0040C77C
                            • __locking.LIBCMT ref: 0040C791
                              • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                              • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: __decode_pointer__fileno__getptd_noexit__locking
                            • String ID:
                            • API String ID: 2395185920-0
                            • Opcode ID: 0afeae9b27a86c2abe0b3397de8921379debd9150d07dd18b85413c6fc1de43d
                            • Instruction ID: 30055f4621fb528cea72007990449f1feb1a7f288d573051c200dc5e1a244c20
                            • Opcode Fuzzy Hash: 0afeae9b27a86c2abe0b3397de8921379debd9150d07dd18b85413c6fc1de43d
                            • Instruction Fuzzy Hash: CC51CF72E00209EBDB10AF69C9C0B59BBA1AF01355F14C27AD915B73D1D378AE41DB8D
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: _fseek_malloc_memset
                            • String ID:
                            • API String ID: 208892515-0
                            • Opcode ID: e2021bf9677ac04d29097cd60d098293ca774abcf3d3e4afca42f73e68fb5c2d
                            • Instruction ID: b5a371ba5f9a3ad1fa090fb1a89082137fe8d6c03bc5c52cd66242ccf2a60741
                            • Opcode Fuzzy Hash: e2021bf9677ac04d29097cd60d098293ca774abcf3d3e4afca42f73e68fb5c2d
                            • Instruction Fuzzy Hash: 3541A572600F018AD630972EE804B2772E5DF90364F140A3FE9E6E27D5E738E9458F89
                            APIs
                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004152D3
                            • __isleadbyte_l.LIBCMT ref: 00415307
                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000083,?,?,00000000,?,?,?), ref: 00415338
                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000083,00000001,?,00000000,?,?,?), ref: 004153A6
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                            • String ID:
                            • API String ID: 3058430110-0
                            • Opcode ID: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
                            • Instruction ID: 094900ada7e667e90e346a2540d450e67f5821ec0926a3c2ae07879bc245b0d1
                            • Opcode Fuzzy Hash: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
                            • Instruction Fuzzy Hash: 1831A032A00649EFDB20DFA4C8809EE7BB5EF41350B1885AAE8659B291D374DD80DF59
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.4092346754.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.4092327788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092370776.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092390288.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.4092454067.0000000000445000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                            • String ID:
                            • API String ID: 3016257755-0
                            • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                            • Instruction ID: bfd0e68975b3765f24e543ba70b005e9871d43ed2f52156b65e62ceec70126f9
                            • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                            • Instruction Fuzzy Hash: DA117E7200014EBBCF125E85CC418EE3F27BF18755B58841AFE2858130D73BCAB2AB89
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: $kq$$kq$$kq$$kq
                            • API String ID: 0-2881790790
                            • Opcode ID: 3b55248b332a49769af22fcdabce141f690ff685bb118cff33810a8ceaf68c60
                            • Instruction ID: 52da2281c50b6933fdac79a4f98c12014edbec131b4231ae2b4c771c6174e0c9
                            • Opcode Fuzzy Hash: 3b55248b332a49769af22fcdabce141f690ff685bb118cff33810a8ceaf68c60
                            • Instruction Fuzzy Hash: CFB11C30A10218DFDB14EB64D5556AEBBB7FF88310F24846AD405EB399DB75EC86CB80
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.4095796469.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5b30000_c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.jbxd
                            Similarity
                            • API ID:
                            • String ID: LRkq$LRkq$$kq$$kq
                            • API String ID: 0-2392252538
                            • Opcode ID: 94e59ef6ccd4ae83d1eb88ac5588e8788089e250ae2f58494cca85f137fdcae1
                            • Instruction ID: c221a669ca0411e6576b2a0baf49c31ea01732c516a69a14cb842430d86d123f
                            • Opcode Fuzzy Hash: 94e59ef6ccd4ae83d1eb88ac5588e8788089e250ae2f58494cca85f137fdcae1
                            • Instruction Fuzzy Hash: 8A519130B102019FDB18EB24D555A7EB7F7FB88300B2485AEE406AB399DE35EC41CB54